x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c6f626a5f757365723d6d717073002c657569643ce81073f7a84dfc466df50e962bf2d7c7fbb0f08ec0fa4cdaf09e60ca5c171d3156e2e9890b4035e2baf4123abcb6f14930392c61e06730ba3422992707d07ec75661a40f8506ffa35b0bc1e701271b7bbf76c28e14f2e08fb44d0dff5debba6a04c24c135be16fe344e470b79afe9874e461f7411eab5421648126dfbeb49a6243e902ef804b863a5c723881093e9e81496cdb246f376b9693f247aa681f3c83e698c339abfe7d307fb4e237", @ANYBLOB]) 08:26:22 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x0, &(0x7f0000000080)}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:22 executing program 0: io_setup(0x1, &(0x7f0000000080)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], 0x0) io_destroy(r0) 08:26:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="c0dca5055e0bcfec7be070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000c40)=ANY=[@ANYBLOB="20001a00030101000000000000000000000000000c0001000003000000000000"], 0x20}}, 0x0) 08:26:22 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:22 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = getpgid(0xffffffffffffffff) move_pages(r1, 0x4, &(0x7f0000000000)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil], &(0x7f0000000040)=[0x5, 0x0, 0xff], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) 08:26:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x0, &(0x7f0000000080)}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:22 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x40, 0x0) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff012}], 0x1, &(0x7f0000000200)=""/20, 0xd57}, 0x0) 08:26:22 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffff9, 0x80000) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x40, 0x50000) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80000, 0x0) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000003d80)="c0dca5055e0bcfec7be070") 08:26:22 executing program 0: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_DISCONNECT(r0, 0xab09) [ 256.772504] audit: type=1400 audit(1560587182.714:94): avc: denied { map } for pid=13450 comm="syz-executor.1" path="/selinux/status" dev="selinuxfs" ino=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 08:26:22 executing program 2 (fault-call:12 fault-nth:0): openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:22 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) r2 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x400) open_by_handle_at(r1, &(0x7f00000000c0)={0x93, 0x80000001, "56c04c3500b947a4828cf4dec5231305d3d6d1ecae45c77e7ce9a094cf497b05d85a05c169d2d2d6040af007322dec7e09af4bc94a152a1549470b0495128dd574407da573c5bbb784246d9c2c2bcdbf6b228ef55d9d790f54d964a16942e5816f2af6620601bf51c22d517047a98336a4560d05ddfea5289ee39f8737f0a03dc4dc7c9dbd937c15317b57"}, 0x2182) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x800, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f00000001c0)={0x7, 0x95d1}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x4e, "fb9f02b0450568a4447c26c658bfb77d26b3ed8e3ad9559c94e9c03181c5cda2dd244bf329d604fcc036f81b25bbbd241f63075205ea1001126a9e62dc4684ecfb0b17e8b85a351690dff296d094"}, &(0x7f0000000280)=0x56) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000002c0)={r4, 0x1}, &(0x7f0000000300)=0x8) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000340)={{0xffffffffffffffff, 0x3, 0x7, 0x3, 0x5}, 0x2, 0x387b, 'id0\x00', 'timer1\x00', 0x0, 0x400, 0x200, 0xffff, 0x5}) syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x1) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000480)={'ip6erspan0\x00', 0xfffffffffffffff7}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r3, 0x800442d3, &(0x7f00000004c0)={0x1, 0x100, 0x9, @broadcast, 'nr0\x00'}) write$capi20(r3, &(0x7f0000000500)={0x10, 0x8, 0x83, 0x81, 0x4000000000000, 0x8000}, 0x10) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000540)) sendmsg$inet_sctp(r3, &(0x7f0000000b40)={&(0x7f0000000580)=@in6={0xa, 0x4e22, 0x6, @mcast1, 0x2}, 0x1c, &(0x7f0000000a00)=[{&(0x7f00000005c0)="d58b347d7e3fae36492fa14bcb7cbb39844b1a407fdd5cb1d825eeb79cd1cb7dbfdca4b21ec8", 0x26}, {&(0x7f0000000600)="0adea2da029b2655efce2bb87248522651792858fa53bf57b8b9ae4545ff0a2c864e2396167d75b4f94f2cd20dce731c4e18e752b702f8f1495fd48fd067f0f8cd90c190e79d957ba41c628495cf74f639296309972b7cac4586ef078dc5aae76554f9b1b0db454ab614262bc79881fc8f5ad100d1aa0d984867d4082d696c74b31c4b5ec99745d3efbc0333dcc9ffd7ea5f1a9863403cb7efe3eca287b8f402b775c825234e763bcaabb47e862b356121a4842549d9c7955f945b27d0d1b3b826058059d0236e648f9e753e52c8a9399b0a7458a979e5a64db215542723", 0xde}, {&(0x7f0000000700)="b668433261523c06078c0866727a16615e92a0a1b34d09bc8b4ff2866bf3f6546b1b5d02109356aa425b105b65c21f55cba500a2bd3f6ec9457de1026029bf2e743843a6f6f3c207febf16ea8a7b30f3df0edb133d3062433328826ea1b7334dcfdeb4f4942643e57335d88c909ee813f34b7eb506019dcdaa077286a73a1259166fe7f692369394fee1241e1ea49d7d35e96c44d22f825b5dcd62869af009ce951d8d59cc9a3a7fecf2e788570aecb0defee96de80f3f3ce6d2d0c6ae9aa792f6f21eedeef408fafe0b3325e3c788b03324ea22c982fe6d17ac29ec7ce8b96234c7e86b64a545c9d4f27a183f", 0xed}, {&(0x7f0000000800)="c36445cccd0e2077bb471251aba959086a239f6a4a1f8187eaa4bbba54663d666d66f2fdb5a6d984e9618c700828fc0c914acdee27be070042f2dec0bd22ce804b353d0c15dd047a784c79365e5c7686a9972141216d0ee49635b049e08903acd4e90619cdcc7ef7847cfec520d3aad23eaa8b974dc17c7d83b205de1f79dc22056cb080725403e89892fead886fa9c7b6ce4e1adb5cf06bf86279bad8ce8c8b816f6a3bb5e9ee4d43442723284a2beca0ccffeab98628d28830da30fab73f22b6e7d59052bee399537cc24e7950d87c726fe5870264b35c9e6b68a03aa5d4d0f5008949699a3a8fe90698f8cfca2cdda9e4d5c568133812944273c16d", 0xfd}, {&(0x7f0000000900)="3334989278fcedad9ddd1fe485b45f9149212e", 0x13}, {&(0x7f0000000940)="fddd7aee23db518294b8230286dfa6010e64748d2c73ae571eb22f93894174f170853967e7b8a66949a090b794a7b5bc1e9b5b69c3b0737548d300a405607b7a6da2efb79e41df97f780fb01409b26c8bbc0f9ea5cd352fc77ba15171b676c09d385838ce2714037350964df4b3ee4567d07cc763971d216ce483e626fc014c8ff4543a8ed6370a7c4746db7700c594a2535e9da65d9e497fc01c4c515612e78f0", 0xa1}], 0x6, &(0x7f0000000a80)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @authinfo={0x18, 0x84, 0x6, {0x1b}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @init={0x18, 0x84, 0x0, {0x1, 0x5, 0x5, 0x1f}}, @authinfo={0x18, 0x84, 0x6, {0x401}}, @init={0x18, 0x84, 0x0, {0x36e, 0x80, 0x98cc, 0xd694}}], 0xa0, 0x4}, 0x10) ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f0000000b80)) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x4) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000bc0)={r4, 0x2}, &(0x7f0000000c00)=0x8) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000c40)={0x2, 0x2, {0xffffffffffffffff, 0x2, 0x1ff, 0x3, 0x7}}) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000cc0)={0x7, 0x21, 0x1}, 0x7) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000d40)={0x1, 0x81, {0x54, 0x1ff, 0x100000001, {0x5c19, 0x884}, {0x8, 0x1}, @period={0x5c, 0x6, 0x8, 0xa8, 0xffffffff, {0x48000, 0x5, 0x58, 0x4}, 0x8, &(0x7f0000000d00)=[0xa26, 0x4, 0x4, 0x1ff, 0xc941, 0x100, 0x1, 0x2]}}, {0x0, 0x2, 0x1, {0x1f, 0x8000}, {0xef5, 0x8}, @rumble={0x7, 0x7}}}) setxattr(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)=@random={'trusted.', 'GPLkeyring#geth1}$}mime_typeselinux\x00'}, &(0x7f0000000e40)='timer1\x00', 0x7, 0x2) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000e80)={0x575, 0x0, 0x3000}, 0x4) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000ec0), &(0x7f0000000f00)=0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000f80)=0x0) getresuid(&(0x7f0000000fc0), &(0x7f0000001000)=0x0, &(0x7f0000001040)) sendmsg$nl_generic(r3, &(0x7f0000001400)={&(0x7f0000000f40)={0x10, 0x0, 0x0, 0x80280000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001080)={0x32c, 0x2e, 0x100, 0x70bd27, 0x25dfdbfb, {0x14}, [@generic="4c2a1e5a352928a7c76d7641daa159e706314aec0033f3014b7d6186ba538f5c00c4f6837c9e66c44773bcd3c30d8e6dea71ff17beffc1e4d7304939870b96d10b23654a6eadf50525b7b061da689d456f0b4724f55b57cdab49d1a63fd353640f031bfdf879b902643510f1cb0099", @typed={0x4, 0x8a}, @nested={0x10c, 0x68, [@typed={0xc, 0x51, @u64}, @generic="47aef439c03eee22cadac85e54d509d49365ea94b3d7382426a5c04164384e711348a83524a9791dfb0befbb7d0fd4515029b7cce05454e20a9c05559f4ec1", @generic="6ce5a2638c10aa1aab2ffb0cfc2106fc2a77326a031f61434ca0e0257eb50d1489aac1b793dfe9abdd2e574a86f034a534397beaf884180cc3dcd7e4c6aadb8fdc4c78a807a4bfc160fcd73f907abc1a03ff36179dc981a6c12a73c1e2da3b9911fb3e075c6adc8b09dd6f0f185a36927ec323ef3167f51725c99d9dcd", @generic="8e296b1a97a5aa5267245239f4936bc463eeface1bd1bc88", @typed={0x8, 0x52, @pid=r5}, @typed={0xc, 0x5f, @u64=0x7d0}, @generic="052d16f790b4012d55", @typed={0x8, 0x36, @uid=r6}]}, @nested={0x18, 0xa, [@typed={0x14, 0x8f, @ipv6=@local}]}, @generic="aa4df8af82ce9f41a3bc589f1eed95d190afaf5dff6eeb870d677dcaa0c1dfc78b4d61088215d1a14f390f83771f1443583bd65e27d9ddc244b278740e9c161200b1cbb6ff5d4bb41294486aea477d373dee64aed36f0e2105a181004936386ba9869abd5b41e0e8cca28afb7a9dff8f9aada3dd698c64576ca5aae4d0019a0fe5", @generic="d38d65c37e8307a6999065644fe7f8d2f7a0d1dffca0adf539fe92", @typed={0xe4, 0x74, @binary="4f81896e6118889d6ec07d51fe0bcf2ea8f6ede2d04466bb5438edc1b5e6291b1f29ff62011738f2381c1a6932dde2a50a6bdf95b33c00c048514bd5fa817091f82d02db9c7008a4e43e7b6c80cebe54234945c96b8bee1c19974db2b93cc8603d55180320bc7ae4ed7ea5ac935bdf6969f9cfd628d516219b07efa4ae6325474c56a0947b8a3e1b6057359be7ff6554277133a91ce055a7908a47726f8213e6ed2c956f198cd28f10851d072914189467e82a74864dd3d78cb0ed8550dbf4c3682d91aa64e26767b682bcc3576c581b37a6aa5dbee99f70bf2c59ea7d160f18"}]}, 0x32c}, 0x1, 0x0, 0x0, 0x801}, 0x4000000) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000001440)=0x5, 0x4) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000001480)='tls\x00', 0x4) write$P9_RATTACH(r3, &(0x7f00000014c0)={0x14, 0x69, 0x1, {0x0, 0x2, 0x3}}, 0x14) 08:26:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x0, &(0x7f0000000080)}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:22 executing program 3: r0 = socket$unix(0x1, 0x2000000003, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = dup2(r1, r1) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) r3 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='trans=fd,zfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c1f"]) [ 256.946237] FAULT_INJECTION: forcing a failure. [ 256.946237] name failslab, interval 1, probability 0, space 0, times 1 [ 256.967007] CPU: 0 PID: 13469 Comm: syz-executor.2 Not tainted 4.14.125 #19 [ 256.972574] 9pnet: Insufficient options for proto=fd [ 256.974153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.974231] Call Trace: [ 256.974338] dump_stack+0x138/0x19c [ 256.988736] should_fail.cold+0x10f/0x159 [ 256.988755] should_failslab+0xdb/0x130 [ 256.988768] __kmalloc+0x2f0/0x7a0 [ 256.988778] ? __sb_end_write+0xc1/0x100 [ 256.988790] ? strnlen_user+0x12f/0x1a0 [ 257.010677] ? SyS_memfd_create+0xba/0x3a0 [ 257.010694] SyS_memfd_create+0xba/0x3a0 [ 257.010707] ? shmem_fcntl+0x130/0x130 [ 257.010718] ? do_syscall_64+0x53/0x640 [ 257.010729] ? shmem_fcntl+0x130/0x130 [ 257.010739] do_syscall_64+0x1e8/0x640 [ 257.010748] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:26:22 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xd4ad, 0x2000) ioctl$TCFLSH(r0, 0x540b, 0x5) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbd3, 0x0, 0x0, 0x9], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:26:22 executing program 1: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000380)) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000880)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000005c0)={0x1, 0x0, 'client0\x00', 0x4, "01ee703c0b4babb8", "b811ff0c6e3b92b0f2ff316dd7514d4c7111f0e20c0b8775ccb40c648cbb7414", 0x7}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x279) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, &(0x7f0000000180), 0x8) [ 257.010798] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.010810] RIP: 0033:0x4592c9 [ 257.038658] RSP: 002b:00007f2c07a67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 257.059578] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004592c9 [ 257.059590] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be1cc [ 257.059597] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 257.059604] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c07a686d4 [ 257.059611] R13: 00000000004c82e2 R14: 00000000004deb40 R15: 0000000000000007 08:26:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:23 executing program 3: clone(0x7fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)={[{@workdir={'workdir', 0x3d, './file1'}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'workdir'}}, {@uid_eq={'uid', 0x3d, r0}}]}) mknod(&(0x7f0000000040)='./bus\x00', 0x1000, 0x2) [ 257.071158] 9pnet: Insufficient options for proto=fd 08:26:23 executing program 2 (fault-call:12 fault-nth:1): openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 257.142318] kvm: pic: non byte read [ 257.157834] kvm: pic: non byte read [ 257.165657] kvm: pic: single mode not supported [ 257.168203] kvm: pic: non byte read 08:26:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 257.186432] overlayfs: unrecognized mount option "smackfsfloor=workdir" or missing value [ 257.204636] kvm: pic: non byte read [ 257.234005] kvm: pic: level sensitive irq not supported [ 257.234428] kvm: pic: non byte read [ 257.244131] overlayfs: unrecognized mount option "smackfsfloor=workdir" or missing value [ 257.275326] FAULT_INJECTION: forcing a failure. [ 257.275326] name failslab, interval 1, probability 0, space 0, times 0 [ 257.302224] CPU: 0 PID: 13505 Comm: syz-executor.2 Not tainted 4.14.125 #19 [ 257.309380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.318744] Call Trace: [ 257.321345] dump_stack+0x138/0x19c [ 257.324978] should_fail.cold+0x10f/0x159 [ 257.329130] should_failslab+0xdb/0x130 [ 257.333106] kmem_cache_alloc+0x2d7/0x780 [ 257.337247] ? __alloc_fd+0x1d4/0x4a0 [ 257.341048] __d_alloc+0x2d/0x9f0 [ 257.344494] ? lock_downgrade+0x6e0/0x6e0 [ 257.348636] d_alloc_pseudo+0x1e/0x30 [ 257.352434] __shmem_file_setup.part.0+0xd8/0x400 [ 257.357267] ? __alloc_fd+0x1d4/0x4a0 [ 257.361065] ? shmem_fill_super+0x8c0/0x8c0 [ 257.365388] SyS_memfd_create+0x1f9/0x3a0 [ 257.369527] ? shmem_fcntl+0x130/0x130 [ 257.373412] ? do_syscall_64+0x53/0x640 [ 257.377379] ? shmem_fcntl+0x130/0x130 [ 257.381261] do_syscall_64+0x1e8/0x640 [ 257.385137] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.389975] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.395161] RIP: 0033:0x4592c9 [ 257.398341] RSP: 002b:00007f2c07a67a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 257.406063] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004592c9 [ 257.413330] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be1cc [ 257.420596] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 257.427860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2c07a686d4 [ 257.435128] R13: 00000000004c82e2 R14: 00000000004deb40 R15: 0000000000000007 08:26:23 executing program 4: r0 = memfd_create(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) write$P9_RMKNOD(r1, 0x0, 0x0) write$FUSE_DIRENT(r1, 0x0, 0x0) link(0x0, &(0x7f0000000180)='./file0\x00') close(r1) ioctl$FICLONE(r0, 0x40049409, r0) ioctl$sock_FIOGETOWN(r2, 0x8903, 0x0) 08:26:23 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x81c1, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000080)={0xffffff53, 0x0, 0x1, {{0x1fffe00000000000, 0x0, 0x40, 0x8003, 0x7ff, 0x7, 0xc3, 0xbfd}}}, 0x60) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000440)='/dev/capi20\x00', 0x50, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r2, @in={{0x2, 0x4e20, @loopback}}, 0x40, 0xfffffffffffffff7}, &(0x7f0000000180)=0x90) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000200)) 08:26:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000080)=0x4) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="f0000000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000a000400600000000000000048000200656362286369706865725f6e756c6c290000000000000000000000000000000000000000000d000000000000000000000000000000000000000000000000000000000042"], 0x1}}, 0x0) 08:26:23 executing program 2 (fault-call:12 fault-nth:2): openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:23 executing program 0: clone(0x4210003102441ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000040)=""/159, &(0x7f0000000100)=0x9f) r1 = gettid() futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xffffffffbffffffe) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) wait4(0x0, 0x0, 0x0, 0x0) 08:26:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2, 0x73) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000040)=0x80) 08:26:23 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000008c0)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000009c0)=0xe8) syz_mount_image$ext4(&(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x5, &(0x7f0000000840)=[{&(0x7f0000000300)="a3f349b817500cc0912f66ef96562cc883024c9054fe5f5ccb60212d48bc021e6abd1fad9203fe438cc24ff7000359be1074705f88c22b06bdd88ae158d40f88142f6e2ed36db5d017bb788f6aa3c08a193412b121786d1a78aace235f9a3d8220248b8980be9ae377abf6b0d24e41a476709a470353cd40b760d60bfd3c019b3f5c3d24b918493b0077755843e27a60128b5060bb1de0d0", 0x98, 0x8000}, {&(0x7f00000004c0)="8c50716540c99062359cb8a3ee0e2808bf7712e110ada0da2328866549f8980bc0b31f1fa89f08d1f55fdcbfbe422267e0b929eb8b237a9079c6fbe63c973519dce644d5c053530f64bb5ae23605b23eb8b254c0dddda66f9eedb7c7702a56c3b9be7e3f655fb36a4f6727ab05b53944f814ae3a3e2fcb752b92a9d89845ac13093da9038d80689b69e16a9a23e07155d653b2a0daae6762c9463690c43d05bd8da4f0146bf9d4a4bad9cd586993e1518bf99968c808e4cb36f9f5c74db21039bd12b8f4771e", 0xc6, 0xfffffffffffffffc}, {&(0x7f00000005c0)="31d9b3895036fb2946690199b23e2667e499531a24be0d030233e58bfdd05a26e88f86b29a682cb28d565d721f2591dbf6b7f3fe6f2237a135c905ac89def3299d898b19450cc821721000c6999f2577aa674fc509b7ca4e80e751e08d859087d19910a21b94cd933475267d5d8f1205a5d71ca358382017ffa7ca03821a7bb4283e1d4c18783b30b227cc56b8da4a45794f60fb623703a0e49da0224d26543cb52728e454e38b8062ca16d5f908ed05653738c206aaadfe2acb1aaf2a3187ab23effdd33c165575c9", 0xc9, 0x3}, {&(0x7f00000006c0)="b894f6492391e95e93e915ce6a4c8ba687e0f6e899982dd6b1c7e705e741730237d49b4410e97589991431268f4bf4153513864e67b754d4e93ce700fc60553d33eef8611c54343fb609b8f99ab697e5775909b3a3e6ea13c1dabec7e4d2e0e23a18feb586081dfdca49ceedddc3e51c", 0x70, 0xfffffffffffff001}, {&(0x7f0000000740)="98280b231b7649c215159a04a7ac981d07b199e7e0c9ee1a0296c85d840a05e1bd5cddca872bc72dd7345c34de0894acea7fc13f09731731287c5e7518f032a4e5ee9eb131b97bb48f8fb25842cc93e7c385f9a6e9734e38c773dd73e4a47b07c52787961eed4876db4803fd839351582af295b84a106c46f161ae92ce278ea391159566c8bcc500d642a9fd6aa8842e6491b88de7ebae71474b09006f8fcd32d6cc95db76e26a419e7527fff7e140012f0eb0ecf7ad4630e9497e4f1941fec5a6dafe2891a1293f503052f437bd6f531e529a2041c7930a42ab01f6039ba2", 0xdf, 0xfdc}], 0x20000, &(0x7f0000000a00)={[{@prjquota='prjquota'}, {@nobarrier='nobarrier'}, {@dax='dax'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/uinput\x00'}}, {@obj_role={'obj_role'}}, {@audit='audit'}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@obj_user={'obj_user', 0x3d, '/dev/uinput\x00'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_lt={'fowner<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, '*vmnet1'}}]}) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) [ 257.758887] futex_wake_op: syz-executor.0 tries to shift op by 4095; fix this program [ 257.785971] futex_wake_op: syz-executor.0 tries to shift op by 4095; fix this program 08:26:23 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, &(0x7f0000000200)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000640)=""/246) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000040)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000440)=""/246) r4 = epoll_create(0xab7f) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000180)={0x8}) epoll_pwait(r4, &(0x7f0000000100)=[{}], 0xc525f82a262b837, 0xb66, 0x0, 0xfffffffffffffc55) r5 = dup3(r3, r1, 0x0) setsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000140)=0x9, 0x4) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f00000001c0)) splice(r1, &(0x7f0000000000), r4, &(0x7f00000000c0), 0x7f, 0xe) 08:26:23 executing program 0: clone(0x4210003102441ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000040)=""/159, &(0x7f0000000100)=0x9f) r1 = gettid() futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xffffffffbffffffe) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) wait4(0x0, 0x0, 0x0, 0x0) 08:26:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000000)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6, @dev={[], 0x27}}, 0x10) 08:26:23 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'rfc3686(ctr-aes-aesni)\x00'}, 0x58) bind$alg(r1, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r3, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) [ 257.948978] futex_wake_op: syz-executor.0 tries to shift op by 4095; fix this program [ 257.990166] protocol 88fb is buggy, dev hsr_slave_0 [ 257.995315] protocol 88fb is buggy, dev hsr_slave_1 08:26:24 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000100)=0x0) wait4(r0, &(0x7f0000000180), 0x2, &(0x7f00000001c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x2144c2) connect$rose(r1, &(0x7f0000000080)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x5, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x40) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x8a000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0xa01ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setns(r3, 0x42000000) write(r3, &(0x7f00000001c0), 0xfffffef3) ptrace(0x4206, r2) tkill(r2, 0x9) 08:26:24 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x6, 0xac708f0, 0x9, 0x0, 0xe}) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) 08:26:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) connect$vsock_dgram(r1, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cp}s\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) timer_create(0x5, &(0x7f0000044000)={0x0, 0x12, 0x1, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r4 = gettid() syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @random="188d3ea1dabc", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000300)) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0x71, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000140)=""/113}, &(0x7f0000000240)=0x78) tkill(r4, 0x15) 08:26:24 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt(r0, 0x0, 0xd0, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'bond0\x00', @ifru_map={0x80000001, 0x7, 0x1000, 0x4, 0x7fffffff, 0x1}}}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='bcsh0\x00', 0x10) 08:26:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd2(0x0, 0x0) unshare(0x10000400) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r2}) r3 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x141000, 0x100) write$FUSE_INTERRUPT(r3, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x4}, 0x10) 08:26:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) [ 258.249095] ntfs: (device loop2): parse_options(): Unrecognized mount option . 08:26:24 executing program 1: r0 = socket$inet6(0xa, 0x4001000000000002, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'\b\x00\x00\x03ge0\x00\x02\x00', &(0x7f0000000040)=@ethtool_ringparam={0x11, 0x0, 0x2, 0x0, 0x2}}) 08:26:24 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="a7a4ddd5017a13b7000000a0300d9c745f0e7bc1b08e55b2f0fa9ee2e952be98d2adf2dfcb3de9434441f4d8015eb7baddb8f980954e49885ecb149f5297e78d1f7a702c8f21368fb25e1b52c53e7d025523a0b8cd1e40b4e8a2e5d67cf84fd94d576907ffa68f1c8076ccacde0103e10e74c817e3827c6adec4d079222614c2700bb4bfdde3eee48de1abce56db92fde653fa037211806b3a855942d9f5857ee3314ab354a12fb105f732b4dfa1e3bbb4fab1cc7f84401fb25666ed917442ff09522daef09e70a281457ae9d4ec270a41d90fbbae5ce7b844bd10c886b199ec6503926217392db936654ae584c5dc67f780ca265af2b7"]) 08:26:26 executing program 0: clone(0x4210003102441ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f0000000040)=""/159, &(0x7f0000000100)=0x9f) r1 = gettid() futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xffffffffbffffffe) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2f) wait4(0x0, 0x0, 0x0, 0x0) 08:26:26 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="e2c5c166b98b1251f35f005ca5a615871108627638bd1fbd452f0972d3a6f941411f2557307474a7ecd5de2d300800d47ed578c0e6e86bc8ef029c20517a00ed00"/74]) 08:26:26 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x6, 0xac708f0, 0x9, 0x0, 0xe}) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:26 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:26 executing program 1: syz_emit_ethernet(0x0, &(0x7f0000000340)=ANY=[], 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)={0x0, 0x0}) tgkill(r1, r2, 0x23) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000080)=0xffffffffffffff83) getpgid(r3) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@generic={0x2, 0x10001, 0x4}) [ 260.927657] FAULT_INJECTION: forcing a failure. [ 260.927657] name failslab, interval 1, probability 0, space 0, times 0 [ 260.938806] futex_wake_op: syz-executor.0 tries to shift op by 4095; fix this program [ 260.939197] CPU: 0 PID: 13643 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 260.954166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.963524] Call Trace: [ 260.966644] dump_stack+0x138/0x19c [ 260.970283] should_fail.cold+0x10f/0x159 [ 260.974459] should_failslab+0xdb/0x130 [ 260.978442] kmem_cache_alloc+0x47/0x780 [ 260.982509] ? __might_fault+0x110/0x1d0 [ 260.986583] ebitmap_cpy+0xcd/0x270 [ 260.990226] ? hashtab_search+0x196/0x230 [ 260.994395] mls_compute_sid+0x22f/0xd60 [ 260.998470] ? mls_convert_context+0x6a0/0x6a0 [ 261.003065] security_compute_sid.part.0+0xa8f/0x10f0 [ 261.008265] ? get_pid_task+0x98/0x140 [ 261.012161] ? security_compute_validatetrans.part.0+0x470/0x470 [ 261.018313] ? lock_downgrade+0x6e0/0x6e0 [ 261.022469] ? find_held_lock+0x35/0x130 08:26:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000000100), 0x1) [ 261.026566] security_transition_sid+0xd6/0x130 [ 261.026583] selinux_socket_create+0x36d/0x4d0 [ 261.026603] ? selinux_msg_queue_alloc_security+0x2a0/0x2a0 [ 261.026620] security_socket_create+0x83/0xc0 [ 261.026682] __sock_create+0x67/0x620 [ 261.042784] ntfs: (device loop2): parse_options(): Unrecognized mount option fQ_. [ 261.046199] SyS_socket+0xd3/0x170 [ 261.046213] ? move_addr_to_kernel+0x60/0x60 [ 261.046228] ? do_syscall_64+0x53/0x640 [ 261.070161] ? move_addr_to_kernel+0x60/0x60 [ 261.074577] do_syscall_64+0x1e8/0x640 [ 261.074595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.074615] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.083348] RIP: 0033:0x45be17 [ 261.083353] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 261.083364] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 261.083369] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 261.083375] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 261.083380] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 261.083386] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) connect$vsock_dgram(r1, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cp}s\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) timer_create(0x5, &(0x7f0000044000)={0x0, 0x12, 0x1, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r4 = gettid() syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @random="188d3ea1dabc", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000300)) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0x71, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000140)=""/113}, &(0x7f0000000240)=0x78) tkill(r4, 0x15) 08:26:27 executing program 1: socket(0x1e, 0x4, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x101000) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000002a00)={@ipv4, 0x22}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r4 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d80340000005e510befccd7", 0x2e}], 0x1}, 0x0) ioprio_get$uid(0x3, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r2, 0xc0bc5351, &(0x7f0000000240)={0x17e9, 0x2, 'client0\x00', 0xffffffff80000002, "523a6cdb0f57f180", "f8b37d0c72d41ca5821ab5aa556c2152b771bd761eaf95efa871c90bbd8be705", 0x99f1, 0x35}) clock_gettime(0x0, &(0x7f0000000380)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getitimer(0x2, &(0x7f0000000080)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) 08:26:27 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000280)={0x6, 0xac708f0, 0x9, 0x0, 0xe}) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:27 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:27 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x805, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) getsockname$llc(r0, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000340)=0x10) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000100)=0x62) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r3, &(0x7f00000005c0)="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", 0x164, 0x20000000, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280), 0x4) fstat(r3, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 261.278805] FAULT_INJECTION: forcing a failure. [ 261.278805] name failslab, interval 1, probability 0, space 0, times 0 [ 261.290191] CPU: 1 PID: 13672 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 261.297332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.306687] Call Trace: [ 261.306710] dump_stack+0x138/0x19c [ 261.306727] should_fail.cold+0x10f/0x159 [ 261.306736] ? ebitmap_cpy+0xcd/0x270 [ 261.306754] should_failslab+0xdb/0x130 [ 261.306768] kmem_cache_alloc+0x47/0x780 08:26:27 executing program 3: rename(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='.\x00') r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xff, 0x40000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x310, 0x70bd28, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xf7}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40005}, 0x10) [ 261.306781] ? __might_fault+0x110/0x1d0 [ 261.306796] ebitmap_cpy+0xcd/0x270 [ 261.306805] ? hashtab_search+0x196/0x230 [ 261.306820] mls_compute_sid+0x22f/0xd60 [ 261.306832] ? mls_convert_context+0x6a0/0x6a0 [ 261.306852] security_compute_sid.part.0+0xa8f/0x10f0 [ 261.306864] ? get_pid_task+0x98/0x140 [ 261.306882] ? security_compute_validatetrans.part.0+0x470/0x470 [ 261.364647] ? lock_downgrade+0x6e0/0x6e0 [ 261.368818] ? find_held_lock+0x35/0x130 [ 261.372889] security_transition_sid+0xd6/0x130 [ 261.372905] selinux_socket_create+0x36d/0x4d0 [ 261.372917] ? selinux_msg_queue_alloc_security+0x2a0/0x2a0 [ 261.372933] security_socket_create+0x83/0xc0 [ 261.382179] __sock_create+0x67/0x620 [ 261.396162] SyS_socket+0xd3/0x170 [ 261.399716] ? move_addr_to_kernel+0x60/0x60 [ 261.404135] ? do_syscall_64+0x53/0x640 [ 261.408123] ? move_addr_to_kernel+0x60/0x60 [ 261.412539] do_syscall_64+0x1e8/0x640 [ 261.412551] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.412568] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.412581] RIP: 0033:0x45be17 [ 261.421296] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 261.421308] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 261.421313] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 261.421318] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 261.421324] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 261.421330] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 261.421559] protocol 88fb is buggy, dev hsr_slave_0 [ 261.479022] protocol 88fb is buggy, dev hsr_slave_1 08:26:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x3, 0x200000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000100)={0x2, 0x2, 'client1\x00', 0xffffffff80000000, "4e9d7b6107a3a324", "d14bccf9c457b9449caf6b8d84a1cc9a9316ec0c44314893e24bbd1cedbea2f3", 0x3d, 0x4}) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="2e0000001800810de00f80ecdb4cb9250a60022c000cd300e8bd6efb120009000e0014a00300000006000500fe80", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 08:26:29 executing program 3: r0 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)='user_id', 0xfffffffffffffffa) r1 = getuid() r2 = getgid() keyctl$chown(0x4, r0, r1, r2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f0000002880), 0x1000) open(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) read$FUSE(r3, &(0x7f0000001480), 0x1000) read$FUSE(r3, 0x0, 0xffdd) write$FUSE_ENTRY(r3, &(0x7f0000000280)={0x90, 0x0, 0x2, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c0f}}}, 0x90) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000340)=0x9, &(0x7f0000000380)=0x2) 08:26:29 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) write$binfmt_elf32(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffffb, 0x101, 0x2, 0xfffffffffffffffe, 0x0, 0x7, 0x1000, 0x278, 0x38, 0x191, 0x6, 0x0, 0x20, 0x2, 0x8, 0x8, 0x3f}, [{0x5, 0x2, 0xe53c, 0x6, 0xbd, 0x6, 0x4, 0x4}], "5381dbe4b81bb3717c4b686e62cb9d8f1697812783dc0ea90a7420529e5bca12fc31c17a2d6610d720afc42b438afe96d0a1dd69e4a00bb22ea9e9c2", [[], [], [], [], []]}, 0x594) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:29 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:29 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180)=0x5, 0x297) r1 = msgget$private(0x0, 0x3ff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpid() fcntl$getownex(r0, 0x10, &(0x7f0000000500)={0x0, 0x0}) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000540)={{0x3, r2, r3, r4, r5, 0x13, 0x7fff}, 0xf3, 0x800, 0x9, 0x7ff, 0x4, 0x3, r6, r7}) r8 = syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0x0, 0x2) ioctl$BLKREPORTZONE(r8, 0xc0101282, &(0x7f0000000940)=ANY=[@ANYBLOB="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"]) r9 = syz_open_dev$sndpcmc(&(0x7f0000000800)='/dev/snd/pcmC#D#c\x00', 0x6, 0x1) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000880)={0xffffffffffffffff}, 0x3, {0xa, 0x4e20, 0x2, @rand_addr="fc4a6f08c42bd9433c5345cb29a557d4", 0x10000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r9, &(0x7f0000000900)={0x11, 0x10, 0xfa00, {&(0x7f0000000840), r10}}, 0x18) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r11 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r12 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, &(0x7f0000000600)="5c9a2b4a4e5f8f5b57a21a8ee61dcaf0b36cabc3bd2d99dfcf928fd8cc7ff3c37f89f76232ef665e7cd5ad0354c88e43f1b4f3940e183d6bcdebacca43962a7e0f9f15db0983d60f8ac8a7927800971098cf968461c3628c0456a5beb4a157e0ba0c5936995d863fd451582e3c30d27347873f41a0bb301518b8a3b7f81e6788ceef892524833a61022fac5899b1c50c9a185e3c93356c72fa77c1bb2ccc2881936a4131c5649b", 0xa7) r13 = dup2(r0, r11) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in=@empty}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000ac0)=0xe8) write$cgroup_type(r13, &(0x7f0000000080)='threaded\x00', 0xffeb) getpeername$inet(r13, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) [ 263.951411] FAULT_INJECTION: forcing a failure. [ 263.951411] name failslab, interval 1, probability 0, space 0, times 0 [ 263.962965] CPU: 0 PID: 13699 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 263.970088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.979451] Call Trace: [ 263.982058] dump_stack+0x138/0x19c [ 263.985701] should_fail.cold+0x10f/0x159 [ 263.989858] ? ebitmap_cpy+0xcd/0x270 [ 263.993669] should_failslab+0xdb/0x130 [ 263.997659] kmem_cache_alloc+0x47/0x780 [ 264.001731] ? __might_fault+0x110/0x1d0 [ 264.005808] ebitmap_cpy+0xcd/0x270 [ 264.009444] ? hashtab_search+0x196/0x230 [ 264.013611] mls_compute_sid+0x22f/0xd60 [ 264.017688] ? mls_convert_context+0x6a0/0x6a0 [ 264.022285] security_compute_sid.part.0+0xa8f/0x10f0 [ 264.028269] ? get_pid_task+0x98/0x140 [ 264.032172] ? security_compute_validatetrans.part.0+0x470/0x470 [ 264.038325] ? lock_downgrade+0x6e0/0x6e0 [ 264.042485] ? find_held_lock+0x35/0x130 [ 264.042500] security_transition_sid+0xd6/0x130 08:26:29 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x17}, 0x9}, @in6={0xa, 0x4e22, 0x100, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, @in6={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1000}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @local}], 0x74) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000380)={0x0, 0x4}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x220200, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 264.042515] selinux_socket_create+0x36d/0x4d0 [ 264.042527] ? selinux_msg_queue_alloc_security+0x2a0/0x2a0 [ 264.042543] security_socket_create+0x83/0xc0 [ 264.066023] __sock_create+0x67/0x620 [ 264.069842] SyS_socket+0xd3/0x170 [ 264.073397] ? move_addr_to_kernel+0x60/0x60 [ 264.077807] ? do_syscall_64+0x53/0x640 [ 264.081791] ? move_addr_to_kernel+0x60/0x60 [ 264.086206] do_syscall_64+0x1e8/0x640 [ 264.090101] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.094948] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.100127] RIP: 0033:0x45be17 [ 264.103326] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 264.111028] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 264.118286] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 264.125544] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 264.132861] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 264.140157] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresgid(0x0, 0x0, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$KVM_SET_TSS_ADDR(r2, 0xae47, 0x0) connect$vsock_dgram(r1, &(0x7f0000000640)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cp}s\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000080)) timer_create(0x5, &(0x7f0000044000)={0x0, 0x12, 0x1, @thr={0x0, 0x0}}, &(0x7f00000002c0)) r4 = gettid() syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @random="188d3ea1dabc", [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev, @mcast2, {[], @icmpv6=@pkt_toobig={0x3, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000016c0)={{}, {0x0, 0x989680}}, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000300)) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0x71, [], 0x4, &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000140)=""/113}, &(0x7f0000000240)=0x78) tkill(r4, 0x15) 08:26:30 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000002c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="ceb4030000000000000006e64513767db6acb2489b0db003415263fe53e7d6156f91d389f203d7b715bb479846834a89d911fe7f17b0216d9569a94eb1ac83df400cab90dbf7f669a3fc82d4a0acf6875b4acd41a616ab84b0ba66beeb23d03ddc4ed4e187ddbeccc75180619ba3d1feb35e653a83a0d72abdb0f85ec2c84e7798eba3e4e350dd5148e4cc9329b10f3cddb0cbaf441ff4e3d8c62de584c81ed28d91108cc1e3d522599df8b981d5e0ef"]) 08:26:30 executing program 3: r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000280)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca505") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), r3, 0x0, 0x1, 0x4}}, 0x20) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, 0x0) socket$inet6(0xa, 0x2, 0x0) syz_open_dev$loop(0x0, 0x2, 0x6) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vfio/vfio\x00', 0x4200, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f00000004c0)=0x0) sendmsg$nl_generic(r1, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000e00)={0x50c, 0x3b, 0x200, 0x70bd2c, 0x25dfdbff, {0x16}, [@generic="2a4d0d17f9675483fb511eac5bfdf4cb1198a35da817b913817a838f2b8aaa5921f57982542f3f040c514840a05c5784676032aa0fd2361bad49c5825ff15629fbf4671a585135d45be476b92fe56ab6f5d4c831e3cb5ec8173e39ff576d6fd7ae0543", @nested={0x24c, 0x1, [@generic="90599ea9b3197b9197affe937dc727fd647dc23eda0d4bea88de28de5938753ba064604b39520df647f0763169c6a8cb21a26c10c3ce121032e563d37ec6be10acdbb275e34bcf1617740949deecbf1f13ccaa02cc41bb29dbc365ca40d730f4d512f48be9b4d9cd0fbf614ab0f39fcccc484e0905358cec1a7b32", @generic="7d16", @generic="970d4b039bd81bb65d451ab2885dc8524643ec077332c8b9b8e575f689747d62dab39576939bd6bbbc115df5d863ee9aaa9a53f5d6cf5994c93a2765b52a9bffc9aee6411f478f78adf3d1e21fc5f7e647511f47bf362432034097cbb86e3d06043504230a3f447c9d7a2d61b99c59e50445a543d3eaae3b2efc947a649bbe4ebdcaa39d447fbe9a32e7fe0bbf292971f74b01244a11299f580665724d329c9219287b6fef412412aba2a7a00669b9849fb429713d618b7930e9029faeb1a9365ae2e2878d4dd45785dcb95aa6", @generic="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"]}, @nested={0xc, 0x25, [@typed={0x8, 0x45, @pid=r7}]}, @nested={0x1c4, 0x7c, [@generic="aae5e9807a489331a882e68a5628dec79efc6aace576392d1c2fcbb54f11468d663080336692138d31dd108297762c82e5a000771fd4671dda6ed5e8df4a3fe78d67d77d4ec54fb783d33dde5f492784298451f16dc788fca1cc42746b753be41a2caf4d286814d53a2e305777a0094616666f8c66edcfa1987e733ea992c1064e49f7a7f93faf8e451f588cdc56c48c567a3563e623dd48c1bc8662ae813e1a6c", @typed={0x8, 0x81, @fd=r2}, @typed={0x4, 0x50}, @generic="0ce8403b84b6c58b2a64a363d4f2146bdf7e42a7c646aba50bcdd41d791d580ee85b820c0b86a9275f15716f4fb3d1b5670ae573e33c465ab77427b2b1d54701e8c486e5f74b6d3b7a00af0ce909a7fa8a2c2415d2831af745dadfddc86cdeb62b9cf5814666401c12871ac2ba7a98a762d6bf3c65bad9aae9d7b1a9d73eaf0c3ef92f34bf4dc69a74077f", @typed={0x8, 0x7b, @u32=0x3}, @typed={0x8, 0x68, @u32=0x1}, @generic="055273d084a4e066", @generic="a68341a2cd47e4f084eb5b1ec1447c4cad1200aeb549eb97a9e3af8260c8941ba41e2ae37b34c31e4a14c74604177ee9e57fd52739dcf328ddf703bb80b46d74d0ee8e2bc8830a6eb37072d737c6c1278ab9f92ac03a5d91914ef46acf19477ddc855ae11c10d7562cc4c3b011524c"]}, @generic="ed64d062c8829d5d99f03558746a647f94e10d6bf09f1510a9872c1c267d4a4d49920fd2e50622e632a1ebc586ce0f49c9d978f8d98ffcdd81fe770003f7d64613f2297da5895a9893d57b9e05bf7d1faf9b2b1d8a8bcb6f25d079ec7db39610713eb03f82", @typed={0x14, 0x2f, @str='md5summime_type\x00'}]}, 0x50c}, 0x1, 0x0, 0x0, 0x4800}, 0x80) fchdir(r6) umount2(&(0x7f0000000400)='./file0\x00', 0x4) add_key$user(0x0, &(0x7f0000000480)={'syz', 0x1}, &(0x7f0000000640)="18624f31552ff375354db705081c1f07e94a8dbe67aac6ed7b2a18ba3fa39f94746b3bc844ac81f81ff02dec1aea167a1fdd5a426729bb6cdd331e7a5204fb1a3df6f1930e2c13f02f19a0036625c3b830b5a47a33955c47ba77ef7f01f26fd89033a59484802d9c3ff404fe181774771467ac32e2aac1dce74c1a789416a28bf47355d05a66caa74d6848", 0x8b, 0xfffffffffffffffb) r8 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000003c0)="84de2d", 0x3, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r8) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="c5e2800f55f262097fb4614b7eaf30ec337412d626ee7daf9138ab1a1d7970b5e1804db3a38c6e29", 0x28, 0xfffffffffffffff8) 08:26:30 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180)=0x5, 0x297) r1 = msgget$private(0x0, 0x3ff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpid() fcntl$getownex(r0, 0x10, &(0x7f0000000500)={0x0, 0x0}) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000540)={{0x3, r2, r3, r4, r5, 0x13, 0x7fff}, 0xf3, 0x800, 0x9, 0x7ff, 0x4, 0x3, r6, r7}) r8 = syz_open_dev$ndb(&(0x7f00000006c0)='/dev/nbd#\x00', 0x0, 0x2) ioctl$BLKREPORTZONE(r8, 0xc0101282, &(0x7f0000000940)=ANY=[@ANYBLOB="060000000000000003000000000000000700ff010001000000000008046200000000000000000000000000000000000000206f878342b6c3c9fa74aaa5fa0000000000000000000000000000000000000500000000000000920000000000000009000000000000009fbe011f000000000000000000000000000000000000000000000000000000000000000000000000090000000000000003000000000000000500000000ff00009856c0230000000000000000000000000000000000000000000000000000000000000000000000002afeac2c86e0d466c0395a84393a6b8f57712e0d41183b2a2af70d5e94becab50a862251071c22184b756d3bbcf574bbf2488c19af63a140251becc7fd26648d11bcbee0baa5b576f250edf54ec9c3b48762f61131c636d36e82011829224bfc6835f34b951eb05824ef682f3702248082490059d2a0adf6aa5d056d46e3944f8a10ffc040475cd2c8a000ce60dd21fb260aedd53958"]) r9 = syz_open_dev$sndpcmc(&(0x7f0000000800)='/dev/snd/pcmC#D#c\x00', 0x6, 0x1) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f00000008c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000880)={0xffffffffffffffff}, 0x3, {0xa, 0x4e20, 0x2, @rand_addr="fc4a6f08c42bd9433c5345cb29a557d4", 0x10000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r9, &(0x7f0000000900)={0x11, 0x10, 0xfa00, {&(0x7f0000000840), r10}}, 0x18) sendto$inet(r0, 0x0, 0x0, 0x20000801, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r11 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r12 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/policy\x00', 0x0, 0x0) setsockopt$ALG_SET_KEY(r12, 0x117, 0x1, &(0x7f0000000600)="5c9a2b4a4e5f8f5b57a21a8ee61dcaf0b36cabc3bd2d99dfcf928fd8cc7ff3c37f89f76232ef665e7cd5ad0354c88e43f1b4f3940e183d6bcdebacca43962a7e0f9f15db0983d60f8ac8a7927800971098cf968461c3628c0456a5beb4a157e0ba0c5936995d863fd451582e3c30d27347873f41a0bb301518b8a3b7f81e6788ceef892524833a61022fac5899b1c50c9a185e3c93356c72fa77c1bb2ccc2881936a4131c5649b", 0xa7) r13 = dup2(r0, r11) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000000700)={{{@in=@local, @in=@empty}}, {{@in=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000ac0)=0xe8) write$cgroup_type(r13, &(0x7f0000000080)='threaded\x00', 0xffeb) getpeername$inet(r13, &(0x7f00000000c0)={0x2, 0x0, @empty}, &(0x7f0000000140)=0x10) 08:26:30 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x400000004e22, 0x0, @local}, 0x1c) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x34, &(0x7f00000000c0)="793a97886a05bfe3e599220bb15974fd8a0860c8db60ab138e0b1cb317e1b9c675bab1ac121e9d4f809d48e6b9957b525d94ed96954ca811772554b4f78f53d4df3d1cd8e3320bf64cd3871c370aad5b77fe39a5c64a35b7fd7cc7a5aaa810a2b6311cf839378e486095aa44d2a415fecec5de0faf916ed8", 0x78) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0xc, &(0x7f0000000080)=0x20000005, 0x4) [ 264.332996] FAULT_INJECTION: forcing a failure. [ 264.332996] name failslab, interval 1, probability 0, space 0, times 0 08:26:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) shutdown(r0, 0x0) r1 = dup(0xffffffffffffffff) set_tid_address(&(0x7f0000000140)) write$selinux_access(r1, &(0x7f00000001c0)=ANY=[], 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000006c0)={0xa, 0x0, 0x0, 0xede1}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000700)=ANY=[@ANYBLOB="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"/585], 0x1) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = memfd_create(&(0x7f0000000240)='\xfaIhFlK\x99F\x17Fr>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\x7f\f\x00\x00\x00k\xf1y\xed(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001500)={{{@in=@dev, @in6=@empty}}, {{@in=@dev}}}, &(0x7f0000000480)=0xe8) open$dir(&(0x7f0000000080)='./file0\x00', 0x62840, 0x128) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002fc0), 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x20000, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x311b00, 0x4) fallocate(r2, 0x11, 0x0, 0x100000001) getsockname(r0, &(0x7f00000003c0)=@tipc=@id, &(0x7f0000000680)=0x80) [ 264.386277] CPU: 0 PID: 13729 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 264.388029] ntfs: (device loop2): parse_options(): Unrecognized mount option δ. [ 264.393423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.393430] Call Trace: [ 264.393452] dump_stack+0x138/0x19c [ 264.393472] should_fail.cold+0x10f/0x159 [ 264.393491] should_failslab+0xdb/0x130 [ 264.393508] kmem_cache_alloc+0x2d7/0x780 [ 264.393522] ? security_transition_sid+0xa4/0x130 [ 264.393541] ? sock_destroy_inode+0x60/0x60 [ 264.393554] sock_alloc_inode+0x1d/0x260 [ 264.393567] alloc_inode+0x64/0x180 [ 264.393580] new_inode_pseudo+0x19/0xf0 [ 264.393603] sock_alloc+0x41/0x280 [ 264.393624] __sock_create+0x8f/0x620 [ 264.429047] SyS_socket+0xd3/0x170 [ 264.442276] ? move_addr_to_kernel+0x60/0x60 [ 264.442289] ? do_syscall_64+0x53/0x640 [ 264.442302] ? move_addr_to_kernel+0x60/0x60 [ 264.442315] do_syscall_64+0x1e8/0x640 [ 264.442326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.442342] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.442353] RIP: 0033:0x45be17 [ 264.491065] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 264.491079] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 264.491084] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 264.491090] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 264.491096] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 264.491102] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x35, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 08:26:30 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x3b2, 0xfffffffffffffffe) [ 264.492326] socket: no more sockets 08:26:30 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x5, 0x800) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000300)={&(0x7f00000002c0)=[0x8001, 0xece8, 0xe, 0x6], 0x4, 0x8000, 0xf97f, 0x81, 0x4, 0x7, {0x81, 0x0, 0x2, 0x81, 0x9, 0x5, 0x96, 0x7ff, 0x9, 0xcdb, 0x8, 0x1ff, 0x1, 0x3, "55acdf67460e16859f556a2926d401a07169a5e03fc3867f21adc364dfe0a992"}}) r1 = syz_open_dev$dmmidi(&(0x7f0000000500)='/dev/dmmidi#\x00', 0x0, 0x40800) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0xfffffffffffffefa, 0x4000004, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000140)=ANY=[@ANYBLOB="160b0f0bf6d6c9"]) 08:26:30 executing program 5 (fault-call:5 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:30 executing program 0: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') syz_open_procfs$namespace(r0, &(0x7f0000000100)='ns/net\x00') socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0xa400) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80400, 0x0) r3 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x3e, &(0x7f00000003c0)=0x5, 0x4) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000000c0)={0x906a, 0x3f}) [ 264.677134] FAULT_INJECTION: forcing a failure. [ 264.677134] name failslab, interval 1, probability 0, space 0, times 0 [ 264.729978] CPU: 1 PID: 13764 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 264.737140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.746493] Call Trace: [ 264.746516] dump_stack+0x138/0x19c [ 264.746535] should_fail.cold+0x10f/0x159 [ 264.746551] should_failslab+0xdb/0x130 [ 264.746567] kmem_cache_alloc_trace+0x2e9/0x790 [ 264.746579] ? kmem_cache_alloc+0x611/0x780 [ 264.746592] ? security_transition_sid+0xa4/0x130 [ 264.746612] ? sock_destroy_inode+0x60/0x60 [ 264.746626] sock_alloc_inode+0x63/0x260 [ 264.746637] alloc_inode+0x64/0x180 [ 264.746650] new_inode_pseudo+0x19/0xf0 [ 264.746663] sock_alloc+0x41/0x280 [ 264.746678] __sock_create+0x8f/0x620 [ 264.746696] SyS_socket+0xd3/0x170 [ 264.746713] ? move_addr_to_kernel+0x60/0x60 [ 264.746726] ? do_syscall_64+0x53/0x640 [ 264.746747] ? move_addr_to_kernel+0x60/0x60 [ 264.752956] do_syscall_64+0x1e8/0x640 [ 264.752966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.752982] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.752991] RIP: 0033:0x45be17 [ 264.752997] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 264.753010] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 264.753016] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 264.753021] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 264.753027] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 264.753033] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 264.772190] socket: no more sockets [ 264.797185] ntfs: (device loop2): parse_options(): Unrecognized mount option   . 08:26:33 executing program 4: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x400004e20, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000300)=0x9, 0xfffffe85) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x57, &(0x7f00000002c0)=[{&(0x7f0000001840), 0x1fff8}], 0x1}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0x4, @empty, 0x3}}, [0x7, 0xb0c0, 0x8, 0x10000, 0xbe81, 0x7, 0xffffffffffffffb9, 0x101, 0xff, 0x4, 0x7fffffff, 0x5, 0x5, 0x20, 0x1]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000200)={r1, 0x8}, &(0x7f0000000240)=0x8) 08:26:33 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x3b2, 0xfffffffffffffffe) 08:26:33 executing program 3: openat$random(0xffffffffffffff9c, &(0x7f0000000780)='/dev/urandom\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xffff}}}}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r1, 0x4, 0x0, 0x8, 0x6}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000200)={r2, 0x84}, 0x8) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x400000000007) r3 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x9) getresuid(0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$ax25(r0, 0x0, &(0x7f0000000280)) mlockall(0x4) getsockname$packet(r0, &(0x7f0000002040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002080)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000020c0)={{{@in6=@ipv4, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f00000021c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000002200)={'veth0_to_bridge\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000002240)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000022c0)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f00000023c0)=0xe8) sendmsg$inet(r4, &(0x7f0000002540)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000002c0)="0f5503dc9c3d63eff2eddef642abbd1df1b9fef652c30377f0a2bdd62111cb03c9d7fa418ef9da7e40da3884d2f097d256ccf625663410e0c9eacd14075d451f6d2fd90d73ee26682e3bcd08d3a95da8b0b71e6a54c63c429033b659963dcd68c99c66a23ff8d8a3b83d4d438ccf005de5c03f07b0cecbb2cb6ec69ad61a3c109381dbd30f0a459ac1319d0a924be3dd51afdf28496454a99e61afe68340daf5404f63764e79ba4228d4a0ba0a87a0049b24ebe5f435262249d2c19999da43b49f5b12b7f1", 0xc5}, {&(0x7f00000003c0)="bd417f043a075d4eb9403d337f7a44ab4e1f9fbb51b201e10ec2a7a1bafc46e8075e8d7816e99cfc449fbf0bd64838eeb0318952d240a22972b3a2b5a7e166c18a0ed7f551e246aca62b66db33c801269f043f2a9e4311ab81c11bc679f0209d6825fa314186915fe4d642eae0a30984056df65e011c3de165659edb2b881b43", 0x80}, {&(0x7f0000000440)="53e216a70ff9e528b39c70cba866a63bd1ffa9ef719bda35c4f4ae5ed0170bd2bb19135d7d04f5b9f12d0b67fd74322acaf722df729b96ffc267bb50b4971aef3fe8aa1a306fa045bd106e9186de9de13094b8e2a4b6e024c89c1e16d1345b016b6d86c9594a5b7499947898502d95a13256ad93b659cb2310da685188aaea79a7165da72a1b6bebca7871ebe26f272fae70d2fb41c8543f46347c24a39a194c3b8c2d044740329d50d75844b326a7", 0xaf}, {&(0x7f0000000500)="d9e2f39f45a371469d73496acd7eb683863049f23e0d5b86771c4778fb2c3b3476b80bb6178d970b16d01daedc6c0cacaa2a9a762f533b145e3cff7574c714dfaf9e689be63dd7b25c7c03479719ac4732643049bc7beef3f8a959013189b51434dbb765fdc2c4f0005fbe95459c7d7cbcc6e02a99d08787f7264f72d5e2f3cde4172654ff3647ea0889a7d8acb6fcba8ef5363e91", 0x95}, {&(0x7f00000005c0)="779c1a9e652ef79d2eca885f48adb9ab37d6c0c1aba5b4d9f161935bd54b798fd961a704eab498a93bef93f6b1fdb3916d1b518e7ad92d02560a797799d3d3dfa61a1cf6718550c1526e3aabf73ffbd4be0cad130c32c1fa54b04cf1a87d88aa8826c2044a00d07b66224597a4a9ecc9919b6d88c66204f535dd7e178b2b97a76cbfbc1c2b671890c63ad0a404f6febe3af7da89f7ff664391c4724cf44a0d1250c11f3c4e98bebeae8c395c1ed00e385a46435d02ecdefd7babe2075bf1141feb4a2c35d0eaebecea5cd7e4eb7222d059ba3468d926db985be082e3ccd8f68cf227ffc3d5703bc18e6848a245604a78a8958f746d0723", 0xf7}, {&(0x7f00000006c0)="fcfc97e917ebf48c8f15cf0ab819f8705a9bdd6de7ee12bb1fcf4eb9100d453ec36e87fb4a2a77e03d66fc7da45ec862fd6d91993f28eea979b3d6a6cdab06b8f389afa2", 0x44}], 0x6, &(0x7f0000002400)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@ra={0x94, 0x6, 0x7}, @rr={0x7, 0x7, 0x5, [@dev={0xac, 0x14, 0x14, 0x1d}]}, @end, @cipso={0x86, 0x1d, 0xe00, [{0x0, 0xf, "f43dc77adcf8662d157119a7c1"}, {0x0, 0x8, "5645c06da00b"}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @local, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @local, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @initdev={0xac, 0x1e, 0x0, 0x0}, @empty}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @loopback, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @rand_addr=0xe0, @empty}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x140}, 0x20004094) 08:26:33 executing program 5 (fault-call:5 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:33 executing program 0: sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, 0x0}, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB]) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0xc0c0583b, 0x20000001) 08:26:33 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000300)={0x5000, 0x14000, 0x8d, 0x8, 0x448a}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x381, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000280)=0x1) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000002c0)={0x1f, 0x9, 0x2, 0x7, 0x6, 0x5, 0x3, 0x5, 0x40, 0x2000000000, 0x6225a6be, 0x40}) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="38ab48069c3ed229842142f73021c3c8a3b2333d287fc5337b876c9487ff23bc39fb345fd2119c342c8350c1ebe550d10c0ffab3eff719406de968c2a4f7830210c7c9579347357c35d66eb884597d74a22bcdecb7c9e5b08fe6b235b6a38e2cfe431f17ee99d2265f3976a876143102676576ab982a515df2a26037c6d216074a5a05196448a5"]) [ 267.323179] FAULT_INJECTION: forcing a failure. [ 267.323179] name failslab, interval 1, probability 0, space 0, times 0 [ 267.351983] CPU: 0 PID: 13788 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 267.359150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.368517] Call Trace: [ 267.371121] dump_stack+0x138/0x19c [ 267.374757] should_fail.cold+0x10f/0x159 [ 267.378908] should_failslab+0xdb/0x130 [ 267.382881] kmem_cache_alloc+0x2d7/0x780 [ 267.387034] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 267.392487] selinux_inode_alloc_security+0xb6/0x2a0 [ 267.397598] security_inode_alloc+0x94/0xd0 [ 267.401923] inode_init_always+0x552/0xaf0 [ 267.406157] alloc_inode+0x81/0x180 [ 267.409783] new_inode_pseudo+0x19/0xf0 [ 267.413761] sock_alloc+0x41/0x280 [ 267.417299] __sock_create+0x8f/0x620 [ 267.421107] SyS_socket+0xd3/0x170 [ 267.424647] ? move_addr_to_kernel+0x60/0x60 [ 267.429052] ? do_syscall_64+0x53/0x640 [ 267.433022] ? move_addr_to_kernel+0x60/0x60 [ 267.437429] do_syscall_64+0x1e8/0x640 [ 267.441315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.446165] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.451352] RIP: 0033:0x45be17 [ 267.454532] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 267.462238] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 08:26:33 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x3b2, 0xfffffffffffffffe) 08:26:33 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e21, @multicast1}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="b58c9387e7e0502ae627f8378b2d79d84c4de7ae10dd77ba0a7984c4ecf0944e085b96a72c90e19e68e1916ef46d93ec06cade62f9c6927fd386fc889e0838e3159077f22a06f44afd3e5b915f61a1eded65994ebae13845040dd3b3fe8d37aae7fe03cd3f369a406d5ba85fc7380360502cdb2091ef94cc9f905dfb3d771c030c60d97e4a2fd0b3ed77cee9919099227bba7502bf70b62000a9cbdc1832fd3689f6e5aff3531c87350ff7c48fce9f04fb5be040aec6cb2b"]) [ 267.469507] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 267.476776] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 267.484052] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 267.491323] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:33 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getsockopt$inet_mreqn(r0, 0x10c, 0x0, 0x0, 0x0) 08:26:33 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffffaf9, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:33 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x3b2, 0xfffffffffffffffe) 08:26:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') ioctl$sock_bt_bnep_BNEPGETCONNLIST(r0, 0x800442d2, &(0x7f0000000140)={0x7, &(0x7f0000000040)=[{0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @random}]}) r1 = gettid() r2 = getpgrp(r1) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/fscreate\x00', 0x2, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000001c0)={0x3, 0x7ff}) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000200)={0x1f, 0x8, 0x735, 0x200}, 0x8) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000240)=0x1f, 0x4) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/215, 0xd7) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000400)={0x3, &(0x7f00000003c0)=[{0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000004c0)={r3, &(0x7f0000000440)=""/70}) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, &(0x7f0000000500)={0x0, @default, @bpq0='bpq0\x00', 0x0, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x39, 0x0, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) arch_prctl$ARCH_GET_CPUID(0x1011) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000580)='/proc/capi/capi20\x00', 0x40402, 0x0) sendmsg$alg(r4, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000005c0)="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", 0x1000}, {&(0x7f00000015c0)="4a958823a2a708076edd", 0xa}], 0x2, &(0x7f0000001640)=[@assoc={0x18, 0x117, 0x4, 0x1000}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x36}], 0x48, 0x80}, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000001700)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001780)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000001880)=0xe8) r6 = getgid() write$FUSE_ATTR(r0, &(0x7f00000018c0)={0x78, 0x0, 0x8, {0xffff, 0x1000, 0x0, {0x3, 0x5, 0x80, 0x800, 0xfffffffffffffd5b, 0x4, 0x4, 0xfffffffffffffff9, 0x80000000, 0x7, 0x401, r5, r6, 0x8, 0xfffffffffffffffb}}}, 0x78) membarrier(0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)='trusted.overlay.upper\x00', &(0x7f00000019c0)={0x0, 0xfb, 0x71, 0x2, 0x3f, "101c19c9012d0b51c5809624b967a021", "46a8100900991b994c7291421dae98b03296095108c3c55343588c37854e491ca787e808183b6884ff1f5c14e79664b4a084ac53c437c1142d7d0b6844310da8a8f20d49473911e54d5a675fa0e71d563789070a4f7e18061f4c9b98"}, 0x71, 0x3) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000001a40)) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000001a80)=""/35) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000001b00)={{{@in=@loopback, @in6=@dev}}, {{@in6}, 0x0, @in=@initdev}}, &(0x7f0000001c00)=0xe8) setxattr$trusted_overlay_origin(&(0x7f0000001c40)='./file1\x00', &(0x7f0000001c80)='trusted.overlay.origin\x00', &(0x7f0000001cc0)='y\x00', 0x2, 0x3) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000001d00)={0x9, 0x0, 0x1, 0x5, 0x12, 0x5, 0x20, 0xe1, 0x80, 0x8001}) openat(r4, &(0x7f0000001d40)='./file0\x00', 0x40000, 0x8) tgkill(r1, r2, 0x2e) ioctl$EVIOCGNAME(r7, 0x80404506, &(0x7f0000001d80)=""/94) [ 267.664738] socket: no more sockets [ 267.670156] protocol 88fb is buggy, dev hsr_slave_0 08:26:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r3 = socket(0x1a, 0x80005, 0x3) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000100)='rose0\x00') recvfrom$ax25(r3, &(0x7f00000000c0)=""/64, 0x40, 0x20, &(0x7f00000001c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x48) keyctl$setperm(0x5, r2, 0x2004) setxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'user.', '\x00'}, &(0x7f00000002c0)='vmnet0securityselinux\x00', 0x16, 0x1) setresgid(0x0, 0xee00, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r2) 08:26:34 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000001800)='/dev/uinput\x00', 0x802, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/btrfs-control\x00', 0x1, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc0, &(0x7f0000001700)=""/138, &(0x7f00000017c0)=0x8a) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0x1f8000000000, 0x4, &(0x7f0000001540)=[{&(0x7f0000000340)="8b0727ab11e052bd4a7480011a28db0fba45ff2c83b7e70c410f00f543e41c74c0cd8003e2a4bec43e595842b4ea121e648ac4c6c8e2629a804a03e51206b6444746043360707c3404ac685b658f7e9a0b3dfb477a7d5f1bfcd193c55e9a", 0x5e, 0x6}, {&(0x7f00000004c0)="34319d23abdfe94234081632e52e18661d95eff4f55e3e545e3c2fecee185ac8ed903b0a703af80ee713", 0x2a, 0xffffffffffffffc1}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="c97de7bca8fa9c1f", 0x8, 0x9}], 0x10000, &(0x7f00000015c0)={[{@show_sys_files_yes='show_sys_files=yes'}, {@dmask={'dmask', 0x3d, 0x4}}, {@umask={'umask', 0x3d, 0x2}}], [{@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@pcr={'pcr', 0x3d, 0x1}}, {@subj_role={'subj_role', 0x3d, '\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selinux\'GPL'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@obj_user={'obj_user', 0x3d, 'syz'}}, {@smackfsroot={'smackfsroot'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001a40)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000001a80)={0x13, 0x10, 0xfa00, {&(0x7f0000001840), r3, 0x3}}, 0x18) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f0000000280)) 08:26:34 executing program 1: add_key(0x0, 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x72, 0xfffffffffffffffe) 08:26:34 executing program 5 (fault-call:5 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:34 executing program 0: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffc, 0x80) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000180)={{0xffffffffffffffff, 0x1, 0x9, 0x3, 0x3e0000}, 0x1d3a, 0x2, 'id1\x00', 'timer1\x00', 0x0, 0xdd, 0x9, 0x9652, 0x9}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000100)) ptrace(0x10, r1) ptrace$peekuser(0x3, r1, 0x0) 08:26:34 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x101000, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000440)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fed000/0x13000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000040)="cc1733adedd8520bf0053392c7292a2ffb57ec16c3b38be47d7634cf7c4b2475eea0cb722585fd4904b9cfeff8050df01b7e627eface3bd44e8d87bf942da4101a683c46550da589399cb999ccd49677359c29256cdf709928d7de7289f84bf23e3b", 0x62, r0}, 0x68) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x800, 0x8, [0x0, 0xd4, 0x6f3, 0x3424, 0x3, 0xa43, 0x0, 0x7]}, &(0x7f00000002c0)=0x18) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$BLKROSET(r1, 0x125d, &(0x7f00000004c0)=0x5) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') socket$inet6_udp(0xa, 0x2, 0x0) keyctl$session_to_parent(0x12) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000006c0)={0x6, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}]}) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) write$P9_RFSYNC(r1, &(0x7f00000003c0)={0x7, 0x33, 0x2}, 0x7) r4 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r4, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r4, &(0x7f0000005fc0), 0x800000000000059, 0x0) 08:26:34 executing program 1: add_key(0x0, 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x72, 0xfffffffffffffffe) [ 268.382261] FAULT_INJECTION: forcing a failure. [ 268.382261] name failslab, interval 1, probability 0, space 0, times 0 [ 268.400150] protocol 88fb is buggy, dev hsr_slave_0 [ 268.405314] protocol 88fb is buggy, dev hsr_slave_1 [ 268.411894] ntfs: (device loop2): parse_options(): Unrecognized mount option audit. [ 268.446559] CPU: 0 PID: 13836 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 268.453718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.463085] Call Trace: [ 268.463621] ntfs: (device loop2): parse_options(): Unrecognized mount option pcr. [ 268.465692] dump_stack+0x138/0x19c [ 268.465711] should_fail.cold+0x10f/0x159 [ 268.481107] should_failslab+0xdb/0x130 [ 268.485108] __kmalloc+0x2f0/0x7a0 [ 268.488663] ? trace_hardirqs_on_caller+0x400/0x590 [ 268.493751] ? sk_prot_alloc+0x171/0x2a0 [ 268.497832] sk_prot_alloc+0x171/0x2a0 [ 268.501734] sk_alloc+0x39/0xd70 [ 268.505220] __netlink_create+0x6a/0x280 [ 268.508951] ntfs: (device loop2): parse_options(): Unrecognized mount option subj_role. [ 268.509314] ? genl_family_attrbuf+0xf0/0xf0 [ 268.521878] netlink_create+0x2ef/0x510 [ 268.525862] ? genl_unbind+0x190/0x190 [ 268.529766] __sock_create+0x2f6/0x620 [ 268.533675] SyS_socket+0xd3/0x170 [ 268.537232] ? move_addr_to_kernel+0x60/0x60 [ 268.541694] ? do_syscall_64+0x53/0x640 [ 268.545685] ? move_addr_to_kernel+0x60/0x60 [ 268.550119] do_syscall_64+0x1e8/0x640 [ 268.554017] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.558875] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.564071] RIP: 0033:0x45be17 [ 268.567271] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 268.574983] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 268.582246] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 268.589505] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 08:26:34 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) write$selinux_context(r1, &(0x7f0000000280)='system_u:object_r:fsadm_exec_t:s0\x00', 0x22) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x624, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = dup(0xffffffffffffffff) sendfile(r1, r2, 0x0, 0x20000102000007) add_key$keyring(0x0, &(0x7f0000000540)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) sendfile(r2, r0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, 0x0, &(0x7f00000005c0)) lseek(0xffffffffffffffff, 0x0, 0x4) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x1, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) ioctl$LOOP_CLR_FD(r1, 0x4c01) close(r1) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x4, 0x4, 0x3, {0xa, 0x4e22, 0xffffffff, @rand_addr="129d2cd24679804f8d898b8c8e9df19b", 0x7}}}, 0x3a) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 08:26:34 executing program 1: add_key(0x0, 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82b8f65a400fc6014bb6e91d935511da2c41a652ac779ce7158e2580ffe2a478ecf6d6ad98156389b85230b5934f2822eb6a191257637419e656", 0x72, 0xfffffffffffffffe) 08:26:34 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x3) unshare(0x400) r1 = signalfd4(r0, &(0x7f00000003c0), 0x8, 0x0) r2 = dup3(r1, r0, 0x80000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') accept4(r0, &(0x7f0000000080)=@hci={0x1f, 0x0}, &(0x7f0000000100)=0x80, 0x80000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000140)={@dev, @loopback, 0x0}, &(0x7f0000000180)=0xc) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0x4, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e21}, @FOU_ATTR_IFINDEX={0x8, 0xb, r5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x80) [ 268.596767] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 268.604035] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00') getdents(r0, &(0x7f0000000140)=""/147, 0x2a) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000000)=0x10001, 0x4) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x100000001, 0x4, 0x100000, 0x400}) 08:26:34 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000040)=0x4) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) write(r0, &(0x7f00000000c0)="240000005a001f00ff03f4f9002304000a04f51108000100080798000800028001000000", 0x32f) 08:26:34 executing program 4: clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) r2 = accept4$x25(r1, &(0x7f0000000080), &(0x7f0000000300)=0x57, 0x80800) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000001c0)=""/253) ptrace(0x10, r0) ptrace$cont(0x420b, r0, 0x8, 0x0) ioctl$FS_IOC_SETVERSION(r2, 0x40087602, &(0x7f0000000180)=0x6) 08:26:34 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 08:26:34 executing program 5 (fault-call:5 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 268.815357] FAULT_INJECTION: forcing a failure. [ 268.815357] name failslab, interval 1, probability 0, space 0, times 0 [ 268.833790] CPU: 0 PID: 13880 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 268.840929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.850297] Call Trace: [ 268.852897] dump_stack+0x138/0x19c [ 268.852919] should_fail.cold+0x10f/0x159 [ 268.862179] should_failslab+0xdb/0x130 [ 268.862193] kmem_cache_alloc_trace+0x2e9/0x790 [ 268.862205] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 268.862221] selinux_sk_alloc_security+0x5a/0x190 [ 268.862234] security_sk_alloc+0x7d/0xb0 [ 268.885222] sk_prot_alloc+0x190/0x2a0 [ 268.889115] sk_alloc+0x39/0xd70 [ 268.892485] __netlink_create+0x6a/0x280 [ 268.896533] ? genl_family_attrbuf+0xf0/0xf0 [ 268.900930] netlink_create+0x2ef/0x510 [ 268.904912] ? genl_unbind+0x190/0x190 [ 268.908789] __sock_create+0x2f6/0x620 [ 268.912685] SyS_socket+0xd3/0x170 [ 268.916232] ? move_addr_to_kernel+0x60/0x60 [ 268.920623] ? do_syscall_64+0x53/0x640 [ 268.924578] ? move_addr_to_kernel+0x60/0x60 [ 268.928978] do_syscall_64+0x1e8/0x640 [ 268.932853] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.937683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.942857] RIP: 0033:0x45be17 [ 268.946032] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 268.953741] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 268.960992] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 268.968763] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 268.976019] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 268.983282] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:35 executing program 0: r0 = epoll_create(0x7) r1 = epoll_create(0x6) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f00000000c0)) socket$rds(0x15, 0x5, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r4 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000dff4)) finit_module(r3, &(0x7f0000000100)='/dev/autofs\x00', 0x2) 08:26:35 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:35 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) 08:26:35 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f0000000000)={{&(0x7f0000a99000/0x4000)=nil, 0x4000}, 0x4000000001ffffd}) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x0, 0x204000) getdents(r1, &(0x7f0000000140)=""/237, 0xed) 08:26:35 executing program 5 (fault-call:5 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 269.218074] FAULT_INJECTION: forcing a failure. [ 269.218074] name failslab, interval 1, probability 0, space 0, times 0 [ 269.229477] CPU: 1 PID: 13899 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 269.236589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.245940] Call Trace: [ 269.245964] dump_stack+0x138/0x19c [ 269.245993] should_fail.cold+0x10f/0x159 [ 269.252202] should_failslab+0xdb/0x130 [ 269.252215] kmem_cache_alloc+0x47/0x780 [ 269.252225] ? SyS_socket+0xd3/0x170 [ 269.252235] ? do_syscall_64+0x1e8/0x640 [ 269.252246] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.252260] ebitmap_cpy+0xcd/0x270 [ 269.252268] ? hashtab_search+0x196/0x230 [ 269.252282] mls_compute_sid+0x22f/0xd60 [ 269.252294] ? mls_convert_context+0x6a0/0x6a0 [ 269.252311] security_compute_sid.part.0+0xa8f/0x10f0 [ 269.252328] ? security_compute_validatetrans.part.0+0x470/0x470 [ 269.294097] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 269.299161] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 269.299176] ? __debug_object_init+0x171/0x8e0 [ 269.299204] security_transition_sid+0xd6/0x130 [ 269.315283] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 269.318860] selinux_socket_post_create+0x559/0x680 [ 269.318881] ? selinux_sb_copy_data+0x390/0x390 [ 269.318894] ? trace_hardirqs_on+0xd/0x10 [ 269.318910] security_socket_post_create+0x8b/0xc0 [ 269.323776] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. [ 269.328157] __sock_create+0x4a1/0x620 [ 269.328175] SyS_socket+0xd3/0x170 [ 269.328187] ? move_addr_to_kernel+0x60/0x60 [ 269.328198] ? do_syscall_64+0x53/0x640 [ 269.328210] ? move_addr_to_kernel+0x60/0x60 [ 269.358990] do_syscall_64+0x1e8/0x640 [ 269.373244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.394716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.394726] RIP: 0033:0x45be17 [ 269.394733] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 08:26:35 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) socket$inet(0x2, 0x800, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000440)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000680)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x200327da) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {&(0x7f0000000200), r3, 0x1ff}}, 0x18) ioctl$VT_DISALLOCATE(r0, 0x5608) 08:26:35 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) [ 269.394745] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 269.394751] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 269.394758] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 269.394764] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 269.394770] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:35 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 08:26:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000100)="b8d5a85a5042296763a011") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') sendmsg(r1, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x18b, 0x200000000000000) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000340)={0x0, 0x0, 0xb9b5}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000380)={r2, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000140)={r3}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000280)={'filter\x00', 0x0, 0x3, 0x67, [], 0x4, &(0x7f00000001c0)=[{}, {}, {}, {}], &(0x7f0000000200)=""/103}, &(0x7f0000000300)=0x78) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000180)={r3, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f00000000c0)={r3, r5}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000000)={r1}) 08:26:35 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:35 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000280)) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="ce34129435d715b97d4825e62c714d7dd681fc847609e6dbb48ad0ac82d1b9a50715cdef70b6505b8887e0403a079d7bb84a8682465dec38ef90f5e20ae63f4cffb3d18dcf7a9400dca2131130638a132a635a90cdeda3f4da9d579244cc2fa861234e4c63aed4228095be0b1ab8a34a0ef627fd2269688c90c50e1503e7879953752a0c1c0125eabbfef3f72dc8807f4192ea4609bf4208bfda781e975e3691195591c7"]) 08:26:35 executing program 5 (fault-call:5 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:35 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 269.687292] FAULT_INJECTION: forcing a failure. [ 269.687292] name failslab, interval 1, probability 0, space 0, times 0 [ 269.698737] CPU: 1 PID: 13943 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 269.705855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.715216] Call Trace: [ 269.717827] dump_stack+0x138/0x19c [ 269.721473] should_fail.cold+0x10f/0x159 [ 269.721486] ? ebitmap_cpy+0xcd/0x270 [ 269.721504] should_failslab+0xdb/0x130 [ 269.721518] kmem_cache_alloc+0x47/0x780 [ 269.721530] ? SyS_socket+0xd3/0x170 [ 269.721543] ? do_syscall_64+0x1e8/0x640 [ 269.721558] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.729515] ebitmap_cpy+0xcd/0x270 [ 269.729524] ? hashtab_search+0x196/0x230 [ 269.729539] mls_compute_sid+0x22f/0xd60 [ 269.729552] ? mls_convert_context+0x6a0/0x6a0 [ 269.729569] security_compute_sid.part.0+0xa8f/0x10f0 [ 269.729585] ? security_compute_validatetrans.part.0+0x470/0x470 [ 269.758473] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 269.772287] ? __debug_object_init+0x171/0x8e0 [ 269.772314] security_transition_sid+0xd6/0x130 [ 269.772330] selinux_socket_post_create+0x559/0x680 [ 269.772343] ? selinux_sb_copy_data+0x390/0x390 [ 269.772357] ? trace_hardirqs_on+0xd/0x10 [ 269.806635] security_socket_post_create+0x8b/0xc0 [ 269.811581] __sock_create+0x4a1/0x620 [ 269.815484] SyS_socket+0xd3/0x170 [ 269.819040] ? move_addr_to_kernel+0x60/0x60 [ 269.823455] ? do_syscall_64+0x53/0x640 [ 269.827440] ? move_addr_to_kernel+0x60/0x60 [ 269.831855] do_syscall_64+0x1e8/0x640 [ 269.835750] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.840639] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.845845] RIP: 0033:0x45be17 [ 269.849046] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 269.856782] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 269.856789] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 269.856794] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 269.856800] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 08:26:35 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:35 executing program 0: r0 = socket(0x800000000000010, 0x1000008000000802, 0x0) write(r0, &(0x7f0000000040)="220000002100070700be000009000701020000030000000000200003050013800100", 0x22) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:crond_var_run_t:s0\x00', 0x25, 0x2) 08:26:35 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 08:26:35 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000000)={0x4, 0x7, [0xe82, 0x3, 0x8, 0x9, 0xaf0], 0x2}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff42c, 0x200}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 269.856805] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 269.857012] protocol 88fb is buggy, dev hsr_slave_0 [ 269.899118] protocol 88fb is buggy, dev hsr_slave_1 [ 269.924215] audit: type=1400 audit(1560587195.864:95): avc: denied { relabelto } for pid=13956 comm="syz-executor.0" name="NETLINK" dev="sockfs" ino=46957 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:crond_var_run_t:s0 tclass=netlink_route_socket permissive=1 08:26:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000040), 0x8) write$smack_current(r2, &(0x7f0000000080)='/dev/kvm\x00', 0x9) write$P9_RREADDIR(r0, &(0x7f0000000140)={0x49, 0x29, 0x1, {0x7, [{{0x8, 0x2, 0x7}, 0x1, 0x6, 0x7, './file0'}, {{0x3c, 0x1, 0x3}, 0x7ff, 0x7, 0x7, './file0'}]}}, 0x49) 08:26:36 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae544416c8d6c8d70ab9b986bd7a31ecff0dabdd67779c62cab8b64c82", 0x39, 0xfffffffffffffffe) 08:26:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x40, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f00000002c0)={0x5, 0x1ff, [{0x9, 0x0, 0x9}, {0x8, 0x0, 0x6}, {0x401, 0x0, 0x5}, {0x7fff00000000000, 0x0, 0x345}, {0x5, 0x0, 0x180000000}]}) r2 = accept(r0, &(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000000)=0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f00000001c0)=0xed6, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) r3 = socket$rds(0x15, 0x5, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000340)=""/107) msgget(0x1, 0xfffffffffff) ioctl$FIGETBSZ(r3, 0x2, &(0x7f00000003c0)) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454cc6060507000700000000000000000000000d0000007b0300000000000040000002e7477bdce6f020acaf499ccc553a00040000040000001ea684f6003f0000ff0349eb01be97bb1f2d95807b169efbb7c3da9f199b33678c7c2df05753"], 0x49) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 08:26:36 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x10104, 0x0) syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x3, 0x40000) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r4 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) ioctl$CAPI_INSTALLED(r4, 0x80024322) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x8) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000001ac0)=""/86) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:26:36 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) getsockopt$sock_buf(r0, 0x1, 0x3d, &(0x7f0000000280)=""/141, &(0x7f0000000340)=0x8d) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) fallocate(r0, 0x10, 0x101, 0x8000) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000380)=ANY=[@ANYBLOB="f2099247"]) 08:26:36 executing program 5 (fault-call:5 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 270.425388] FAULT_INJECTION: forcing a failure. [ 270.425388] name failslab, interval 1, probability 0, space 0, times 0 [ 270.436859] CPU: 0 PID: 13984 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 270.443973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.453334] Call Trace: [ 270.455933] dump_stack+0x138/0x19c [ 270.459576] should_fail.cold+0x10f/0x159 [ 270.463738] ? ebitmap_cpy+0xcd/0x270 [ 270.467556] should_failslab+0xdb/0x130 [ 270.471548] kmem_cache_alloc+0x47/0x780 [ 270.475619] ? SyS_socket+0xd3/0x170 [ 270.479333] ? do_syscall_64+0x1e8/0x640 [ 270.483395] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.488767] ebitmap_cpy+0xcd/0x270 [ 270.492393] ? hashtab_search+0x196/0x230 [ 270.496552] mls_compute_sid+0x22f/0xd60 [ 270.496877] protocol 88fb is buggy, dev hsr_slave_0 [ 270.500625] ? mls_convert_context+0x6a0/0x6a0 [ 270.500643] security_compute_sid.part.0+0xa8f/0x10f0 [ 270.500661] ? security_compute_validatetrans.part.0+0x470/0x470 [ 270.500678] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 270.500690] ? __debug_object_init+0x171/0x8e0 [ 270.500709] security_transition_sid+0xd6/0x130 [ 270.500724] selinux_socket_post_create+0x559/0x680 [ 270.500736] ? selinux_sb_copy_data+0x390/0x390 [ 270.505843] protocol 88fb is buggy, dev hsr_slave_1 [ 270.510353] ? trace_hardirqs_on+0xd/0x10 [ 270.510369] security_socket_post_create+0x8b/0xc0 [ 270.510384] __sock_create+0x4a1/0x620 [ 270.510397] SyS_socket+0xd3/0x170 [ 270.510409] ? move_addr_to_kernel+0x60/0x60 [ 270.510418] ? do_syscall_64+0x53/0x640 [ 270.510429] ? move_addr_to_kernel+0x60/0x60 [ 270.510443] do_syscall_64+0x1e8/0x640 [ 270.575597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.575616] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.593906] RIP: 0033:0x45be17 [ 270.593913] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 270.593925] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 270.593932] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 08:26:36 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 270.593937] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 270.593943] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 270.593952] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:36 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) [ 270.739241] ntfs: (device loop2): parse_options(): Unrecognized mount option G. 08:26:36 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080), 0x0, 0xfffffffffffffffe) 08:26:36 executing program 5 (fault-call:5 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x1, 0x0) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x70, 0x8, 0x1, 0x5a74, 0x1, 0x0, 0x80000000, 0x40, 0xf, 0x1, 0x4, 0x16c5, 0x7ff, 0x0, 0x9, 0x10000, 0x3, 0x2, 0x8001, 0xa2, 0x8, 0x10001, 0xffffffff, 0x3, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x7fffffff, 0x6, 0x81, 0xfffffffffffffffa, 0x3, 0x80000000010000, 0x40, 0x8, 0x0, 0x579, 0x2, @perf_config_ext={0x100000000, 0x4}, 0x0, 0x6, 0x7fff, 0x1, 0x0, 0x10000, 0x400}, 0xffffffffffffff9c, 0x2, r0, 0x0) fdatasync(r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000}, 0x0, 0x0, r1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) sendto$ax25(r2, &(0x7f0000000140)="5b812c0f4fccc4be212f97ddfd726317e85ffdb43d46390f35be37c3d6ce34641813d0fde84a4b67f407d1ef92d53e9eb009f250a2055f1a66c8ca9b987e413a840d4dd6f7db31660d1b75f0339dd7e0b51120b245197d21d26346dce772d27ae21981b3c1bd7f6f89628c8a7d45bb0f2d1dc1d8d61af92d106ae72fd4599e46c0c36061c0d9db4f2e5702f4e146678114d0d2d5d63092c7ce4a64f4a1ce206c202481478c49509c02fb2e45ffa0684574774627e6b5a0b3859553e46f028f7aaa5316cb6c4797b34ef92219042f7917e7f657d625c3a417", 0xd8, 0x0, &(0x7f0000000240)={{0x3, @null, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f0000000380)={0x8, 0x1, 0xfffffffffffffff7, 0x6, &(0x7f00000002c0)=[{}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x200005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") 08:26:36 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000280)) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="7e602bb600fdd07a19d4a23d7fc2d287f5b56a5b1f00833d79d44ecba69cad6a0cc2a08f9fa4e921c5cd5fe3d22f933d147758f799d2955ed8da6070b38aeaabe0e53385559fa77737a095cc8e953fe88e7655caf1c465b80969e390"]) mount$overlay(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='overlay\x00', 0x2, &(0x7f00000004c0)={[{@metacopy_on='metacopy=on'}, {@nfs_export_off='nfs_export=off'}, {@metacopy_off='metacopy=off'}, {@metacopy_off='metacopy=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@xino_on='xino=on'}, {@index_on='index=on'}], [{@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@pcr={'pcr', 0x3d, 0x34}}, {@subj_user={'subj_user', 0x3d, 'trusted&'}}, {@subj_type={'subj_type', 0x3d, '/,+{wlan0selinux{&self'}}, {@seclabel='seclabel'}]}) 08:26:36 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe5834e1ae", 0x1d, 0xfffffffffffffffe) [ 270.930666] FAULT_INJECTION: forcing a failure. [ 270.930666] name failslab, interval 1, probability 0, space 0, times 0 08:26:36 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0x1) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 271.008182] CPU: 0 PID: 14015 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 271.015339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.024795] Call Trace: [ 271.027398] dump_stack+0x138/0x19c [ 271.031047] should_fail.cold+0x10f/0x159 [ 271.035223] should_failslab+0xdb/0x130 [ 271.039208] kmem_cache_alloc+0x2d7/0x780 [ 271.043370] __d_alloc+0x2d/0x9f0 [ 271.046831] d_alloc_pseudo+0x1e/0x30 [ 271.050638] sock_alloc_file+0xd5/0x2f0 [ 271.054623] ? sock_poll+0x220/0x220 [ 271.058352] sock_map_fd+0x36/0x80 [ 271.061901] SyS_socket+0xf1/0x170 [ 271.065452] ? move_addr_to_kernel+0x60/0x60 [ 271.069865] ? do_syscall_64+0x53/0x640 [ 271.073849] ? move_addr_to_kernel+0x60/0x60 [ 271.078279] do_syscall_64+0x1e8/0x640 [ 271.082173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.087023] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.092220] RIP: 0033:0x45be17 [ 271.095409] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 271.103122] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 271.110397] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 271.110403] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 271.110409] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 271.110414] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 271.110533] protocol 88fb is buggy, dev hsr_slave_0 [ 271.110582] protocol 88fb is buggy, dev hsr_slave_1 08:26:37 executing program 4: r0 = getpgid(0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4}, 0x68) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x7, 0x3, 0x1, 0x8, 0x0, 0x9c, 0x2400, 0x5, 0x1, 0x8001, 0xffffffffffffff01, 0x9, 0x3963, 0x2, 0x7, 0x80, 0x22aa, 0x80, 0x7f, 0x1, 0x101, 0x5, 0x1, 0x1, 0x3, 0x0, 0x450f, 0x200, 0x0, 0x1, 0x5, 0x9, 0x7fffffff, 0x1, 0x81, 0x7, 0x0, 0x2, 0x1, @perf_config_ext={0x100000000, 0x4}, 0x8000, 0x200, 0x80000000, 0x0, 0xb35, 0x81, 0x401}, r0, 0x6, r5, 0x3) prctl$PR_SET_PTRACER(0x59616d61, r0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) 08:26:37 executing program 0: r0 = perf_event_open(&(0x7f0000000680)={0x2, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(0xffffffffffffffff, 0xc0105303, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0x280004, 0x0) openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x40500, 0x80) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x10104, 0x0) syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x101, 0x60000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/btrfs-control\x00', 0x400, 0x0) dup2(r0, r0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) symlinkat(&(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x80000, 0x100) mkdirat(r2, &(0x7f0000000140)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x75, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000500)={0x0, 0x20, 0xc}, 0xffffff08) syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x3, 0x40000) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x2a, 0x23, 0x4, 0x19, 0x6, 0x2, 0x5, 0x3f}}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r2, 0x111, 0x4, 0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e23}, 0x1c) r4 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x957, 0x80000) ioctl$CAPI_INSTALLED(r4, 0x80024322) listen(r3, 0x200000000002) r5 = socket$inet6(0xa, 0x5, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) bind$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000002c0), &(0x7f0000000300)=0x10) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x28080, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x8) syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0xc1b, 0x36e, &(0x7f0000000380), 0x80000, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x0, 0x0) mincore(&(0x7f0000ffa000/0x4000)=nil, 0x4000, &(0x7f0000001ac0)=""/86) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:26:37 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000280)={@multicast1, @multicast1, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000300)={r3, 0x1, 0x6, @random="10a4f8e5a95e"}, 0x10) write$P9_RUNLINKAT(r1, &(0x7f0000000340)={0x7, 0x4d, 0x1}, 0x7) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="38f75e4cd1e96008bdea91300ca52178181427491fe31fb2bb49c424fe7d91bbe6b8fd08ff85f2416d73c9b574e09e36d4335b004b01045ab0ca8da77ea1489f4a6576637de3b9fa09d41d643c6abe91b8750972fd9f51006adc9e6c1bbcd80680ee0112ede3062e06488d63250249cbeb46d605cd53b3d0a45768adf8283f8571e6dec30bd8c23694636c1cf83d2675a26ce8f9af268746d300000000000000"]) 08:26:37 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="01", 0x1, 0xfffffffffffffffe) 08:26:37 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c46000000008830000000aab40003003e000039a59498ffc101760000000000000000000000000000ba5936955852c083000020380003000000"], 0x3c) r1 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) sendfile(r0, r0, &(0x7f0000000080), 0x1002000000faa) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 08:26:37 executing program 5 (fault-call:5 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:37 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="01", 0x1, 0xfffffffffffffffe) [ 271.404852] FAULT_INJECTION: forcing a failure. [ 271.404852] name failslab, interval 1, probability 0, space 0, times 0 [ 271.493718] ntfs: (device loop2): parse_options(): Unrecognized mount option 8^L`0 !x'II$}Amsɵt63[. [ 271.586160] CPU: 1 PID: 14049 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 271.593303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.602670] Call Trace: [ 271.605283] dump_stack+0x138/0x19c [ 271.608936] should_fail.cold+0x10f/0x159 [ 271.613114] should_failslab+0xdb/0x130 [ 271.617117] kmem_cache_alloc+0x2d7/0x780 [ 271.621271] ? lock_downgrade+0x6e0/0x6e0 [ 271.621287] get_empty_filp+0x8c/0x3b0 [ 271.621300] alloc_file+0x23/0x440 [ 271.621315] sock_alloc_file+0x11c/0x2f0 [ 271.621326] ? sock_poll+0x220/0x220 [ 271.621342] sock_map_fd+0x36/0x80 [ 271.621353] SyS_socket+0xf1/0x170 [ 271.621365] ? move_addr_to_kernel+0x60/0x60 [ 271.621374] ? do_syscall_64+0x53/0x640 [ 271.621386] ? move_addr_to_kernel+0x60/0x60 [ 271.621398] do_syscall_64+0x1e8/0x640 [ 271.621407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.621423] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.621431] RIP: 0033:0x45be17 [ 271.621437] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 08:26:37 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="ce6f5bafee3ded3c0cf0ba12ad304f17aec554382ddcd991799c44d91d032c4d3eb691e9d66aeeb6c80de61f90ca68690cacb96f02f29118dcf1764ca7d705fe21bd9aad1db166e62e502b4c6398bc6d4705e7626b0367c72450b47e8f8c61d2d1ab3d05b4"]) [ 271.629477] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 [ 271.629484] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 271.629490] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 271.629496] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 271.629502] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:37 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="01", 0x1, 0xfffffffffffffffe) 08:26:37 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8c", 0xf, 0xfffffffffffffffe) [ 271.877704] ntfs: (device loop2): parse_options(): Unrecognized mount option o[. [ 271.906026] ntfs: (device loop2): parse_options(): Unrecognized mount option M>j hi ovL!f.P+LcmGbkg$P~aѫ. [ 271.920740] protocol 88fb is buggy, dev hsr_slave_0 [ 271.920780] protocol 88fb is buggy, dev hsr_slave_1 08:26:37 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8c", 0xf, 0xfffffffffffffffe) 08:26:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000200)) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x200000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d66642c7066646ea758", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',noextend,\x00']) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000340)) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x6) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000100)}}], 0x1, 0x0) [ 272.070151] protocol 88fb is buggy, dev hsr_slave_0 08:26:38 executing program 4: r0 = open(&(0x7f0000ba0000)='./file0\x00', 0xfc, 0x0) fcntl$setlease(r0, 0x400, 0x1) socket(0x10, 0x3, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000440)='net/rt_cache\x00') sendfile(r2, r2, 0x0, 0x180000003) 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8c", 0xf, 0xfffffffffffffffe) 08:26:38 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80000000, 0x101000) getpeername$netlink(r0, &(0x7f0000000340), &(0x7f0000000500)=0xc) ioctl$CAPI_GET_SERIAL(r0, 0xc0044308, &(0x7f0000000640)=0x3f) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x7fe, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = syz_open_dev$sndpcmc(&(0x7f00000005c0)='/dev/snd/pcmC#D#c\x00', 0x21a9, 0x40000) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000600)=0x19) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000280)={@empty, @rand_addr, 0x0}, &(0x7f00000002c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'dummy0\x00', r3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='asymmetric\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000500), 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000540)='us\xc1\xbc\xe5\x8d\xce%\x1c\x80\xca\xb2Os\x00'/24, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340), 0xffffffffffffffff) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) syz_mount_image$iso9660(&(0x7f0000000680)='iso9660\x00', &(0x7f00000006c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000800)=[{&(0x7f0000000700)="8c928bf980c67c1522bc8e2d656645e7d5c3e08c58105cd693a2cad40f898c0469e1e4cc27c601e2ce0deda66e148dcea1e0c4b9b5dec8dd99ec8b0cbdaed9d72e27d7f939e4071d0e05bcf0028cbc55c1d502b17f91d52a78a09641f4fd711a06160546eafcf29abb389611e3fe8952932b39b2745a044d322a0e77516fc4dd45adcbf7cadd61509c732d58bea08dd055dcb1e2043df45f3b19a546eb33de7b9deae60e534301ff31c53ec3ef2ec71c0a50c82977c76503ef84229a4727b8fb9aa278ef08c56b4bc98ab3f11676d836c26b2e83f50dca81ab6ddd30ae236b071ca266", 0xe3, 0x10000}], 0x401, &(0x7f0000000840)={[{@sbsector={'sbsector', 0x3d, 0x8}}, {@nojoliet='nojoliet'}, {@norock='norock'}, {@map_off='map=off'}, {@norock='norock'}, {@sbsector={'sbsector', 0x3d, 0x3}}], [{@dont_measure='dont_measure'}, {@subj_user={'subj_user', 0x3d, '(trustedem1,selfwlan1'}}, {@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, 'cgroup'}}, {@subj_type={'subj_type', 0x3d, 'cgroupvboxnet0'}}, {@seclabel='seclabel'}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, 'trusted+em0O-}'}}, {@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'user_u'}}]}) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r4, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000580)=ANY=[@ANYBLOB="72ab491d6964dc5832b8048277dd935ec1691376fe8bebd5a6ddaace95dedc8f0c371e925096a65f66d711aa850631b24b367d2bfa"]) 08:26:38 executing program 5 (fault-call:5 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 272.182631] 9pnet: Insufficient options for proto=fd [ 272.217490] FAULT_INJECTION: forcing a failure. [ 272.217490] name failslab, interval 1, probability 0, space 0, times 0 [ 272.244221] CPU: 1 PID: 14099 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 272.251363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.260731] Call Trace: [ 272.263336] dump_stack+0x138/0x19c [ 272.266981] should_fail.cold+0x10f/0x159 [ 272.271153] should_failslab+0xdb/0x130 [ 272.275149] kmem_cache_alloc+0x2d7/0x780 [ 272.279315] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 272.284781] ? check_preemption_disabled+0x3c/0x250 [ 272.289812] selinux_file_alloc_security+0xb4/0x190 [ 272.294842] security_file_alloc+0x6d/0xa0 [ 272.299099] get_empty_filp+0x130/0x3b0 [ 272.303104] alloc_file+0x23/0x440 [ 272.303119] sock_alloc_file+0x11c/0x2f0 [ 272.303129] ? sock_poll+0x220/0x220 [ 272.303146] sock_map_fd+0x36/0x80 [ 272.303159] SyS_socket+0xf1/0x170 [ 272.303172] ? move_addr_to_kernel+0x60/0x60 [ 272.303182] ? do_syscall_64+0x53/0x640 [ 272.303193] ? move_addr_to_kernel+0x60/0x60 [ 272.303203] do_syscall_64+0x1e8/0x640 [ 272.303213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.303229] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.303238] RIP: 0033:0x45be17 [ 272.303243] RSP: 002b:00007f29fe09c9c8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 272.303255] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 000000000045be17 08:26:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x7, 0x8000) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000300)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000980)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000a80)=0xe8) r6 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000ac0)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000bc0)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0}, &(0x7f0000000c40)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000d80)=0xe8) getresuid(&(0x7f0000000dc0), &(0x7f0000000e00)=0x0, &(0x7f0000000e40)) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x1, 0x7, &(0x7f0000000880)=[{&(0x7f0000000200)="da", 0x1, 0x2}, {&(0x7f0000000440)="6a8d2ff195bb306b39c88ec1ca50669f70ac9e4abc83a3d3c0340581259920c7b3ba64106807de1fd5eaee823a1814c583527f64a25011b3d8d9e9164933ca8899f5e94c7322822ab53d8ca993d2e27c139c59016a5ac7f451cbbe262acafbaa35f4a4eb9b2d5c323c0df967eb974fd41c2d8ab68188022352f960404265b7e195aab70ba53cb390764f62d8c93918c6be90c2bf3f9de338572ad7134928c34fd19e12ef82cfc03e879ec27c4cd273a45d5771ee9a6c4804a835d4d77b0f631d663f00b4a481ceccf211eb10670794d354f7193e9bcb56693354c40a1260b00cf0be", 0xe2, 0x800}, {&(0x7f0000000540)="c1ed5e19a7cc581327f36fa7b4c13e602fefbef9ac794beb9e664a6a6ca240f591a483376a0e06dbd2485965d3003e51bf9aa1e5f792eb7e5b5a17ddf0613ffdacaa838a04881dd4ed93bb3d872c6feb9760938929e898b190ef83a31ea21590bbcee4791f257c7b2375bc69f42f3c39f38a7a836f1bca12a72f566ddb1da0f54f82c700e1b1b947010acf1a74ff4a4ab23bd21d20c7ad87007b4d134f4292726a23c827515f121a50cb816fdbc78a52f21576b185783a2d04c4f9c1f43e7c3997363da62855c035ea0fe770f5960202d1ae6ba480c885caa767754dfdc01f0547f1c773e9a3a610dc2f8fb9593b3d37", 0xf0, 0x100000000}, {&(0x7f0000000240)="ab677bb3bba8b8bb3e541fe8adcdf8f702ebd63c4e358b11dab3ae7b04147ce5972312e09060888ebf48a2e5403c67c16d403810b4e30f76adb2d1db6cf141ddfa3471f4e797d25399c68f46f5cdfc0466639451411f37dd3aca38500d0c2b", 0x5f, 0x9}, {&(0x7f0000000640)="2b46ea059509dbba1f3c9b12857ed78d230d761ec6e4ac556d10dea528a3bdbdfd0343f019f41bb914ce2ad2292e1022211be9a38fb49c15cab008e9efef5fedcc85ca4f97a07247122a508d01ec282ba8bb9eed51c047485f8d734eac24185433e6c5f8f3c521d23c985f8ced12c0fda2636131e7db1cf9acd1176c1aac039069ee68fd3fc0ad523b4c2f69989ff7216048aca8a808945bb2b619e32030a99e1501d724e40e76313485fd8ea0d3de92bc01e301a4f086c0bc7bc7c2295ddb11b1d7e44d580bd275031651e027ba166437039e2265092441f00c423c0c2b21a0f4777e418625d3862fdda8509d", 0xed, 0x16}, {&(0x7f0000000740)="054854d030901eca9c31e1253c547105a921331f74f8c16c92861c1b05e4b10f54c6598687067e27bfcd1fc791ae89d5ea8827b66a447928e10e7c97a529e8abdf9a146ee608c28b6d0dcecc9e73a817d270035d6b45701c5f4b842d185379803824d801aef3aba301b9e7779f170d773dc26cd44adc43db605147be6048670e", 0x80, 0x10001}, {&(0x7f00000007c0)="b64c252b6213989564fab6a132e019f64d42a5c0861d076e3552b79943b9da32698b8310d4fa081aaeac7e3889bee7bbfc902b7789aa5d49a436f97ebe83de4f172af33f8a2af9b1bcabcc6237b8c060dde25f4288ce20909d1c6a8b9fdee7d91cac29cb110c09b0351e1f9bfc964868583f0095ce28f59a19e5da452404584e0166e03ad333814dfd4057bb07cc6dff2743bbd8eacf761a2506cb4286d951cc1a14db63a8caf24bbc87c7c6c016330bcf44cc", 0xb3, 0x8}], 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB='quiet,gid=', @ANYRESHEX=r4, @ANYBLOB=',dir_umask=00000000000000000010000,uid=', @ANYRESHEX=r5, @ANYBLOB=',file_umask=00000000000000000000003,uid<', @ANYRESDEC=r6, @ANYBLOB=',pcr=00000000000000000063,rootcontext=root,uid=', @ANYRESDEC=r7, @ANYBLOB="2cdc9f26cf9ee2dec4b94209780719e5640930f6a2eb1d3c58ab6940efb6041eb2fdc9b1ee343bc8ca03d3eb38d3ff46c20eff885c7cf60a0f728882820c629a176131b47525cdaccf0bf044f6348cca275d09", @ANYRESDEC=r8, @ANYBLOB=',uid=', @ANYRESDEC=r9, @ANYBLOB=',fowner>', @ANYRESDEC=r10, @ANYBLOB=',\x00']) ppoll(&(0x7f00000001c0), 0x2000000000000002, &(0x7f0000000100)={0x0, r3+10000000}, 0x0, 0x0) 08:26:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des3_ede)\x00'}, 0x58) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="de75e1fe7d087634b214a3765ba0017995103a08917fc2a1", 0x18) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f000000d780)={0x0, 0x0, &(0x7f000000d740)={&(0x7f000000cf00)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="000000000000db0000000100000008000100", @ANYRES32=0x0, @ANYBLOB="7c0002003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=0x0, @ANYBLOB="04000200"], 0xa4}}, 0x4008010) sendmmsg$alg(r2, &(0x7f0000005b00)=[{0x0, 0x0, 0x0}], 0x500, 0x0) 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d", 0x16, 0xfffffffffffffffe) 08:26:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x5, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x2) dup3(r0, r0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) 08:26:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket(0x100000000000011, 0x3, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) write$P9_RATTACH(r4, &(0x7f00000000c0)={0x14}, 0x14) ftruncate(r4, 0x87ffd) sendfile(r3, r3, 0x0, 0x7fffffff) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x20000, 0x0) socket$nl_route(0x10, 0x3, 0x0) [ 272.303261] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 272.303267] RBP: 000000000075bf20 R08: 0000000000000009 R09: 0000000000000000 [ 272.303273] R10: 0000000000000064 R11: 0000000000000202 R12: 00007f29fe09ca40 [ 272.303279] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d", 0x16, 0xfffffffffffffffe) 08:26:38 executing program 5 (fault-call:5 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 272.442124] input: syz1 as /devices/virtual/input/input9 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d", 0x16, 0xfffffffffffffffe) 08:26:38 executing program 3: close(0xffffffffffffffff) r0 = socket$rxrpc(0x21, 0x2, 0x400000000000002) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0}]) r2 = getpgrp(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) setpgid(r2, r3) [ 272.559150] input: syz1 as /devices/virtual/input/input10 [ 272.587338] FAULT_INJECTION: forcing a failure. [ 272.587338] name failslab, interval 1, probability 0, space 0, times 0 [ 272.639802] CPU: 1 PID: 14131 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 272.646957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.656317] Call Trace: [ 272.656341] dump_stack+0x138/0x19c [ 272.656359] should_fail.cold+0x10f/0x159 [ 272.656375] should_failslab+0xdb/0x130 [ 272.656390] kmem_cache_alloc_node+0x287/0x780 [ 272.656410] __alloc_skb+0x9c/0x500 [ 272.656424] ? skb_scrub_packet+0x4b0/0x4b0 [ 272.656436] ? netlink_autobind.isra.0+0x1c9/0x290 [ 272.688289] netlink_sendmsg+0x874/0xc60 [ 272.692366] ? netlink_unicast+0x780/0x780 [ 272.696617] ? security_socket_sendmsg+0x89/0xb0 [ 272.701383] ? netlink_unicast+0x780/0x780 [ 272.705624] sock_sendmsg+0xce/0x110 [ 272.709345] ___sys_sendmsg+0x70a/0x840 [ 272.713323] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 272.718073] ? __fget+0x210/0x370 [ 272.721537] ? find_held_lock+0x35/0x130 [ 272.725614] ? __fget+0x210/0x370 [ 272.729076] ? lock_downgrade+0x6e0/0x6e0 [ 272.733231] ? __fget+0x237/0x370 [ 272.733245] ? __fget_light+0x172/0x1f0 [ 272.733255] ? __fdget+0x1b/0x20 [ 272.733267] ? sockfd_lookup_light+0xb4/0x160 [ 272.733277] __sys_sendmsg+0xb9/0x140 [ 272.733286] ? SyS_shutdown+0x170/0x170 [ 272.733296] ? fd_install+0x4d/0x60 [ 272.733315] SyS_sendmsg+0x2d/0x50 [ 272.763454] ? __sys_sendmsg+0x140/0x140 [ 272.767523] do_syscall_64+0x1e8/0x640 [ 272.771414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.776264] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 272.781459] RIP: 0033:0x4130d1 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe58", 0x1a, 0xfffffffffffffffe) [ 272.784652] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 272.792370] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 272.799671] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 272.806942] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 272.814225] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 272.821501] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:38 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d60", 0x17, 0xfffffffffffffffe) 08:26:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = epoll_create1(0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') fstat(r1, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)=0x0) fchown(r0, r2, 0x0) 08:26:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x40000008, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = gettid() clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp(r1, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ptrace(0x4206, r1) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x7, 0x400000) 08:26:38 executing program 5 (fault-call:5 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000040)={0x7fffffff, 0x8, 0x6, 0x500}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_NMI(r3, 0xae9a) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffeaf, 0x0, 0x0, 0xffffffae) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000180)={0x0, 0x11e000}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000140)={0x0, 0x11fff}) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000240)) ioctl$KVM_RUN(r1, 0xae80, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@gcm_128={{0x304}, "f069ffff97d0741a", "d689097afe0126084f4673d196d65b3a", "d813c685", "9d1805074da313fc"}, 0x28) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) sendto$packet(r1, &(0x7f0000000340)="92f87d9faed3696dccbc389bdfc14a84474382e559df6df4e480b6dca8542766f83b8a93a20f2a57be93fafc03f22c2643997c71a29da0e4e5099e17d4d760a89382965169e3c3c535e4b95a52a4ea5c8e4d6fbeee70b38947c706f8d158079ce8e22c311a01e9402192a7022a68c3db831606a00694b9e754c8955dd5a294a751b59f9ff00627398fb8b66d2b76de528bef91c493dca965d2087e04db03", 0x9e, 0x20000000, &(0x7f0000000100)={0x11, 0xfe, r4, 0x1, 0x7ff, 0x6, @broadcast}, 0x14) 08:26:38 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d60", 0x17, 0xfffffffffffffffe) 08:26:39 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x3, 0x0, 0x0, 0x9, 0x8}, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000380)={r2, 0x200}, 0x8) r3 = socket$inet(0x2, 0x800, 0xffffffff) r4 = socket$inet6(0xa, 0x400000000001, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) fadvise64(r5, 0x0, 0x5, 0x4) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000340)={0x1, r1}) r6 = open(0x0, 0x40000, 0x10) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r7 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000640)=ANY=[@ANYBLOB="de245f70257e4f4531010a3f1dd7076ea25ca5a990c56600941c65ba96140313a9154b1ac8545a16712d532f24749ef7bb57e46306034f0d720439476d28f7e796052895e1a7b70b1dfa2399bebd15b7179a954108736f55624be72b3e39a57dd708c8f97c10596d7d0e5cbdda0d4182024e2f445c66a25acc", @ANYRES16=r7, @ANYBLOB="240625d0002000e0ff8b000000d1ccdb86be25b2af4ef50beb6c3e4d3b80dbf41d9f51d308d06a15cf36cfc8b114345363e3ffd3f00c0b43376d607994c8996647562b6542f290f91db887d49c4a61bcb0898e85e399996ca48a62d4a8fc37dcd79a624224dbff4f05805154180cc4ddb2b44e085570dfaa960014279c39c3bf42ba580567257c99de1598bb93de206f6278c3f3e3f62b1c95ebfa2fe8"], 0x14}, 0x1, 0x0, 0x0, 0x8084}, 0x4000800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in, @in=@dev}}, {{}, 0x0, @in=@dev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getpeername$packet(r1, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000005f00)={'gretap0\x00'}) r8 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r8, 0x200004) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000000)) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) sendfile(r4, r8, 0x0, 0x80001d00c0d0) [ 273.008429] FAULT_INJECTION: forcing a failure. [ 273.008429] name failslab, interval 1, probability 0, space 0, times 0 [ 273.082972] CPU: 1 PID: 14160 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 273.090136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.099503] Call Trace: [ 273.102113] dump_stack+0x138/0x19c [ 273.105755] should_fail.cold+0x10f/0x159 [ 273.109911] should_failslab+0xdb/0x130 [ 273.113891] kmem_cache_alloc_node_trace+0x280/0x770 [ 273.118998] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 273.124458] __kmalloc_node_track_caller+0x3d/0x80 [ 273.129394] __kmalloc_reserve.isra.0+0x40/0xe0 [ 273.134068] __alloc_skb+0xcf/0x500 [ 273.137717] ? skb_scrub_packet+0x4b0/0x4b0 [ 273.142042] ? netlink_autobind.isra.0+0x1c9/0x290 [ 273.146975] netlink_sendmsg+0x874/0xc60 [ 273.151043] ? netlink_unicast+0x780/0x780 [ 273.155283] ? security_socket_sendmsg+0x89/0xb0 [ 273.160040] ? netlink_unicast+0x780/0x780 [ 273.164280] sock_sendmsg+0xce/0x110 [ 273.168007] ___sys_sendmsg+0x70a/0x840 [ 273.171987] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 273.176748] ? __fget+0x210/0x370 [ 273.180201] ? find_held_lock+0x35/0x130 [ 273.184265] ? __fget+0x210/0x370 [ 273.187727] ? lock_downgrade+0x6e0/0x6e0 [ 273.191886] ? __fget+0x237/0x370 [ 273.195433] ? __fget_light+0x172/0x1f0 [ 273.199408] ? __fdget+0x1b/0x20 [ 273.202778] ? sockfd_lookup_light+0xb4/0x160 [ 273.207273] __sys_sendmsg+0xb9/0x140 [ 273.211079] ? SyS_shutdown+0x170/0x170 [ 273.215059] ? fd_install+0x4d/0x60 [ 273.218698] SyS_sendmsg+0x2d/0x50 [ 273.222234] ? __sys_sendmsg+0x140/0x140 [ 273.226296] do_syscall_64+0x1e8/0x640 [ 273.230184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.235032] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.240226] RIP: 0033:0x4130d1 [ 273.243414] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 273.251125] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 273.258396] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 273.265678] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 273.272954] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 08:26:39 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r1 = signalfd(r0, &(0x7f0000000000)={0x5}, 0x192) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x9, 0x5, 0x20, 0x7ff, 0x9, 0x4, 0x1, {0x0, @in6={{0xa, 0x4e24, 0x100000001, @local, 0x101}}, 0xb12, 0x1000, 0x1ff, 0x9, 0x8}}, &(0x7f0000000180)=0xb0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r3, 0x300000000000000, 0x2b094ea1}, 0xc) ppoll(&(0x7f0000000040)=[{r1}, {r2, 0x4108}], 0x2, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCRSCLRRT(r0, 0x89e4) [ 273.280246] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 273.287853] protocol 88fb is buggy, dev hsr_slave_0 08:26:39 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d60", 0x17, 0xfffffffffffffffe) 08:26:39 executing program 0: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000080), 0x1) write$P9_RSYMLINK(r2, &(0x7f0000000100)={0x14, 0x11, 0x2, {0x78, 0x2, 0x6}}, 0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) ioctl$GIO_SCRNMAP(r2, 0x4b40, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = fcntl$dupfd(r0, 0x406, r3) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x97) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000440)=@fragment, 0x8) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) memfd_create(&(0x7f0000000600)='\x00', 0xffffffffffffffff) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x32, r2, 0x0) ftruncate(r5, 0x7fff) sendfile(r2, r5, 0x0, 0x8040fffffffd) setsockopt$IP_VS_SO_SET_DEL(r4, 0x0, 0x484, &(0x7f00000001c0)={0xbf, @local, 0x4e22, 0x1, 'lblc\x00', 0x24, 0x40, 0x57}, 0x2c) 08:26:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file0\x00', 0x8, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000002c0)={'bond0\x00', {0x2, 0x4e21, @broadcast}}) r4 = eventfd2(0x0, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000080)={r4}) dup3(r2, r3, 0x0) r5 = socket(0xa, 0x1, 0x0) r6 = fcntl$getown(r5, 0x9) syz_open_procfs(r6, &(0x7f0000000280)='net/rfcomm\x00') setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r5, 0x1, 0x2c, &(0x7f0000000200), 0x4) r7 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0xaa24, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r7, 0x4) [ 273.467772] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 273.488335] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 273.533247] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:26:39 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000005c0)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0x29f, 0x20000000, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000180)=ANY=[@ANYBLOB="0c90cb2233c57a9a477edbebb56eaafcd2367fee0e22b1655c75369bba0aa080f7ce534baa2fd82d013a581c3c69d6b56059cfc0446d149efb3abb139f1b1852cd4307bfcdf10e4e55b1d3d165b93ad6e9b703b218a923c90f57e6cab12773c6b7477f52cda7d47a823c49"]) 08:26:39 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041fe", 0x19, 0xfffffffffffffffe) 08:26:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x4, 0x12, 0xf98, 0x200000007}) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r2 = syz_open_dev$admmidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='dctcp\x00', 0x6) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fstatfs(0xffffffffffffffff, 0x0) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000400)) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xdc0000}, 0x100) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f00000005c0)) 08:26:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={0x0, &(0x7f00000001c0)=""/57, 0x0, 0x39}, 0x20) r0 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffd, 0x80) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000000)={0x100000000, 0x100, 0x1}) openat$cgroup_subtree(0xffffffffffffff9c, &(0x7f0000000880)='cgroup.subtree_control\x00', 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000a00)='/dev/dsp#\x00', 0xffffffff80000000, 0x101000) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000bc0)={0x0, 0x80000, 0xffffffffffffff9c}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/mixer\x00', 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000dc0)=[0x0, 0x0, 0x0]) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x40000000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev, @multicast1}, &(0x7f0000000080)=0xc) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000000c0)=r3) preadv(r2, &(0x7f00000017c0), 0x1aa, 0x200000000000000) 08:26:39 executing program 5 (fault-call:5 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x420, [0x0, 0x200002c0, 0x200004d0, 0x20000610], 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]}, 0x498) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r2, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x800000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x2, 0x2, 0x6}, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x8}}, 0x10) readv(r0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/59, 0x3b}], 0x1) 08:26:39 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 273.736723] FAULT_INJECTION: forcing a failure. [ 273.736723] name failslab, interval 1, probability 0, space 0, times 0 [ 273.838714] CPU: 1 PID: 14221 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 273.845873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.855242] Call Trace: [ 273.857850] dump_stack+0x138/0x19c [ 273.861497] should_fail.cold+0x10f/0x159 [ 273.865658] should_failslab+0xdb/0x130 [ 273.869632] kmem_cache_alloc+0x47/0x780 [ 273.873693] ? find_held_lock+0x35/0x130 [ 273.877766] ? netlink_lookup+0xb5/0x160 [ 273.881843] skb_clone+0x129/0x320 [ 273.885393] __netlink_deliver_tap+0x55e/0x7d0 [ 273.889987] netlink_unicast+0x663/0x780 [ 273.894054] ? netlink_attachskb+0x6a0/0x6a0 [ 273.898467] ? security_netlink_send+0x81/0xb0 [ 273.903063] netlink_sendmsg+0x7c4/0xc60 [ 273.907149] ? netlink_unicast+0x780/0x780 [ 273.911400] ? security_socket_sendmsg+0x89/0xb0 [ 273.916167] ? netlink_unicast+0x780/0x780 [ 273.920411] sock_sendmsg+0xce/0x110 [ 273.924131] ___sys_sendmsg+0x70a/0x840 [ 273.928116] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 273.932874] ? __fget+0x210/0x370 [ 273.936333] ? find_held_lock+0x35/0x130 [ 273.940399] ? __fget+0x210/0x370 [ 273.943859] ? lock_downgrade+0x6e0/0x6e0 [ 273.948020] ? __fget+0x237/0x370 [ 273.951483] ? __fget_light+0x172/0x1f0 [ 273.955467] ? __fdget+0x1b/0x20 [ 273.958852] ? sockfd_lookup_light+0xb4/0x160 [ 273.963357] __sys_sendmsg+0xb9/0x140 [ 273.967638] ? SyS_shutdown+0x170/0x170 [ 273.971617] ? fd_install+0x4d/0x60 [ 273.975260] SyS_sendmsg+0x2d/0x50 [ 273.978804] ? __sys_sendmsg+0x140/0x140 [ 273.982868] do_syscall_64+0x1e8/0x640 08:26:39 executing program 3: r0 = socket$packet(0x11, 0x5, 0x300) ioctl$SIOCRSSCAUSE(0xffffffffffffffff, 0x89e1, &(0x7f0000000100)=0xffffffffffff0000) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x3) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x7ff, 0x0) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000080)=@caif=@dgm={0x25, 0x8}, 0x80, 0x0}}], 0x8000337, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000000)) [ 273.986755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 273.991607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 273.996801] RIP: 0033:0x4130d1 [ 273.999986] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 274.007692] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 274.014965] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 274.022236] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 274.022245] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 08:26:39 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x3, 0x1f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000002c0)=@nat={'nat\x00', 0x19, 0x1, 0x1e0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x258) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) 08:26:39 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d60", 0x17, 0xfffffffffffffffe) 08:26:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-cast6-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x10080, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000000c0)={0x7, 0x70, 0x130, 0x401, 0x8, 0x1ff, 0x0, 0x3, 0x100, 0x4, 0x401, 0x9, 0x8001, 0x800, 0x0, 0x7fffffff, 0xffffffffffffff97, 0x8, 0x6, 0x0, 0x1, 0x5, 0x971, 0xfffffffffffffffd, 0x1, 0xad, 0x7fff, 0x21, 0x9, 0x9, 0x2, 0x1, 0x2, 0x0, 0x80000001, 0x6, 0x4, 0x47a, 0x0, 0x3, 0x3, @perf_config_ext={0xfffffffffffffffc, 0x3}, 0x20, 0xfff, 0x101, 0xd, 0x8001, 0x59, 0x7f}) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696c653120766a6f786e65743104de112ba8d2fabfb1de060cdc16436afe72ba4b4a3d6e3170707031"], 0x20) readv(r2, &(0x7f00000007c0)=[{&(0x7f0000001d80)=""/4096, 0xf280}], 0x1) prctl$PR_GET_SECUREBITS(0x1b) 08:26:39 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x240003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 274.022250] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:40 executing program 5 (fault-call:5 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:40 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d60", 0x17, 0xfffffffffffffffe) [ 274.214443] FAULT_INJECTION: forcing a failure. [ 274.214443] name failslab, interval 1, probability 0, space 0, times 0 [ 274.225929] CPU: 0 PID: 14267 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 274.233041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.242391] Call Trace: [ 274.244999] dump_stack+0x138/0x19c [ 274.248644] should_fail.cold+0x10f/0x159 [ 274.252810] should_failslab+0xdb/0x130 [ 274.256785] kmem_cache_alloc+0x47/0x780 [ 274.260855] ? lock_acquire+0x16f/0x430 [ 274.264840] ? check_preemption_disabled+0x3c/0x250 [ 274.269871] skb_clone+0x129/0x320 [ 274.273478] dev_queue_xmit_nit+0x296/0x8c0 [ 274.277815] dev_hard_start_xmit+0xa7/0x8b0 [ 274.282146] ? assoc_array_gc+0x1180/0x11d0 [ 274.286466] __dev_queue_xmit+0x1d95/0x25e0 [ 274.290793] ? netdev_pick_tx+0x300/0x300 [ 274.294942] ? skb_clone+0x129/0x320 [ 274.298668] ? memcpy+0x46/0x50 [ 274.301976] ? __copy_skb_header+0x2b8/0x3e0 [ 274.306390] ? __skb_clone+0x271/0x800 [ 274.310291] dev_queue_xmit+0x18/0x20 [ 274.314097] ? dev_queue_xmit+0x18/0x20 [ 274.318087] __netlink_deliver_tap+0x503/0x7d0 [ 274.322680] netlink_unicast+0x663/0x780 [ 274.326753] ? netlink_attachskb+0x6a0/0x6a0 [ 274.331172] ? security_netlink_send+0x81/0xb0 [ 274.335762] netlink_sendmsg+0x7c4/0xc60 [ 274.335782] ? netlink_unicast+0x780/0x780 [ 274.335798] ? security_socket_sendmsg+0x89/0xb0 [ 274.335808] ? netlink_unicast+0x780/0x780 [ 274.335821] sock_sendmsg+0xce/0x110 [ 274.335833] ___sys_sendmsg+0x70a/0x840 [ 274.344120] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 274.365517] ? __fget+0x210/0x370 [ 274.368976] ? find_held_lock+0x35/0x130 [ 274.373039] ? __fget+0x210/0x370 [ 274.376505] ? lock_downgrade+0x6e0/0x6e0 [ 274.380659] ? __fget+0x237/0x370 [ 274.380674] ? __fget_light+0x172/0x1f0 [ 274.380685] ? __fdget+0x1b/0x20 [ 274.380698] ? sockfd_lookup_light+0xb4/0x160 [ 274.388108] __sys_sendmsg+0xb9/0x140 [ 274.399737] ? SyS_shutdown+0x170/0x170 [ 274.403722] ? fd_install+0x4d/0x60 [ 274.407363] SyS_sendmsg+0x2d/0x50 [ 274.410908] ? __sys_sendmsg+0x140/0x140 [ 274.414967] do_syscall_64+0x1e8/0x640 [ 274.418836] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 274.423676] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.428860] RIP: 0033:0x4130d1 [ 274.432028] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 274.439719] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 274.446968] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 274.454241] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 08:26:40 executing program 4: ppoll(&(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000280)={0x3f}, 0x8) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x2000, 0x0) fcntl$setstatus(r0, 0x4, 0x800) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x100, 0x0) write$binfmt_misc(r1, &(0x7f00000000c0)={'syz0', "e8f870e6fcc6894bccd178ac02a82a808bd5a573ddef7d1cbad46cc5b27e1b9e134af50986ad4a5c64798583f6927b44a93097ea03af"}, 0x3a) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000140)=0x14) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f0000000180)={0x0, 0x0, {0x10001, 0x6, 0x3006, 0x7, 0x0, 0x7, 0x3, 0x1}}) 08:26:40 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d60", 0x17, 0xfffffffffffffffe) 08:26:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffc7}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a00000000f48d000000000000000000001700"/128], 0x80}}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x7c74, 0x400000) getpeername$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x1c) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="0209fc09020000002bad7000feffffff"], 0x10}}, 0x0) 08:26:40 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000002c0)) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000280)={0x2, 0x3, 0xffffffffffff1652, 0x7, 0x7}) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="64042fc89b3cda11086fd5d2c8d2376bdb3b66739c552f"]) 08:26:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$sock_TIOCINQ(r0, 0x541b, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0xff42) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000080)) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f00000000c0)="26000000130047f1eb14c1f8000322ff001000e313000000010000680000000006000300054b", 0x26) [ 274.461492] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 274.468762] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 274.539865] K: renamed from caif0 08:26:40 executing program 1 (fault-call:0 fault-nth:0): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 274.603722] FAULT_INJECTION: forcing a failure. [ 274.603722] name failslab, interval 1, probability 0, space 0, times 0 [ 274.608606] ntfs: (device loop2): parse_options(): Unrecognized mount option d/ț<o7k;fsU/. [ 274.618414] CPU: 1 PID: 14297 Comm: syz-executor.1 Not tainted 4.14.125 #19 [ 274.631791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.641148] Call Trace: [ 274.643740] dump_stack+0x138/0x19c [ 274.647370] should_fail.cold+0x10f/0x159 [ 274.651520] should_failslab+0xdb/0x130 [ 274.655490] kmem_cache_alloc_node_trace+0x280/0x770 [ 274.660591] ? __check_object_size+0x12a/0x2ab [ 274.665166] ? __mutex_unlock_slowpath+0x71/0x800 [ 274.670006] __kmalloc_node+0x3d/0x80 [ 274.673839] kvmalloc_node+0x4e/0xe0 [ 274.677548] SyS_add_key+0x274/0x350 [ 274.681257] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 274.686961] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 274.692664] do_syscall_64+0x1e8/0x640 [ 274.696555] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:26:40 executing program 5 (fault-call:5 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:40 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000002c0)={0x10001, 0xffffffffffffff80, 0x0, 0x0, 0x7, 0xfffffffffffff2fd, 0x0, 0x1, 0xfffffffffffffffe}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 274.701395] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 274.706577] RIP: 0033:0x4592c9 [ 274.709752] RSP: 002b:00007f8e42396c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 274.717451] RAX: ffffffffffffffda RBX: 00007f8e42396c90 RCX: 00000000004592c9 [ 274.724710] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000020000000 [ 274.731972] RBP: 000000000075bf20 R08: fffffffffffffffe R09: 0000000000000000 [ 274.739237] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f8e423976d4 [ 274.746518] R13: 00000000004bf288 R14: 00000000004d06c8 R15: 0000000000000003 08:26:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r0, &(0x7f0000000100)="523ee65512e895c40baace23eb3d71e2204564f8509dffcdefb1a3a151f926327e96469790bdaa9af2bc828c9e732c64c475f324e814f5a0c9a358f0f500ab40bbacd8aac0857a513fbbb7a3b5354746fab992363f996b09b9565a97abc984fd31cd8655f8c793f11fd09eec8f58e87122477cebe339c8fa8366b97220905380ab85b3dd16", &(0x7f00000001c0)=""/252}, 0x18) syz_emit_ethernet(0x45, &(0x7f0000000080)=ANY=[@ANYBLOB="0b80c20000000180c200000086dd60d8652b00140000fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0100000000000000"], 0x0) 08:26:40 executing program 1 (fault-call:0 fault-nth:1): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:40 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x1000000040000000) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @ioapic={0x10d000, 0xffffffffffffffff, 0x0, 0x0, 0x0, [{0x7f, 0x800, 0x3, [], 0x6}, {0x8, 0x7, 0x4b67, [], 0x8a}, {0x200, 0x2, 0x0, [], 0x95e}, {0xff, 0xff, 0x6, [], 0x100000000}, {0x0, 0x2, 0x100000001, [], 0x6}, {0x7, 0x2, 0x5, [], 0x540aca3d}, {0x8, 0x40, 0x2, [], 0x1}, {0xf06, 0x33ef, 0xfff, [], 0x8}, {0xffffffffffffff9a, 0xaa, 0xa68, [], 0x7ff}, {0xf000000000000000, 0x2, 0x5}, {0x2, 0x1, 0x1, [], 0x7}, {0x800, 0xcc, 0xa205, [], 0x9}, {0x40, 0xf5, 0x20, [], 0x800}, {0x2414, 0x401, 0x3, [], 0x7ff}, {0x20c8, 0x3aad, 0x7f, [], 0x1ff}, {0x7, 0x0, 0x0, [], 0xffffffff80000000}, {0x2, 0xff, 0x1ff, [], 0x2}, {0x6, 0x4, 0x5, [], 0x6}, {0x3, 0x4, 0x8, [], 0x68e0}, {0x5, 0xe2b7, 0xfff, [], 0x8001}, {0x2, 0x8, 0xa0f, [], 0x6}, {0x0, 0x100000000, 0xb6d7}, {0x7fffffff, 0xd5, 0x40, [], 0x5}, {0x5, 0x0, 0x0, [], 0x7}]}}) [ 274.878942] FAULT_INJECTION: forcing a failure. [ 274.878942] name failslab, interval 1, probability 0, space 0, times 0 [ 274.901614] FAULT_INJECTION: forcing a failure. [ 274.901614] name failslab, interval 1, probability 0, space 0, times 0 [ 274.919329] CPU: 1 PID: 14309 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 274.926473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.936352] Call Trace: [ 274.938956] dump_stack+0x138/0x19c [ 274.942607] should_fail.cold+0x10f/0x159 [ 274.946769] should_failslab+0xdb/0x130 [ 274.950752] kmem_cache_alloc_node+0x287/0x780 [ 274.955333] ? idr_get_next+0x111/0x170 [ 274.959351] ? idr_alloc_cmn+0x210/0x210 [ 274.963439] __alloc_skb+0x9c/0x500 [ 274.963450] ? skb_scrub_packet+0x4b0/0x4b0 [ 274.963465] ctrl_build_family_msg+0x3e/0xa0 [ 274.963476] ctrl_getfamily+0x1e0/0x400 [ 274.963489] genl_family_rcv_msg+0x614/0xc30 [ 274.963504] ? genl_rcv+0x40/0x40 [ 274.963513] ? __dev_queue_xmit+0xd33/0x25e0 [ 274.963525] ? trace_hardirqs_on+0xd/0x10 [ 274.963536] ? __local_bh_enable_ip+0x99/0x1a0 [ 274.963577] genl_rcv_msg+0xb4/0x150 [ 274.995810] ntfs: (device loop2): parse_options(): Unrecognized mount option /dev/autofs. [ 274.996669] netlink_rcv_skb+0x14f/0x3c0 [ 274.996682] ? genl_family_rcv_msg+0xc30/0xc30 [ 274.996697] ? netlink_ack+0x9a0/0x9a0 [ 275.025819] ? genl_rcv+0x1a/0x40 [ 275.029278] genl_rcv+0x29/0x40 [ 275.032555] netlink_unicast+0x45d/0x780 [ 275.036618] ? netlink_attachskb+0x6a0/0x6a0 [ 275.041033] ? security_netlink_send+0x81/0xb0 [ 275.045617] netlink_sendmsg+0x7c4/0xc60 [ 275.049689] ? netlink_unicast+0x780/0x780 [ 275.053932] ? security_socket_sendmsg+0x89/0xb0 [ 275.058694] ? netlink_unicast+0x780/0x780 [ 275.062932] sock_sendmsg+0xce/0x110 [ 275.066646] ___sys_sendmsg+0x70a/0x840 [ 275.070625] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 275.075383] ? __fget+0x210/0x370 [ 275.078844] ? find_held_lock+0x35/0x130 [ 275.082906] ? __fget+0x210/0x370 [ 275.086363] ? lock_downgrade+0x6e0/0x6e0 [ 275.090517] ? __fget+0x237/0x370 [ 275.093977] ? __fget_light+0x172/0x1f0 [ 275.097960] ? __fdget+0x1b/0x20 [ 275.101331] ? sockfd_lookup_light+0xb4/0x160 [ 275.105835] __sys_sendmsg+0xb9/0x140 [ 275.109632] ? SyS_shutdown+0x170/0x170 [ 275.113607] ? fd_install+0x4d/0x60 [ 275.117246] SyS_sendmsg+0x2d/0x50 [ 275.120782] ? __sys_sendmsg+0x140/0x140 [ 275.124850] do_syscall_64+0x1e8/0x640 [ 275.128746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.133595] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.138786] RIP: 0033:0x4130d1 [ 275.141972] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 275.149678] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 275.156944] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 275.164212] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 275.171480] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 275.178748] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 275.186042] CPU: 0 PID: 14318 Comm: syz-executor.1 Not tainted 4.14.125 #19 [ 275.186579] net_ratelimit: 4 callbacks suppressed [ 275.186585] protocol 88fb is buggy, dev hsr_slave_0 [ 275.193162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.193167] Call Trace: [ 275.193185] dump_stack+0x138/0x19c [ 275.193202] should_fail.cold+0x10f/0x159 [ 275.198089] protocol 88fb is buggy, dev hsr_slave_1 08:26:41 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getpeername(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80) getsockname(r0, 0x0, &(0x7f0000001680)) [ 275.203047] should_failslab+0xdb/0x130 [ 275.203061] kmem_cache_alloc+0x2d7/0x780 [ 275.203075] ? creds_are_invalid+0x48/0x110 [ 275.240198] ? __validate_process_creds+0x14c/0x200 [ 275.245223] prepare_creds+0x3e/0x340 [ 275.249027] lookup_user_key+0x2e9/0xe20 [ 275.253100] ? join_session_keyring+0x300/0x300 [ 275.257783] ? key_validate+0xc0/0xc0 [ 275.261606] ? kasan_check_write+0x14/0x20 [ 275.265851] SyS_add_key+0x15b/0x350 [ 275.265866] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 275.265882] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 275.265896] do_syscall_64+0x1e8/0x640 [ 275.265905] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.265920] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.275336] RIP: 0033:0x4592c9 [ 275.275343] RSP: 002b:00007f8e42396c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 275.275353] RAX: ffffffffffffffda RBX: 00007f8e42396c90 RCX: 00000000004592c9 [ 275.275358] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000020000000 [ 275.275363] RBP: 000000000075bf20 R08: fffffffffffffffe R09: 0000000000000000 [ 275.275368] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f8e423976d4 [ 275.275374] R13: 00000000004bf288 R14: 00000000004d06c8 R15: 0000000000000003 08:26:41 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000002c0)={0x10001, 0xffffffffffffff80, 0x0, 0x0, 0x7, 0xfffffffffffff2fd, 0x0, 0x1, 0xfffffffffffffffe}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:41 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000840)={0x0, 0x0, 0x0}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) 08:26:41 executing program 0: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f00000002c0)=""/148, 0x69}], 0x1, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/anycast6\x00') r2 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xa224, 0x5, 0x5, 0x7fffffff, 0x0, 0x3, 0x8, 0x4, 0x2, 0x8, 0xd35, 0x5, 0xffc000000000000, 0x9, 0x200, 0x7, 0x10001, 0x20, 0xffff, 0x0, 0x3f, 0x9, 0x8, 0x5a, 0x1ff, 0xf2f0, 0x81, 0x100, 0xfff, 0xffffffff, 0x10001, 0x7e97, 0x2, 0x7, 0xd1, 0x3, 0x0, 0x7, 0x0, @perf_config_ext={0x1, 0x10001}, 0x0, 0x5, 0xe948, 0x0, 0xce, 0x7f, 0x2}, r2, 0x9, r1, 0x1) preadv(r1, &(0x7f0000000380), 0xdf479a79db45afe, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) ioctl$DRM_IOCTL_RM_MAP(0xffffffffffffffff, 0x4028641b, 0x0) sendmsg$can_raw(r1, &(0x7f0000000200)={&(0x7f0000000100), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=@canfd={{0x2, 0xff, 0x58e0b039, 0x80}, 0x2b, 0x0, 0x0, 0x0, "7cf5fe3236ef503ff90f4dd5ed4c5769c5082cf29da1873ddb02369057421e72887f7490c71d1bc2f5c29c04182e6162239863b27d59a70a733e33e1e2fe9116"}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4004) 08:26:41 executing program 1 (fault-call:0 fault-nth:2): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:41 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) getresuid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) setresuid(r3, r4, r5) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:41 executing program 5 (fault-call:5 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:41 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x3, 0x200000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000340)={0x2, 'eql\x00', 0x3}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000280)={[0x0, 0x106002, 0x4000], 0x200, 0x40, 0x8}) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000500)=ANY=[@ANYBLOB="f4efaf0f8008dcf00722f743d2cf7aacf92d054df5a5a0df65001cd5fea04b845bc559e0dedf1dfedb953d5307b1f522e873260c2beec19b64846941ca881943b352ec6f0e03c73ecb7f5c66d59f1ec9646800000100985e0eb60f1990965bde81cf88e110a16beef8fb8194768f5dd0920cf99134526c94bd000000000000000000"]) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000004c0)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) accept$unix(r0, &(0x7f00000005c0)=@abs, &(0x7f0000000640)=0x6e) 08:26:41 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000002c0)={0x10001, 0xffffffffffffff80, 0x0, 0x0, 0x7, 0xfffffffffffff2fd, 0x0, 0x1, 0xfffffffffffffffe}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 275.507569] FAULT_INJECTION: forcing a failure. [ 275.507569] name failslab, interval 1, probability 0, space 0, times 0 [ 275.507756] FAULT_INJECTION: forcing a failure. [ 275.507756] name failslab, interval 1, probability 0, space 0, times 0 08:26:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept4(r0, &(0x7f0000000080)=@l2, &(0x7f0000000180)=0x80, 0x0) r2 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='keyring\x00', r2) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000300)=0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000400)="f55305407c2ebb0fa017b23bfaebbcca50391003da54d016d4a899a54d120d985a8f53733b0923bd47d0a8da524453e2ff1f10203745db55871251b2a2e2b75810364b38997902dc5bdee3afe1d687f26546592e3df597546a8347e95169b3639ee2b5b8e3f074de6202e1f0408ad7c4a2c3f075cf7e78cec262d287daa1277b7c6d1f0a184dfca004897afdf75edc3532acbc5e8156dd3774d3a729051b1351fbf585ef105d6e5fa6acbce8dd14e20db1e4d42dab68b8032f7059a30fdc12b9c7e483f715b42ca4a76c6807", 0xcc) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0x49}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x200005de}, {&(0x7f0000000600)=""/127, 0x7f}, {&(0x7f0000000680)=""/23, 0x17}], 0x5, &(0x7f0000001bc0)}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000008c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f0000000880)={&(0x7f0000000740)={0x104, r4, 0x0, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffc01}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40}, 0x2000c091) [ 275.583191] CPU: 0 PID: 14346 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 275.590355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.590361] Call Trace: [ 275.590384] dump_stack+0x138/0x19c [ 275.590405] should_fail.cold+0x10f/0x159 [ 275.590423] should_failslab+0xdb/0x130 [ 275.590441] kmem_cache_alloc_node_trace+0x280/0x770 [ 275.619206] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 275.624675] __kmalloc_node_track_caller+0x3d/0x80 [ 275.629623] __kmalloc_reserve.isra.0+0x40/0xe0 [ 275.634300] __alloc_skb+0xcf/0x500 [ 275.634312] ? skb_scrub_packet+0x4b0/0x4b0 [ 275.634331] ctrl_build_family_msg+0x3e/0xa0 [ 275.634345] ctrl_getfamily+0x1e0/0x400 [ 275.634357] genl_family_rcv_msg+0x614/0xc30 [ 275.634375] ? genl_rcv+0x40/0x40 [ 275.658516] ? __dev_queue_xmit+0xd33/0x25e0 [ 275.662938] ? trace_hardirqs_on+0xd/0x10 [ 275.667098] ? __local_bh_enable_ip+0x99/0x1a0 [ 275.671706] genl_rcv_msg+0xb4/0x150 [ 275.675430] netlink_rcv_skb+0x14f/0x3c0 [ 275.679503] ? genl_family_rcv_msg+0xc30/0xc30 [ 275.684115] ? netlink_ack+0x9a0/0x9a0 [ 275.688008] ? genl_rcv+0x1a/0x40 [ 275.691471] genl_rcv+0x29/0x40 [ 275.694758] netlink_unicast+0x45d/0x780 [ 275.698832] ? netlink_attachskb+0x6a0/0x6a0 [ 275.703252] ? security_netlink_send+0x81/0xb0 [ 275.707850] netlink_sendmsg+0x7c4/0xc60 [ 275.711923] ? netlink_unicast+0x780/0x780 [ 275.716165] ? security_socket_sendmsg+0x89/0xb0 [ 275.720925] ? netlink_unicast+0x780/0x780 [ 275.725168] sock_sendmsg+0xce/0x110 [ 275.728906] ___sys_sendmsg+0x70a/0x840 [ 275.732891] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 275.737650] ? __fget+0x210/0x370 [ 275.741112] ? find_held_lock+0x35/0x130 [ 275.745184] ? __fget+0x210/0x370 [ 275.748651] ? lock_downgrade+0x6e0/0x6e0 [ 275.752813] ? __fget+0x237/0x370 [ 275.756296] ? __fget_light+0x172/0x1f0 [ 275.760281] ? __fdget+0x1b/0x20 [ 275.763658] ? sockfd_lookup_light+0xb4/0x160 [ 275.768163] __sys_sendmsg+0xb9/0x140 [ 275.771971] ? SyS_shutdown+0x170/0x170 [ 275.775956] ? fd_install+0x4d/0x60 [ 275.779605] SyS_sendmsg+0x2d/0x50 [ 275.783151] ? __sys_sendmsg+0x140/0x140 [ 275.787221] do_syscall_64+0x1e8/0x640 [ 275.791115] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.795970] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.801164] RIP: 0033:0x4130d1 [ 275.804355] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 275.812069] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 275.819341] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 275.826614] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 275.833890] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 275.841161] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 275.849935] CPU: 1 PID: 14348 Comm: syz-executor.1 Not tainted 4.14.125 #19 [ 275.857065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.866424] Call Trace: [ 275.869022] dump_stack+0x138/0x19c [ 275.872660] should_fail.cold+0x10f/0x159 [ 275.881510] should_failslab+0xdb/0x130 [ 275.885492] __kmalloc_track_caller+0x2ec/0x790 [ 275.885506] ? check_preemption_disabled+0x3c/0x250 [ 275.885520] ? prepare_creds+0x3e/0x340 [ 275.895206] ? selinux_cred_prepare+0x49/0xb0 [ 275.903666] kmemdup+0x27/0x60 [ 275.906272] ntfs: (device loop2): parse_options(): Unrecognized mount option "Cz-Me. [ 275.906872] selinux_cred_prepare+0x49/0xb0 [ 275.920727] security_prepare_creds+0x7d/0xb0 [ 275.925233] prepare_creds+0x29a/0x340 [ 275.929154] lookup_user_key+0x2e9/0xe20 [ 275.933249] ? join_session_keyring+0x300/0x300 [ 275.937931] ? key_validate+0xc0/0xc0 [ 275.941762] ? kasan_check_write+0x14/0x20 [ 275.946016] SyS_add_key+0x15b/0x350 [ 275.949741] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 275.955469] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 275.961197] do_syscall_64+0x1e8/0x640 [ 275.965099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 275.970455] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 275.975646] RIP: 0033:0x4592c9 08:26:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0), &(0x7f0000000180)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f00000001c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}) ioctl(r1, 0x2c27, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket(0x1e, 0x1, 0x0) sendmsg(r2, &(0x7f0000000240)={&(0x7f0000000100)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r4, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x14}}}, 0x30}}, 0x0) 08:26:41 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x10000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000002c0)={0x10001, 0xffffffffffffff80, 0x0, 0x0, 0x7, 0xfffffffffffff2fd, 0x0, 0x1, 0xfffffffffffffffe}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 275.978837] RSP: 002b:00007f8e42396c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 275.986556] RAX: ffffffffffffffda RBX: 00007f8e42396c90 RCX: 00000000004592c9 [ 275.993829] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000020000000 [ 276.001090] RBP: 000000000075bf20 R08: fffffffffffffffe R09: 0000000000000000 [ 276.008357] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f8e423976d4 [ 276.015614] R13: 00000000004bf288 R14: 00000000004d06c8 R15: 0000000000000003 08:26:42 executing program 1 (fault-call:0 fault-nth:3): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:42 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000540)={0x40000081, 0x7}) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x1c, r2, 0x104, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080), 0xfffffffffffffffd) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl(r3, 0x200, &(0x7f0000000280)="6dcf1201e0de81bcbfebf11a95bba4b843eeb23a469b1f353b7998cd1b6b8137712f74719d307ca643bc3822cdeab8428e0e0488b203172a6f17dbd1cd7bcc908aebd02cf35ff90c10568998307d3cf4413b15e358bfac1eafe58168d2f9ba22f65bdcf665a04203930fab6ef53a41dda117e48736e654ec061b1ceabba108") sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r3, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:42 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000018ac287b6ebaeb36fd66f40a4743cdc2ea0140d0000630100790000008100cd41f7620003000000b22701019b4dce76d88d48f44662"], 0x1}}, 0x0) clone(0x13ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:26:42 executing program 5 (fault-call:5 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:42 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x100, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x1d83d) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000040}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x1b4, r1, 0xc04, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd654}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xab84}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6df0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}]}, @TIPC_NLA_BEARER={0xb0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x48000}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x517e026c, @remote, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x200, @local, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1200000000000}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'team_slave_0\x00'}}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffeffffffff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffeffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x20000000}, 0x8010) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="b8000000", @ANYRES16=r2, @ANYBLOB="09072bbd7000ffdbdf25110000001e452c8d456ad4c9947cb878fe5e54000300080007004e24000014000600fe8000000000000000000000000000bb08000300020000000800030004000000080008000400000014000600ff02000000000000000000000000000108000100a4cf9354080004004c00000008000600cd00000038000300080007004e200000080008000100000014000600ff020000000000000000000000000001080001000100000008000300030000000800050001010000"], 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r0, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0, 0x0, &(0x7f0000000580)={0x6, 0x2}, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x2, 0x82ee}, &(0x7f0000000600)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=0x8001}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780)=r3, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) [ 276.159851] FAULT_INJECTION: forcing a failure. [ 276.159851] name failslab, interval 1, probability 0, space 0, times 0 [ 276.214040] CPU: 0 PID: 14393 Comm: syz-executor.1 Not tainted 4.14.125 #19 [ 276.221195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.230560] Call Trace: [ 276.233170] dump_stack+0x138/0x19c [ 276.236813] should_fail.cold+0x10f/0x159 [ 276.240984] should_failslab+0xdb/0x130 [ 276.244974] kmem_cache_alloc+0x2d7/0x780 [ 276.249145] key_alloc+0x34c/0xed0 [ 276.252704] ? key_user_put+0x60/0x60 [ 276.256517] ? kmemdup+0x47/0x60 [ 276.259894] keyring_alloc+0x4d/0xb0 [ 276.263623] install_process_keyring_to_cred.part.0+0x83/0xf0 [ 276.269508] lookup_user_key+0x95a/0xe20 [ 276.273568] ? join_session_keyring+0x300/0x300 [ 276.278235] ? key_validate+0xc0/0xc0 [ 276.282036] ? kasan_check_write+0x14/0x20 [ 276.286295] SyS_add_key+0x15b/0x350 [ 276.290007] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 276.295719] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 276.301426] do_syscall_64+0x1e8/0x640 [ 276.305312] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:26:42 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f00000004c0)) ioctl$TIOCCBRK(r1, 0x5428) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0xfffffffffffffd9e) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000005c0)=ANY=[@ANYBLOB="467ff11edeb916f9125b1d085757083dad75ffac1c59ec74e987dd945d26e5c952fb7b400aae7c458293b111b2849e0ba7ef5251e0711c793e63441316dbb79e17a4e682d3098d5ee1da5724c6f2931c1c6d290e082fcecf3f6d1aa6f1154cbf3a04ff7fcc11d7d3f4e516464234374963ebbaa162e40ad50845952705306aaf11b0a8af25c30000b89b193e0f7419b91ae07c078b95beeb0b365cb8686ad7d9c29abd6a15940200000000000000a1832aa7f81948b95c022d38e6aa307c37fff59f96da3e386955cb9399b2d5f61bcf2084537d1f0b2398d950476573a801ffb71eb60d6115b1f200"/243]) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000300)={0x3, "8f9cd5dd6ae4a23dbbe4584ce8fa6e647170fc2a2bbfb5f3a9547827b623f385", 0x3, 0x9, 0xff, 0x400}) 08:26:42 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x401, 0x200000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000680)={&(0x7f0000000400), 0xc, &(0x7f0000000600)={&(0x7f0000000780)=ANY=[@ANYBLOB="06000800", @ANYRES16=r3, @ANYBLOB="080128bd7000ffdbdf2503000000140003000800080000000000080007004e240000500002000800040000ffffff080008000200000014000100ffffffff000000000000000000000000080006000700000008000d00000000000800040000100000080006002e00000008000500010000001800010008000800030000000c000700180000001000000014000300080001000000000008000100010000000800060000000000"], 0xac}, 0x1, 0x0, 0x0, 0x4000}, 0x880) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x5b, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rtc0\x00', 0x40000081, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x20002e5c88fc, &(0x7f0000000700)="0adc1f123c06000000b060d5f5589a646ff44a771315b3dda358bc19a0b30083eafd88a1cc6466f2a7aa4962117259863c0a2bf993de65e0b06f7e2b9e53901bc3e96930c7c85d7d93e0026f1e82f63037ddbb8a26eb84332756cb70ad2eb777a094c595edb60eb3d3d5d440806aa0b013a3fb3097d75f882a") r7 = socket$inet(0x10, 0x3, 0xc) sendmsg(r7, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)="24000000020307031dfffd946ff20c0020200a1009000200021d8568021baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000"/76, 0x4c}], 0x1}, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000340)=0x6) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r8 = getpid() setpriority(0x1, r8, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x360001, 0x0) time(&(0x7f00000005c0)) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f0000000300)) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/ppp\x00', 0x4000400, 0x0) accept4$alg(r9, 0x0, 0x0, 0x80800) ioctl$sock_inet_tcp_SIOCOUTQNSD(r7, 0x894b, &(0x7f00000003c0)) ioctl$INOTIFY_IOC_SETNEXTWD(r9, 0x40044900, 0x5) ioctl$EVIOCGPROP(r10, 0x40047438, &(0x7f0000000180)=""/246) ioctl$TIOCGPGRP(r10, 0x540f, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r10, 0x3, r4, &(0x7f00000002c0)={0x2}) fcntl$getownex(r5, 0x10, &(0x7f0000000500)) pread64(r10, &(0x7f0000000580)=""/60, 0x3c, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x200003, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000006c0)=0x100000000000000) add_key(&(0x7f0000000a40)='.request_key_auth\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000880)="2d6c8a3dce72ee52529f7c94b06bf919a3718ef0ecb0d8c75eb1a820769462765e19e461b2d3e495659ca0bc10a5f188eafbe616addd5f6d0495a1bd65518627fcd1f9a37589d0325b28639ee22a360556e3453330c31c3662fdde6c84f8654d065cfec564b8f6c2a74739540c0255d587702236460f098c14d31da692e53945d2f4b42b8c7a1fccd3b923e9084454c112c6c62f7421c8f54dd7d3389962a3a37c845bdfd55c9f58970bcfe6d644379e466b2893106b723d2574d3ce3ed31c8b2295adbae7975a1482b112378bc0bca5bddd", 0xd2, 0xfffffffffffffffd) [ 276.310156] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.315343] RIP: 0033:0x4592c9 [ 276.318523] RSP: 002b:00007f8e42396c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 276.326231] RAX: ffffffffffffffda RBX: 00007f8e42396c90 RCX: 00000000004592c9 [ 276.333501] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000020000000 [ 276.340823] RBP: 000000000075bf20 R08: fffffffffffffffe R09: 0000000000000000 [ 276.348103] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f8e423976d4 [ 276.355364] R13: 00000000004bf288 R14: 00000000004d06c8 R15: 0000000000000003 [ 276.382951] FAULT_INJECTION: forcing a failure. [ 276.382951] name failslab, interval 1, probability 0, space 0, times 0 [ 276.427722] CPU: 0 PID: 14397 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 276.434875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.444265] Call Trace: [ 276.446869] dump_stack+0x138/0x19c [ 276.450510] should_fail.cold+0x10f/0x159 [ 276.454674] should_failslab+0xdb/0x130 [ 276.458656] kmem_cache_alloc_node_trace+0x5a/0x770 [ 276.463682] ? __lock_is_held+0xb6/0x140 [ 276.467750] ? check_preemption_disabled+0x3c/0x250 [ 276.472787] __kmalloc_node_track_caller+0x3d/0x80 [ 276.477732] __kmalloc_reserve.isra.0+0x40/0xe0 [ 276.482412] pskb_expand_head+0x116/0xc10 [ 276.486568] ? ctrl_fill_info+0x389/0xd80 [ 276.490735] netlink_trim+0x1c1/0x230 [ 276.494547] netlink_unicast+0x93/0x780 [ 276.498529] ? sk_clone_lock+0xa9a/0x11f0 [ 276.502687] ? netlink_attachskb+0x6a0/0x6a0 [ 276.507100] ? ctrl_build_family_msg+0x6b/0xa0 [ 276.511683] ctrl_getfamily+0x280/0x400 [ 276.515654] genl_family_rcv_msg+0x614/0xc30 [ 276.520060] ? genl_rcv+0x40/0x40 [ 276.523521] ? __dev_queue_xmit+0xd33/0x25e0 [ 276.527938] ? trace_hardirqs_on+0xd/0x10 [ 276.532095] ? __local_bh_enable_ip+0x99/0x1a0 [ 276.536696] genl_rcv_msg+0xb4/0x150 [ 276.540442] netlink_rcv_skb+0x14f/0x3c0 [ 276.544505] ? genl_family_rcv_msg+0xc30/0xc30 [ 276.549090] ? netlink_ack+0x9a0/0x9a0 [ 276.552979] ? genl_rcv+0x1a/0x40 [ 276.556444] genl_rcv+0x29/0x40 [ 276.559727] netlink_unicast+0x45d/0x780 [ 276.562722] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 276.563797] ? netlink_attachskb+0x6a0/0x6a0 [ 276.563812] ? security_netlink_send+0x81/0xb0 [ 276.563825] netlink_sendmsg+0x7c4/0xc60 [ 276.563841] ? netlink_unicast+0x780/0x780 [ 276.563856] ? security_socket_sendmsg+0x89/0xb0 [ 276.563865] ? netlink_unicast+0x780/0x780 [ 276.563887] sock_sendmsg+0xce/0x110 [ 276.602395] ___sys_sendmsg+0x70a/0x840 [ 276.606370] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 276.611120] ? __fget+0x210/0x370 [ 276.614566] ? find_held_lock+0x35/0x130 [ 276.618618] ? __fget+0x210/0x370 [ 276.622069] ? lock_downgrade+0x6e0/0x6e0 [ 276.626216] ? __fget+0x237/0x370 [ 276.629664] ? __fget_light+0x172/0x1f0 [ 276.633631] ? __fdget+0x1b/0x20 [ 276.636991] ? sockfd_lookup_light+0xb4/0x160 [ 276.641482] __sys_sendmsg+0xb9/0x140 [ 276.645273] ? SyS_shutdown+0x170/0x170 [ 276.649238] ? fd_install+0x4d/0x60 [ 276.653041] SyS_sendmsg+0x2d/0x50 [ 276.656569] ? __sys_sendmsg+0x140/0x140 [ 276.660629] do_syscall_64+0x1e8/0x640 [ 276.664510] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.669348] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 276.674529] RIP: 0033:0x4130d1 08:26:42 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe40\xaaH.6Y\x04\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#\x00\x00\x00\x00\x00\x00\x00\x00') pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x20) setpriority(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) unshare(0x20600) link(0x0, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x2000, 0x0) write$P9_RWRITE(r4, &(0x7f00000003c0)={0xb, 0x77, 0x1, 0x8000}, 0xb) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000400)={@ethernet={0x1, @local}, {&(0x7f0000000140)=""/59, 0x3b}, &(0x7f0000000180), 0x41}, 0xa0) fcntl$addseals(r3, 0x409, 0x3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000001c0)={0x8, 0xcfb2, 0x6}) 08:26:42 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(r1, &(0x7f0000000280)) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 276.677709] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 276.685406] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 276.692667] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 276.699924] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 276.707196] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 276.714453] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x200, @perf_bp={&(0x7f0000001080)}, 0x800000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x800000000000004) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) r3 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0xcb1, 0x400) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000400)=0x2, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000600)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000780)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000740)={&(0x7f0000000800)=ANY=[@ANYBLOB="072f996627cb07e13ce62458fc00000027d0201838974d244a4848bda40f8288940fbdbb53e7ad7a6856a68abfed0ae880eeef81e197797fa70f4da55f72c2852dae308c0952df1742793e026e743f0341f537de70e543c5ce516102338778d7058f01caa8f86ebfe983e5b2fb0859", @ANYRES16=r4, @ANYBLOB="04052abd7000fcdbdf250b000000080005000000000008000400ff00000008000400ffff000030000200080002004e24000014000100ac1e0101000000000000000000000000080002004e240000080002004e2300000c000300080007004e2200006400010014000300ac1414aa0000000000000000000000000800050001000000080001000a000000080009005b000000080005000100000014000300d12698869c078ace8885534fbb01f5db08000b00736970000800090051000000080001000a000000080006001f0000001800020014000100ff02000000000000000000000000000108000500070000000800050004000000"], 0xfc}, 0x1, 0x0, 0x0, 0x800}, 0x11) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r5 = dup3(r1, r2, 0x80000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f00000007c0)="ccd9c92c5b00", 0xfffffffffffffe8c) fstat(r2, &(0x7f0000000280)) getresuid(&(0x7f0000002180), &(0x7f00000021c0), &(0x7f0000002200)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000300)={0x401, 0xfff, 0x80000001, 'queue0\x00', 0x7fffffff}) ioctl$PPPIOCSPASS(r5, 0x40107447, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x10001, 0x7, 0x7, 0xffff}, {0x2, 0x10000, 0xd9c, 0x9}]}) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000140)) r6 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) getegid() ioctl$UI_DEV_DESTROY(r5, 0x5502) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000040)={[], 0x0, 0x9, 0x4, 0xfffffffffffffffb}) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) ioctl$TCSBRKP(r5, 0x5425, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000180)={'veth0_to_bridge\x00', 0x10000}) ioctl$sock_bt_hci(r5, 0x400448e1, &(0x7f0000000440)="8bf0b59eb9c531276508cbec72f064d1387bb2c4b3b325eb76f5ead8bf88a4eb7441e11587e28205dfcee24d70ec9615fbcdceb94539b3eecee3f9e6854f375d1ce03a56f5598650e353f4cbb1eb8ca10b0835c7b031a3ee51402fb13b1d72f8722b875c63031e68b0ff5f72deb08d5323c518134170e67352a364eecdd0882b55e8a7ea2aa00cff77c37ffcb440731bb82a7abfc461d823524575c9ad6908a0fae9432726f552e6148a349008fd4339bc807958a157f6e581f2e726b10257e6704e8ca8a7e6a3caaf5ba15376f1a0f9950167dd81f5df7152038fecc6bff92bf9699567") ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) ioctl$sock_rose_SIOCDELRT(r3, 0x890c, &(0x7f0000000540)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 08:26:42 executing program 1 (fault-call:0 fault-nth:4): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 276.790157] protocol 88fb is buggy, dev hsr_slave_0 08:26:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") connect$inet6(r0, &(0x7f0000000080), 0x1c) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000100)={{0x1f, 0x6}, 'port1\x00', 0x1, 0x90800, 0x5, 0x2, 0x0, 0x5, 0x1, 0x0, 0x2}) r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$inet6_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), 0x4) accept$packet(r3, 0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) 08:26:42 executing program 5 (fault-call:5 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 276.890167] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 276.894592] FAULT_INJECTION: forcing a failure. [ 276.894592] name failslab, interval 1, probability 0, space 0, times 0 [ 276.925033] relay: one or more items not logged [item size (56) > sub-buffer size (9)] [ 276.979325] CPU: 1 PID: 14440 Comm: syz-executor.1 Not tainted 4.14.125 #19 [ 276.986479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.991457] FAULT_INJECTION: forcing a failure. [ 276.991457] name failslab, interval 1, probability 0, space 0, times 0 [ 276.995834] Call Trace: [ 276.995853] dump_stack+0x138/0x19c [ 276.995877] should_fail.cold+0x10f/0x159 [ 277.017403] should_failslab+0xdb/0x130 [ 277.021387] __kmalloc_track_caller+0x2ec/0x790 [ 277.026070] ? rcu_read_lock_sched_held+0x110/0x130 [ 277.031104] ? kmem_cache_alloc+0x611/0x780 [ 277.035427] ? key_alloc+0x3a5/0xed0 [ 277.039141] kmemdup+0x27/0x60 [ 277.042336] key_alloc+0x3a5/0xed0 [ 277.045887] ? key_user_put+0x60/0x60 [ 277.049683] ? kmemdup+0x47/0x60 [ 277.053051] keyring_alloc+0x4d/0xb0 [ 277.056772] install_process_keyring_to_cred.part.0+0x83/0xf0 [ 277.062659] lookup_user_key+0x95a/0xe20 [ 277.066723] ? join_session_keyring+0x300/0x300 [ 277.071393] ? key_validate+0xc0/0xc0 [ 277.075202] ? kasan_check_write+0x14/0x20 [ 277.079438] SyS_add_key+0x15b/0x350 [ 277.083153] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 277.088874] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 277.094597] do_syscall_64+0x1e8/0x640 [ 277.098488] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.103341] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.108529] RIP: 0033:0x4592c9 [ 277.111715] RSP: 002b:00007f8e42396c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 277.119423] RAX: ffffffffffffffda RBX: 00007f8e42396c90 RCX: 00000000004592c9 [ 277.126691] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000020000000 [ 277.133959] RBP: 000000000075bf20 R08: fffffffffffffffe R09: 0000000000000000 [ 277.141225] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f8e423976d4 [ 277.148495] R13: 00000000004bf288 R14: 00000000004d06c8 R15: 0000000000000003 [ 277.156849] CPU: 0 PID: 14446 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 277.163969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.173336] Call Trace: [ 277.175924] dump_stack+0x138/0x19c [ 277.179570] should_fail.cold+0x10f/0x159 [ 277.183724] should_failslab+0xdb/0x130 [ 277.187701] kmem_cache_alloc_node_trace+0x5a/0x770 [ 277.192708] ? __lock_is_held+0xb6/0x140 [ 277.196764] ? check_preemption_disabled+0x3c/0x250 [ 277.201785] __kmalloc_node_track_caller+0x3d/0x80 [ 277.206713] __kmalloc_reserve.isra.0+0x40/0xe0 [ 277.211378] pskb_expand_head+0x116/0xc10 [ 277.215521] ? ctrl_fill_info+0x389/0xd80 [ 277.219671] netlink_trim+0x1c1/0x230 [ 277.223470] netlink_unicast+0x93/0x780 [ 277.227438] ? sk_clone_lock+0xa9a/0x11f0 [ 277.231578] ? netlink_attachskb+0x6a0/0x6a0 [ 277.235978] ? ctrl_build_family_msg+0x6b/0xa0 [ 277.240551] ctrl_getfamily+0x280/0x400 [ 277.244521] genl_family_rcv_msg+0x614/0xc30 [ 277.248924] ? genl_rcv+0x40/0x40 [ 277.252367] ? __dev_queue_xmit+0xd33/0x25e0 [ 277.256768] ? trace_hardirqs_on+0xd/0x10 [ 277.260906] ? __local_bh_enable_ip+0x99/0x1a0 [ 277.265496] genl_rcv_msg+0xb4/0x150 [ 277.269201] netlink_rcv_skb+0x14f/0x3c0 [ 277.273254] ? genl_family_rcv_msg+0xc30/0xc30 [ 277.277829] ? netlink_ack+0x9a0/0x9a0 [ 277.281710] ? genl_rcv+0x1a/0x40 [ 277.285161] genl_rcv+0x29/0x40 [ 277.288428] netlink_unicast+0x45d/0x780 [ 277.292482] ? netlink_attachskb+0x6a0/0x6a0 [ 277.296883] ? security_netlink_send+0x81/0xb0 [ 277.301457] netlink_sendmsg+0x7c4/0xc60 [ 277.305535] ? netlink_unicast+0x780/0x780 [ 277.309767] ? security_socket_sendmsg+0x89/0xb0 [ 277.314516] ? netlink_unicast+0x780/0x780 [ 277.318744] sock_sendmsg+0xce/0x110 [ 277.322451] ___sys_sendmsg+0x70a/0x840 [ 277.326422] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 277.331166] ? __fget+0x210/0x370 [ 277.334612] ? find_held_lock+0x35/0x130 [ 277.338672] ? __fget+0x210/0x370 [ 277.342124] ? lock_downgrade+0x6e0/0x6e0 [ 277.346274] ? __fget+0x237/0x370 [ 277.349723] ? __fget_light+0x172/0x1f0 [ 277.353701] ? __fdget+0x1b/0x20 [ 277.357086] ? sockfd_lookup_light+0xb4/0x160 [ 277.361578] __sys_sendmsg+0xb9/0x140 [ 277.365371] ? SyS_shutdown+0x170/0x170 [ 277.369337] ? fd_install+0x4d/0x60 [ 277.372963] SyS_sendmsg+0x2d/0x50 [ 277.376490] ? __sys_sendmsg+0x140/0x140 [ 277.380543] do_syscall_64+0x1e8/0x640 [ 277.384419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.389258] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.394440] RIP: 0033:0x4130d1 [ 277.397632] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 277.405338] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 277.412605] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 277.419862] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 08:26:43 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) name_to_handle_at(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x6b, 0x8, "5bf13f3ab7e5785d9500e75222eeaa4b40644aa348ac2a0589ea92311251bd9f329541a70317e4e7319f2f06f3146c40c95a1806e2e5d29ea25d973c748b46515533227b5ead5e0ccecca1ad8594f4277a4f97d016a739742dd908b45d671d03b484d4"}, &(0x7f0000000340), 0x1400) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f0000000380)=0x8) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 277.427144] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 277.434497] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 277.450124] protocol 88fb is buggy, dev hsr_slave_0 [ 277.455246] protocol 88fb is buggy, dev hsr_slave_1 [ 277.460777] protocol 88fb is buggy, dev hsr_slave_0 [ 277.465841] protocol 88fb is buggy, dev hsr_slave_1 08:26:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000005c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000100)=""/58) 08:26:43 executing program 1 (fault-call:0 fault-nth:5): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:43 executing program 5 (fault-call:5 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 277.559902] relay: one or more items not logged [item size (56) > sub-buffer size (9)] [ 277.617002] FAULT_INJECTION: forcing a failure. [ 277.617002] name failslab, interval 1, probability 0, space 0, times 0 08:26:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6(0xa, 0x1, 0xfffffffffffffeff) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x8636, 0x4) write$binfmt_misc(r0, &(0x7f0000000040)={'syz1'}, 0x1a000) r2 = dup3(r0, r0, 0x80000) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000080)) [ 277.658969] ntfs: (device loop2): parse_options(): Unrecognized mount option ./file0. [ 277.672686] CPU: 1 PID: 14467 Comm: syz-executor.1 Not tainted 4.14.125 #19 [ 277.679818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.689180] Call Trace: [ 277.691780] dump_stack+0x138/0x19c [ 277.695425] should_fail.cold+0x10f/0x159 [ 277.699583] should_failslab+0xdb/0x130 [ 277.703570] kmem_cache_alloc_trace+0x2e9/0x790 [ 277.708424] ? rcu_read_lock_sched_held+0x110/0x130 [ 277.713452] ? __kmalloc_track_caller+0x372/0x790 [ 277.718304] selinux_key_alloc+0x4b/0x1a0 [ 277.722464] security_key_alloc+0x7d/0xb0 [ 277.726620] key_alloc+0x6b3/0xed0 [ 277.730172] ? key_user_put+0x60/0x60 [ 277.733981] ? kmemdup+0x47/0x60 [ 277.737367] keyring_alloc+0x4d/0xb0 [ 277.741110] install_process_keyring_to_cred.part.0+0x83/0xf0 [ 277.747000] lookup_user_key+0x95a/0xe20 [ 277.751101] ? join_session_keyring+0x300/0x300 [ 277.755776] ? key_validate+0xc0/0xc0 [ 277.759602] ? kasan_check_write+0x14/0x20 [ 277.763848] SyS_add_key+0x15b/0x350 [ 277.767567] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 277.773293] ? key_get_type_from_user.constprop.0+0xe0/0xe0 [ 277.779016] do_syscall_64+0x1e8/0x640 [ 277.781141] FAULT_INJECTION: forcing a failure. [ 277.781141] name failslab, interval 1, probability 0, space 0, times 0 [ 277.782900] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 277.782919] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 277.782928] RIP: 0033:0x4592c9 08:26:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000000)={0x0, 0x14000}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r3, 0x28, &(0x7f0000000180)}, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x2000, &(0x7f0000015000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 277.782934] RSP: 002b:00007f8e42396c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 277.782947] RAX: ffffffffffffffda RBX: 00007f8e42396c90 RCX: 00000000004592c9 [ 277.782953] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000020000000 [ 277.782958] RBP: 000000000075bf20 R08: fffffffffffffffe R09: 0000000000000000 [ 277.782963] R10: 0000000000000018 R11: 0000000000000246 R12: 00007f8e423976d4 [ 277.782968] R13: 00000000004bf288 R14: 00000000004d06c8 R15: 0000000000000003 [ 277.829548] CPU: 0 PID: 14470 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 277.858963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.868314] Call Trace: [ 277.870905] dump_stack+0x138/0x19c [ 277.874529] should_fail.cold+0x10f/0x159 [ 277.878672] should_failslab+0xdb/0x130 [ 277.882640] kmem_cache_alloc+0x47/0x780 [ 277.886696] ? lock_downgrade+0x6e0/0x6e0 [ 277.890840] ? netlink_skb_set_owner_r+0x14b/0x1b0 [ 277.895764] skb_clone+0x129/0x320 [ 277.899297] __netlink_deliver_tap+0x55e/0x7d0 [ 277.903880] __netlink_sendskb+0x1ad/0x1d0 [ 277.908108] netlink_unicast+0x64e/0x780 [ 277.912162] ? sk_clone_lock+0xa9a/0x11f0 [ 277.916304] ? netlink_attachskb+0x6a0/0x6a0 [ 277.920704] ? ctrl_build_family_msg+0x6b/0xa0 [ 277.925306] ctrl_getfamily+0x280/0x400 [ 277.929273] genl_family_rcv_msg+0x614/0xc30 [ 277.933681] ? genl_rcv+0x40/0x40 [ 277.937239] ? __dev_queue_xmit+0xd33/0x25e0 [ 277.941643] ? trace_hardirqs_on+0xd/0x10 [ 277.945787] ? __local_bh_enable_ip+0x99/0x1a0 [ 277.950380] genl_rcv_msg+0xb4/0x150 [ 277.954088] netlink_rcv_skb+0x14f/0x3c0 [ 277.958143] ? genl_family_rcv_msg+0xc30/0xc30 [ 277.962714] ? netlink_ack+0x9a0/0x9a0 [ 277.966597] ? genl_rcv+0x1a/0x40 [ 277.970047] genl_rcv+0x29/0x40 [ 277.973320] netlink_unicast+0x45d/0x780 [ 277.977376] ? netlink_attachskb+0x6a0/0x6a0 [ 277.981780] ? security_netlink_send+0x81/0xb0 [ 277.986369] netlink_sendmsg+0x7c4/0xc60 [ 277.990428] ? netlink_unicast+0x780/0x780 [ 277.994660] ? security_socket_sendmsg+0x89/0xb0 [ 277.999410] ? netlink_unicast+0x780/0x780 [ 278.003639] sock_sendmsg+0xce/0x110 [ 278.007352] ___sys_sendmsg+0x70a/0x840 [ 278.011319] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 278.016070] ? __fget+0x210/0x370 [ 278.019564] ? find_held_lock+0x35/0x130 [ 278.023625] ? __fget+0x210/0x370 [ 278.027351] ? lock_downgrade+0x6e0/0x6e0 [ 278.031496] ? __fget+0x237/0x370 [ 278.034945] ? __fget_light+0x172/0x1f0 [ 278.038911] ? __fdget+0x1b/0x20 [ 278.042268] ? sockfd_lookup_light+0xb4/0x160 [ 278.046758] __sys_sendmsg+0xb9/0x140 [ 278.050551] ? SyS_shutdown+0x170/0x170 [ 278.054519] ? fd_install+0x4d/0x60 [ 278.058166] SyS_sendmsg+0x2d/0x50 [ 278.061693] ? __sys_sendmsg+0x140/0x140 [ 278.065745] do_syscall_64+0x1e8/0x640 [ 278.069624] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.074461] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.079654] RIP: 0033:0x4130d1 [ 278.082852] RSP: 002b:00007f29fe07b9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 278.090555] RAX: ffffffffffffffda RBX: 00007f29fe07ba58 RCX: 00000000004130d1 [ 278.097818] RDX: 0000000000000000 RSI: 00007f29fe07ba00 RDI: 0000000000000006 [ 278.105079] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 278.112359] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe07ba40 [ 278.119705] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 278.150117] protocol 88fb is buggy, dev hsr_slave_0 [ 278.155289] protocol 88fb is buggy, dev hsr_slave_1 08:26:44 executing program 1 (fault-call:0 fault-nth:6): add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:44 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f00000001c0)=ANY=[@ANYBLOB="81000000040000000300ff82"]) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000180)=0x7fffffff) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f00000000c0)={0x80000001, 0x0, [], {0x0, @reserved}}) [ 278.170534] ntfs: (device loop2): parse_options(): Unrecognized mount option ./file0. 08:26:44 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20000) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c163f348d00a5f4ce541baeb9bfb9769ed108878104de7fba5c8a700ac7e7666286c5d3"]) 08:26:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000280)={'lo\x00', 0x0}) r3 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x100, 0x2000) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000000c0)=0x9) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) r4 = dup2(r1, r0) ioctl$KDGKBMODE(r4, 0x4b44, &(0x7f0000000100)) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000000)=""/20) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) 08:26:44 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x81, 0x204002) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={0x0, 0x4}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r1}, 0x8) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat ', 0x2, 0x5e, ['\x00', 'rxrpc\x00', 'bdev+\x00', '{securitywlan0&user\x00', '-#eth0+@{-trustedcpuset\x00', 'rxrpc\x00', 'rxrpc\x00', '+ppp0#\x00']}, 0x69) 08:26:44 executing program 3: getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x5, 0x3, 0x8, 0x7, 0x3}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000180)={r0, 0x1f}, 0x8) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x3, '\x00\x00\x00\x00\x03\x00\x00\x00\x00\x00\x00p\x80\x00', 0x1}, 0xd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="e38fa5055e0bcfec7be070") clone(0x4105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x40) ptrace$cont(0x4201, r2, 0x0, 0xa05000) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040)={0xfe00000000000000, 0xa9, 0x1, 0x4, 0x100, 0x7a91, 0xff, 0xfff, 0xfff, 0x1f, 0x5}, 0xb) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f00000000c0)={0x3, {0x401, 0xffffffffffffffe1, 0xb5f, 0x2, 0x7}}) 08:26:44 executing program 5 (fault-call:5 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 278.335975] ntfs: (device loop2): parse_options(): Unrecognized mount option <?4. 08:26:44 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000280)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 278.435872] FAULT_INJECTION: forcing a failure. [ 278.435872] name failslab, interval 1, probability 0, space 0, times 0 08:26:44 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20000) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c163f348d00a5f4ce541baeb9bfb9769ed108878104de7fba5c8a700ac7e7666286c5d3"]) [ 278.540841] CPU: 0 PID: 14508 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 278.547989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.557350] Call Trace: [ 278.559961] dump_stack+0x138/0x19c [ 278.563622] should_fail.cold+0x10f/0x159 [ 278.567792] should_failslab+0xdb/0x130 [ 278.571778] kmem_cache_alloc_node+0x287/0x780 [ 278.576383] __alloc_skb+0x9c/0x500 [ 278.580016] ? skb_scrub_packet+0x4b0/0x4b0 [ 278.584348] ? __mutex_unlock_slowpath+0x71/0x800 [ 278.589201] netlink_ack+0x21c/0x9a0 [ 278.593015] ? netlink_sendmsg+0xc60/0xc60 [ 278.597257] ? mutex_unlock+0xd/0x10 [ 278.600978] ? genl_rcv_msg+0xe5/0x150 [ 278.604880] netlink_rcv_skb+0x2fc/0x3c0 [ 278.608950] ? genl_family_rcv_msg+0xc30/0xc30 [ 278.613543] ? netlink_ack+0x9a0/0x9a0 [ 278.617437] ? genl_rcv+0x1a/0x40 [ 278.620900] genl_rcv+0x29/0x40 [ 278.624189] netlink_unicast+0x45d/0x780 [ 278.628261] ? netlink_attachskb+0x6a0/0x6a0 [ 278.632677] ? security_netlink_send+0x81/0xb0 [ 278.637269] netlink_sendmsg+0x7c4/0xc60 [ 278.641340] ? netlink_unicast+0x780/0x780 [ 278.645589] ? security_socket_sendmsg+0x89/0xb0 [ 278.650362] ? netlink_unicast+0x780/0x780 [ 278.654612] sock_sendmsg+0xce/0x110 [ 278.658338] ___sys_sendmsg+0x70a/0x840 [ 278.662327] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 278.667088] ? __fget+0x210/0x370 [ 278.670550] ? find_held_lock+0x35/0x130 [ 278.674628] ? __fget+0x210/0x370 [ 278.678096] ? lock_downgrade+0x6e0/0x6e0 [ 278.682254] ? __fget+0x237/0x370 [ 278.685718] ? __fget_light+0x172/0x1f0 [ 278.689700] ? __fdget+0x1b/0x20 [ 278.693073] ? sockfd_lookup_light+0xb4/0x160 [ 278.697575] __sys_sendmsg+0xb9/0x140 [ 278.701397] ? SyS_shutdown+0x170/0x170 [ 278.705375] ? fd_install+0x4d/0x60 [ 278.709018] SyS_sendmsg+0x2d/0x50 [ 278.712560] ? __sys_sendmsg+0x140/0x140 [ 278.716636] do_syscall_64+0x1e8/0x640 [ 278.720529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.725388] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.730621] RIP: 0033:0x4130d1 [ 278.733812] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e 08:26:44 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x6) [ 278.741524] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 278.748795] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 278.756067] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 278.763343] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 278.770620] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:44 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x111001, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f00000002c0)=""/112) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000040)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x276, 0xfffffffffffffffe) [ 278.800727] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 278.826622] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 278.865678] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:26:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x4000006, 0x0, 0x0, 0xffffff7f7ffffffe}]}) r0 = open(&(0x7f0000000040)='./file0\x00', 0x22000, 0x11) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000080)={@empty, @multicast1, 0x0}, &(0x7f00000000c0)=0xc) stat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in=@remote, @in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4e21, 0x0, 0x4e23, 0x0, 0x2, 0x80, 0x20, 0xb9, r1, r2}, {0xab, 0xf6a7, 0x1f, 0x7, 0x200, 0xe3, 0x7, 0x5}, {0x1, 0x710a81aa, 0xaa, 0xffffffffffffffff}, 0x562, 0x6e6bb4, 0x1, 0x1, 0x3, 0x2}, {{@in6=@remote, 0x4d5, 0xff}, 0x2, @in6=@mcast2, 0x3506, 0x3, 0x0, 0x80, 0x8b, 0x8, 0xac}}, 0xe8) pipe(&(0x7f0000001740)={0xffffffffffffffff}) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x1000000, &(0x7f0000000380)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xfffffffffffff800}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000017c0)=0x14) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000001800)={@mcast2, @rand_addr="51b8d7eff8f0c1bb1b6a7c9bd5b83ff0", @mcast1, 0x8, 0x7, 0x1cb, 0x400, 0x6, 0x10, r5}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:26:44 executing program 5 (fault-call:5 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:44 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20000) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c163f348d00a5f4ce541baeb9bfb9769ed108878104de7fba5c8a700ac7e7666286c5d3"]) 08:26:44 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={@null=' \x00', 0x5, 'bcsf0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:44 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@l2, &(0x7f0000000040)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x100000001, 0x1, 0xfffffffffffffff8}, &(0x7f0000000180)=0x10) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000280)={{0x1, @local, 0x4e22, 0x0, 'lblc\x00', 0x1, 0x8}, {@multicast2, 0x4e20, 0x3, 0x6, 0x419f, 0x2}}, 0x44) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}}}, 0x84) 08:26:45 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20000) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c163f348d00a5f4ce541baeb9bfb9769ed108878104de7fba5c8a700ac7e7666286c5d3"]) [ 279.077616] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 279.109573] FAULT_INJECTION: forcing a failure. [ 279.109573] name failslab, interval 1, probability 0, space 0, times 0 [ 279.123031] CPU: 1 PID: 14559 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 279.130150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.130200] Call Trace: [ 279.130222] dump_stack+0x138/0x19c [ 279.130242] should_fail.cold+0x10f/0x159 [ 279.130259] should_failslab+0xdb/0x130 [ 279.130275] kmem_cache_alloc_node_trace+0x280/0x770 [ 279.130291] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 279.130308] __kmalloc_node_track_caller+0x3d/0x80 [ 279.130324] __kmalloc_reserve.isra.0+0x40/0xe0 [ 279.130338] __alloc_skb+0xcf/0x500 [ 279.130350] ? skb_scrub_packet+0x4b0/0x4b0 [ 279.130365] ? __mutex_unlock_slowpath+0x71/0x800 [ 279.142322] netlink_ack+0x21c/0x9a0 [ 279.142337] ? netlink_sendmsg+0xc60/0xc60 [ 279.142349] ? mutex_unlock+0xd/0x10 [ 279.142362] ? genl_rcv_msg+0xe5/0x150 [ 279.202391] netlink_rcv_skb+0x2fc/0x3c0 [ 279.206450] ? genl_family_rcv_msg+0xc30/0xc30 [ 279.211023] ? netlink_ack+0x9a0/0x9a0 [ 279.214898] ? genl_rcv+0x1a/0x40 [ 279.218353] genl_rcv+0x29/0x40 [ 279.221645] netlink_unicast+0x45d/0x780 [ 279.225961] ? netlink_attachskb+0x6a0/0x6a0 [ 279.230363] ? security_netlink_send+0x81/0xb0 [ 279.234937] netlink_sendmsg+0x7c4/0xc60 [ 279.238993] ? netlink_unicast+0x780/0x780 [ 279.243226] ? security_socket_sendmsg+0x89/0xb0 [ 279.247974] ? netlink_unicast+0x780/0x780 [ 279.252205] sock_sendmsg+0xce/0x110 [ 279.255913] ___sys_sendmsg+0x70a/0x840 [ 279.259879] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 279.264628] ? __fget+0x210/0x370 [ 279.268076] ? find_held_lock+0x35/0x130 [ 279.272139] ? __fget+0x210/0x370 [ 279.275593] ? lock_downgrade+0x6e0/0x6e0 [ 279.279742] ? __fget+0x237/0x370 [ 279.283190] ? __fget_light+0x172/0x1f0 [ 279.287164] ? __fdget+0x1b/0x20 [ 279.290530] ? sockfd_lookup_light+0xb4/0x160 [ 279.295020] __sys_sendmsg+0xb9/0x140 [ 279.298816] ? SyS_shutdown+0x170/0x170 [ 279.302780] ? fd_install+0x4d/0x60 [ 279.306406] SyS_sendmsg+0x2d/0x50 [ 279.309934] ? __sys_sendmsg+0x140/0x140 [ 279.313990] do_syscall_64+0x1e8/0x640 [ 279.317869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.322708] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.327886] RIP: 0033:0x4130d1 [ 279.331062] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 279.338767] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 279.346027] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 279.353286] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 279.360555] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 279.367811] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:45 executing program 3: r0 = socket$inet6_sctp(0xa, 0x3, 0x84) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1, 0x4) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="08000000000000001f000080000000007f0000008100000001feffff000000000e0000000180000000000000060000007c000000000000000100000031df046ef3540000050000000400000000000000000000c000000080a40c0000ff0300000000000000000000030000400082000000070000000300000000000000000000c00600000000000000000000800000000000000000040000000000000001000000000000000800000000000000070000c0080000000600000000000000e0ffffff00000000"]) recvfrom$rose(r1, &(0x7f00000001c0)=""/183, 0xb7, 0x21, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000002c0)={0x4, &(0x7f0000000140)=[{0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @link_local}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, 0x249) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000300), &(0x7f0000000280)=0xfe3f) 08:26:45 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f00000001c0)={0x7, 0x1b, 0x2}, 0x7) r1 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000180)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x15b, 0xfffffffffffffffe) add_key(&(0x7f0000000200)='big_key\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="ed4a5a44fc818ac7f4071fbed9d237ed0223cd931bf79f28242532c1b9b958509314bb9157a660f31e65182a00fabffe01e70d2efd955388554d6219539b499e7ed4eba4804c0de076b7c8eaf0a23eab38041af543a7e8c5d873ae2bd2229e0f5923fb544d9344e185d8e8e36b7b3bb7230950fb0eea0000", 0xfece, r1) 08:26:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000280)="0600a5057c7c735ca357de2fb33cf3e118cc0b09da7b4d70") setitimer(0x1, &(0x7f000000bfe0)={{}, {0x77359400}}, 0x0) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$get_security(0x11, r1, &(0x7f0000000140)=""/223, 0xdf) setitimer(0x2, &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}, &(0x7f0000000080)) 08:26:45 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000380)={0x1, 0x0, 0x103, 0x2, {0xc, 0x101, 0x3ff, 0x339}}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000002c0)={0x2, r1}) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000006c0), &(0x7f0000000700)=0xb) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000580)=@filename='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='fuseblk\x00', 0x40, 0x0) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f0000000540)={0x100, 0x42e}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000640), &(0x7f0000000680)=0x40) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) mount$overlay(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='overlay\x00', 0x8004, &(0x7f00000004c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c6e66735f6578706f72743d6f6e2c78696e6f3d6f66662c776f726b6469723d2e2f66696c65212c75707065726469723d2e2f66696c65302c646f6e745f61bc3f4d6d95e619a900"]) fstat(r3, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000200007041dfffd946f610500020000001f00000000000800050016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000100)={[0x29, 0x2, 0x833, 0x8, 0xfffffffffffffe04, 0x8fe8, 0xffff, 0x4, 0xf0c, 0x4, 0x9, 0x2, 0x905b, 0x81, 0x5, 0x5], 0x12000, 0x800}) 08:26:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f00000004c0)=0x1e, 0x4) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000300)="580000001400192340834b80043f679a10ffff7f4e32f61b26a054e8b0f23d12cdf1e422000000000100804824ca945f64009400050028925aaa000000000000008400f0ff00ff050000000010000100090ac2d00b0ccbd8", 0x58}], 0x1) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$cgroup_procs(r2, 0xfffffffffffffffe, 0x2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getgid() setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r2, 0x110, 0x3) fchown(r3, r4, r5) 08:26:45 executing program 1: request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)="010000000058eef0a35ca129463a32ca7893961adc2d6041", 0x1e3508315213921d, r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1c0000, 0x280000) keyctl$unlink(0x9, r1, r1) ioctl$ASHMEM_SET_PROT_MASK(r2, 0x40087705, &(0x7f00000000c0)={0x7, 0x90a1}) [ 279.513146] protocol 88fb is buggy, dev hsr_slave_0 08:26:45 executing program 5 (fault-call:5 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) memfd_create(&(0x7f0000000100)='{.]-\x00', 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000140)=0x80000, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x80000000000003, 0x0) fcntl$setstatus(r1, 0x4, 0x2400) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x440) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000380)=0x595, 0x4) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x0) readv(r3, &(0x7f0000001940)=[{&(0x7f0000000300)=""/115, 0x73}, {&(0x7f00000003c0)=""/210, 0xd2}, {&(0x7f00000004c0)=""/72, 0x48}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/169, 0xa9}, {&(0x7f0000001600)=""/246, 0xf6}, {&(0x7f0000001700)}, {&(0x7f0000001740)=""/103, 0x67}, {&(0x7f00000017c0)=""/208, 0xd0}, {&(0x7f00000018c0)=""/125, 0x7d}], 0xa) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40002010}, 0xc, &(0x7f0000000280)={&(0x7f0000001a00)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="040426bd7000fbdbdf250100000000000000014100000018001700000005000010007564703a73797a32000000008ef9d634613821745554899e915b294a2b75def0cc12f46c0c99b3ae71b01901abe6249d33e8dda6f402099a3f1b228dd768bec5ed5c9d5d3e0d870d62d98ba77d626116aff75aa68dda2d5d28abb62c80ce0e993d32183a7292ba5d92946b2f87a43392b9b51fcacb66efccf0ef1e17035ced0349c5ebd7a3a08be1b0550727ce06"], 0x34}, 0x1, 0x0, 0x0, 0x24000001}, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, 0x0, 0xffffffc6) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) 08:26:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000700)=0xff, &(0x7f0000000740)=0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$TIOCNOTTY(r0, 0x5422) fstat(r1, 0x0) name_to_handle_at(r0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)={0xef, 0x9, "fe4c4f448027e1c92215f4b8c710f0559c66862c3a2a74a1e3694c9aa04e26c57f49cf2d901ae36d52dc426e5969a995e785b40cb64cbd3eb693395ebbfd67ce3c1269a638710870b5d6bfb1bfc4681259bf82dd69585f1690db146e2b4c969a015a72d35fb66113e5822cee3eb1d6ba812dc41a81e808e9960861fdbb84a8b0cb55dbc22db1f2fdf58edd98bd412a16872c85960d739a715a8e78b1e0e61d7a99e034890d74685ffcce06d2907e4e2746a905410d299c42330004b8ede80f7004db3532c4b1765a37a801b5dbe123130c5ac49b48a8ce232a2fcc4b6b3f15819e3d78fb5f0397"}, &(0x7f00000006c0), 0x1000) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) 08:26:45 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000000c0)=0xab8) r1 = getpgrp(0xffffffffffffffff) prlimit64(r1, 0xd, 0x0, &(0x7f0000000100)) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 08:26:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$rxrpc(0x21, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000880)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000002640)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000008c0)={0x28, 0x2, 0x0, {0x4, 0x9}}, 0x28) recvmmsg(r1, &(0x7f0000008100)=[{{&(0x7f0000000000)=@x25={0x9, @remote}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000002680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/130, 0x82}, {&(0x7f0000000140)=""/75, 0x4b}, {&(0x7f00000001c0)=""/209, 0xd1}, {&(0x7f00000002c0)=""/209, 0xd1}], 0x6, &(0x7f0000000440)=""/8, 0x8}, 0x5}, {{&(0x7f0000000480), 0x80, &(0x7f0000001a40)=[{&(0x7f0000000500)=""/179, 0xb3}, {&(0x7f0000003680)=""/4096, 0x1000}, {&(0x7f00000005c0)}, {&(0x7f0000000600)=""/129, 0x81}, {&(0x7f00000006c0)=""/62, 0x3e}, {&(0x7f0000000700)=""/105, 0x69}, {&(0x7f0000000780)=""/237, 0xed}, {&(0x7f00000008c0)}, {&(0x7f0000001940)=""/242, 0xf2}], 0x9, &(0x7f0000001b00)=""/89, 0x59}, 0x1}, {{&(0x7f0000001b80)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001c00)=""/1, 0x1}, {&(0x7f0000001c40)=""/213, 0xd5}, {&(0x7f0000004680)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/254, 0xfe}, {&(0x7f0000005680)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/254, 0xfe}, {&(0x7f0000001f40)=""/136, 0x88}, {&(0x7f0000002000)=""/73, 0x49}, {&(0x7f0000002080)=""/30, 0x1e}], 0x9, &(0x7f0000002180)=""/235, 0xeb}, 0x5}, {{&(0x7f0000002280)=@pppol2tpv3, 0x80, &(0x7f0000006840)=[{&(0x7f0000002300)=""/200, 0xc8}, {&(0x7f0000002400)=""/213, 0xd5}, {&(0x7f0000002500)=""/210, 0xd2}, {&(0x7f0000006680)=""/177, 0xb1}, {&(0x7f0000006740)=""/218, 0xda}], 0x5, &(0x7f00000068c0)=""/125, 0x7d}, 0x5}, {{&(0x7f0000006940)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000002600)=[{&(0x7f00000069c0)=""/124, 0x7c}], 0x1, &(0x7f0000006a40)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000007a40)=@x25={0x9, @remote}, 0x80, &(0x7f0000008080)=[{&(0x7f0000007ac0)=""/254, 0xfe}, {&(0x7f0000007bc0)=""/138, 0x8a}, {&(0x7f0000007c80)=""/4, 0x4}, {&(0x7f0000007cc0)=""/191, 0xbf}, {&(0x7f0000007d80)=""/175, 0xaf}, {&(0x7f0000007e40)=""/142, 0x8e}, {&(0x7f0000007f00)=""/229, 0xe5}, {&(0x7f0000008000)=""/110, 0x6e}], 0x8}, 0x3}], 0x6, 0x40000000, 0x0) 08:26:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xe2w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11+4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={r2, 0x8000, 0x30, 0x2, 0x8}, &(0x7f0000000200)=0x18) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r1) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) write$FUSE_WRITE(r1, &(0x7f0000000140)={0x18}, 0x18) 08:26:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x4002, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 279.716980] FAULT_INJECTION: forcing a failure. [ 279.716980] name failslab, interval 1, probability 0, space 0, times 0 [ 279.801112] CPU: 0 PID: 14619 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 279.808266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.817626] Call Trace: [ 279.820226] dump_stack+0x138/0x19c [ 279.823870] should_fail.cold+0x10f/0x159 [ 279.828036] should_failslab+0xdb/0x130 [ 279.832030] kmem_cache_alloc_node_trace+0x280/0x770 [ 279.837143] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 279.842614] __kmalloc_node_track_caller+0x3d/0x80 [ 279.847551] __kmalloc_reserve.isra.0+0x40/0xe0 [ 279.852221] __alloc_skb+0xcf/0x500 [ 279.852232] ? skb_scrub_packet+0x4b0/0x4b0 [ 279.852244] ? __mutex_unlock_slowpath+0x71/0x800 [ 279.852256] netlink_ack+0x21c/0x9a0 [ 279.852271] ? netlink_sendmsg+0xc60/0xc60 [ 279.872990] ? mutex_unlock+0xd/0x10 [ 279.876713] ? genl_rcv_msg+0xe5/0x150 [ 279.880619] netlink_rcv_skb+0x2fc/0x3c0 [ 279.884692] ? genl_family_rcv_msg+0xc30/0xc30 [ 279.889284] ? netlink_ack+0x9a0/0x9a0 [ 279.893179] ? genl_rcv+0x1a/0x40 [ 279.896651] genl_rcv+0x29/0x40 08:26:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x8, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000280)=0x78) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="cfe0ede60de5d61cbe22a04b190768fca21f90af6ef7f854c94db47d1edcdf57badb3163795303945044f7dbb8ea617e8a"]) 08:26:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000000, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 279.899938] netlink_unicast+0x45d/0x780 [ 279.904008] ? netlink_attachskb+0x6a0/0x6a0 [ 279.908428] ? security_netlink_send+0x81/0xb0 [ 279.913017] netlink_sendmsg+0x7c4/0xc60 [ 279.917083] ? netlink_unicast+0x780/0x780 [ 279.921328] ? security_socket_sendmsg+0x89/0xb0 [ 279.926177] ? netlink_unicast+0x780/0x780 [ 279.930420] sock_sendmsg+0xce/0x110 [ 279.934141] ___sys_sendmsg+0x70a/0x840 [ 279.938127] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 279.942894] ? __fget+0x210/0x370 [ 279.946357] ? find_held_lock+0x35/0x130 [ 279.950421] ? __fget+0x210/0x370 [ 279.953893] ? lock_downgrade+0x6e0/0x6e0 [ 279.958052] ? __fget+0x237/0x370 [ 279.961517] ? __fget_light+0x172/0x1f0 [ 279.965498] ? __fdget+0x1b/0x20 [ 279.968873] ? sockfd_lookup_light+0xb4/0x160 [ 279.973380] __sys_sendmsg+0xb9/0x140 [ 279.977196] ? SyS_shutdown+0x170/0x170 [ 279.981182] ? fd_install+0x4d/0x60 [ 279.984826] SyS_sendmsg+0x2d/0x50 [ 279.988367] ? __sys_sendmsg+0x140/0x140 [ 279.992438] do_syscall_64+0x1e8/0x640 [ 279.996326] ? trace_hardirqs_off_thunk+0x1a/0x1c 08:26:45 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="eeccf46d60fe8a827431299e8cb93a6df9af9518f7b2d61b61a3b40116ad6bf1af5d6ffa01c383a4510ee64ec0f2aa4a6aa4bdd4511fca53d31a859ad75b8b627df3b8906bd8aae90620eaeaacb81254d94211dca6913984acfe236fd75303235916dec0a2da38d52aab2601c3c46e4656333049b076bf0bb123a9ef692a93d1af39c0d527b3c656062a76e4a035cdb76638b0a2c9dab61bf1dd6bfeca4481d150596973f039c9f0c1a6ca122578e2971bcbef"]) [ 279.996344] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.996353] RIP: 0033:0x4130d1 [ 279.996360] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 279.996372] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 279.996378] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 279.996384] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 279.996390] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 08:26:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$cont(0x18, r1, 0x0, 0x0) getpriority(0x1, r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x71}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 08:26:46 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f00000000c0)=""/53) add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, &(0x7f0000000100)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0xffffffffffffffc5, 0xfffffffffffffffe) [ 279.996399] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:46 executing program 5 (fault-call:5 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x51, 0x0, 0x0) exit(0x9f7) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r3, 0xc0485630, &(0x7f0000000080)={0x0, "17ab8883375ee8d7eb2919d7dcaba7fa4e3d741700043269c4b24bc2e81671a8", 0x3, 0x0, 0x5, 0x2000, 0x8}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) setsockopt$inet6_dccp_int(0xffffffffffffff9c, 0x21, 0x15, &(0x7f0000000000)=0x857, 0x4) ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000100)) 08:26:46 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="5af09ee1ef53f2aa1e10812ad4000000000000000045ea4925257fa1da14f87e4fbe3f9fd89d1f743d0febc90be62e83c4840106d724f1268b6bee5aa0787e3c453bd2e0bdfc204e67a70ecc64b1ae8b1512aef9c73612262b95fb726176ff152d6ffcae89c2757e0c68c0b62f007950ebc94e574ff3785d34de4a6f5daabc608fcf2f084d4a4b4db5c20a7ea894728eebb744cbbc33937bdc3c84a68e7c1cbb12d7c125"]) 08:26:46 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 08:26:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffefe, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f0000000180)="8f", 0x1, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000a80)=ANY=[@ANYRESHEX=0x0], 0x1}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14}, 0x14}}, 0x0) [ 280.227877] FAULT_INJECTION: forcing a failure. [ 280.227877] name failslab, interval 1, probability 0, space 0, times 0 [ 280.239421] CPU: 0 PID: 14668 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 280.240125] net_ratelimit: 3 callbacks suppressed [ 280.240131] protocol 88fb is buggy, dev hsr_slave_0 [ 280.246527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.246571] Call Trace: [ 280.246600] dump_stack+0x138/0x19c [ 280.251526] protocol 88fb is buggy, dev hsr_slave_1 [ 280.256458] should_fail.cold+0x10f/0x159 [ 280.281191] should_failslab+0xdb/0x130 [ 280.285183] kmem_cache_alloc+0x47/0x780 [ 280.289258] ? lock_acquire+0x16f/0x430 [ 280.293251] ? check_preemption_disabled+0x3c/0x250 [ 280.298282] skb_clone+0x129/0x320 [ 280.301834] dev_queue_xmit_nit+0x296/0x8c0 [ 280.306171] dev_hard_start_xmit+0xa7/0x8b0 [ 280.310506] ? assoc_array_gc+0x1180/0x11d0 [ 280.314840] __dev_queue_xmit+0x1d95/0x25e0 [ 280.319179] ? netdev_pick_tx+0x300/0x300 [ 280.323337] ? skb_clone+0x129/0x320 [ 280.327081] ? memcpy+0x46/0x50 [ 280.330374] ? __copy_skb_header+0x2b8/0x3e0 [ 280.334784] ? __skb_clone+0x271/0x800 [ 280.338680] dev_queue_xmit+0x18/0x20 [ 280.342480] ? dev_queue_xmit+0x18/0x20 [ 280.342493] __netlink_deliver_tap+0x503/0x7d0 [ 280.342511] __netlink_sendskb+0x1ad/0x1d0 [ 280.342521] netlink_unicast+0x64e/0x780 [ 280.342535] ? netlink_attachskb+0x6a0/0x6a0 [ 280.342550] netlink_ack+0x51d/0x9a0 [ 280.342563] ? netlink_sendmsg+0xc60/0xc60 [ 280.342574] ? mutex_unlock+0xd/0x10 [ 280.342584] ? genl_rcv_msg+0xe5/0x150 [ 280.351134] netlink_rcv_skb+0x2fc/0x3c0 [ 280.351145] ? genl_family_rcv_msg+0xc30/0xc30 [ 280.351157] ? netlink_ack+0x9a0/0x9a0 [ 280.351165] ? genl_rcv+0x1a/0x40 [ 280.351184] genl_rcv+0x29/0x40 [ 280.351192] netlink_unicast+0x45d/0x780 [ 280.351205] ? netlink_attachskb+0x6a0/0x6a0 [ 280.351218] ? security_netlink_send+0x81/0xb0 [ 280.351228] netlink_sendmsg+0x7c4/0xc60 [ 280.351242] ? netlink_unicast+0x780/0x780 [ 280.383492] ? security_socket_sendmsg+0x89/0xb0 [ 280.383506] ? netlink_unicast+0x780/0x780 [ 280.383519] sock_sendmsg+0xce/0x110 [ 280.383531] ___sys_sendmsg+0x70a/0x840 [ 280.383545] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 280.392028] ? __fget+0x210/0x370 [ 280.444879] ? find_held_lock+0x35/0x130 [ 280.448956] ? __fget+0x210/0x370 [ 280.452422] ? lock_downgrade+0x6e0/0x6e0 [ 280.456578] ? __fget+0x237/0x370 [ 280.460044] ? __fget_light+0x172/0x1f0 [ 280.464025] ? __fdget+0x1b/0x20 [ 280.467398] ? sockfd_lookup_light+0xb4/0x160 [ 280.471899] __sys_sendmsg+0xb9/0x140 [ 280.475707] ? SyS_shutdown+0x170/0x170 [ 280.479682] ? fd_install+0x4d/0x60 [ 280.479702] SyS_sendmsg+0x2d/0x50 [ 280.479713] ? __sys_sendmsg+0x140/0x140 [ 280.490924] do_syscall_64+0x1e8/0x640 [ 280.494817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.499673] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.504873] RIP: 0033:0x4130d1 [ 280.508064] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 280.515784] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 08:26:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xff, 0x8000) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f00000000c0)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x40505330, &(0x7f0000000180)={{0x1, 0xffffffff80000001}, {0x3ff, 0x5}, 0xfffffffffffffff9, 0x4, 0xb305}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="c60a27cd9f090800c3"], 0x1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f000003b000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) 08:26:46 executing program 1: add_key(&(0x7f0000000000)='\x00\x00I\xdc\x1c&', 0x0, &(0x7f00000000c0)="4ddc00000058ee98b1bbdca841fc8cd9789341ad00016041f80f884bd6a6e10b00208be3d4319139fedbf59c54eeeb837c9e46d3cf611457addb", 0x3a, 0xfffffffffffffffe) 08:26:46 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) restart_syscall() r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="4ab51f7676804cd2fa8b8de94137053566e4f7655d9a590cb677ff4d852d3be58028e53a3e215094b05e0d2c3521025b425786fb63075ce2bf6cc55343ec1869f700"/76]) [ 280.523066] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 280.530347] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 280.537628] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 280.544893] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 [ 280.552565] protocol 88fb is buggy, dev hsr_slave_0 [ 280.557673] protocol 88fb is buggy, dev hsr_slave_1 08:26:46 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="01bbdca8e1e77897424557fb5b756641fc8cd97893961adc2d6041", 0x1b, 0xfffffffffffffffe) 08:26:46 executing program 5 (fault-call:5 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:46 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="f5090169e501"], &(0x7f00000002c0)=0xa) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e24, 0x6, @mcast2, 0x7}}}, &(0x7f00000004c0)=0x84) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1003, 0x1d8, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 280.725443] FAULT_INJECTION: forcing a failure. [ 280.725443] name failslab, interval 1, probability 0, space 0, times 0 [ 280.736774] CPU: 0 PID: 14704 Comm: syz-executor.5 Not tainted 4.14.125 #19 [ 280.743883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.753239] Call Trace: [ 280.753263] dump_stack+0x138/0x19c [ 280.753282] should_fail.cold+0x10f/0x159 [ 280.753298] should_failslab+0xdb/0x130 [ 280.753319] kmem_cache_alloc+0x47/0x780 [ 280.753337] ? lock_acquire+0x1ea/0x430 [ 280.775675] ? check_preemption_disabled+0x3c/0x250 [ 280.780790] skb_clone+0x129/0x320 [ 280.784335] dev_queue_xmit_nit+0x296/0x8c0 [ 280.788664] dev_hard_start_xmit+0xa7/0x8b0 [ 280.792984] ? assoc_array_gc+0x1180/0x11d0 [ 280.792997] __dev_queue_xmit+0x1d95/0x25e0 [ 280.793014] ? netdev_pick_tx+0x300/0x300 [ 280.793023] ? skb_clone+0x129/0x320 [ 280.793037] ? memcpy+0x46/0x50 [ 280.793048] ? __copy_skb_header+0x2b8/0x3e0 [ 280.817203] ? __skb_clone+0x271/0x800 [ 280.821104] dev_queue_xmit+0x18/0x20 08:26:46 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$inet_buf(r1, 0x0, 0x20, &(0x7f00000002c0)="dd114764b017a5b758a0a53e06a1153b31679d4977eb4b85cafc028c3089d28db92ccaccb2d5a9c82c1a7793926299e17d050dbf26eb9de7f8b76d78746fc819b4eaf47743c788e13b805a6dba897497edfc75f2a06b6fc56f56d3b2f92f1bf72fd0cfadb64ef73c2118816345dda266f0f5d5892a1be17dd8ff2e503b78c29bebce3d0a87e4eccc8704135126b1560cbcd0afa6dbecc36675bc31f579d8e2993cfcaacf", 0xa4) add_key(&(0x7f0000000180)='blacklist\x00', &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, &(0x7f0000000140)="210000000058ee98b1bbdca88cd97893961adc2d60410000", 0x18, r0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000280)=0x17) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000200)='irlan0\x00') 08:26:46 executing program 1: getresuid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x40000, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x5}}, {@timeout={'timeout', 0x3d, 0x7fffffff}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', r0}}, {@appraise_type='appraise_type=imasig'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}}) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x402, 0x1c0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) [ 280.824912] ? dev_queue_xmit+0x18/0x20 [ 280.828927] __netlink_deliver_tap+0x503/0x7d0 [ 280.833512] __netlink_sendskb+0x1ad/0x1d0 [ 280.833523] netlink_unicast+0x64e/0x780 [ 280.833536] ? netlink_attachskb+0x6a0/0x6a0 [ 280.833551] netlink_ack+0x51d/0x9a0 [ 280.833562] ? netlink_sendmsg+0xc60/0xc60 [ 280.833574] ? mutex_unlock+0xd/0x10 [ 280.833584] ? genl_rcv_msg+0xe5/0x150 [ 280.841872] netlink_rcv_skb+0x2fc/0x3c0 [ 280.841884] ? genl_family_rcv_msg+0xc30/0xc30 [ 280.841894] ? netlink_ack+0x9a0/0x9a0 [ 280.841902] ? genl_rcv+0x1a/0x40 [ 280.841919] genl_rcv+0x29/0x40 [ 280.841928] netlink_unicast+0x45d/0x780 [ 280.841941] ? netlink_attachskb+0x6a0/0x6a0 [ 280.863416] ? security_netlink_send+0x81/0xb0 [ 280.863431] netlink_sendmsg+0x7c4/0xc60 [ 280.863447] ? netlink_unicast+0x780/0x780 [ 280.863462] ? security_socket_sendmsg+0x89/0xb0 [ 280.863473] ? netlink_unicast+0x780/0x780 [ 280.863485] sock_sendmsg+0xce/0x110 [ 280.863498] ___sys_sendmsg+0x70a/0x840 [ 280.872139] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 280.872150] ? __fget+0x210/0x370 [ 280.872163] ? find_held_lock+0x35/0x130 [ 280.872173] ? __fget+0x210/0x370 [ 280.872191] ? lock_downgrade+0x6e0/0x6e0 [ 280.872207] ? __fget+0x237/0x370 [ 280.872220] ? __fget_light+0x172/0x1f0 [ 280.872231] ? __fdget+0x1b/0x20 [ 280.872240] ? sockfd_lookup_light+0xb4/0x160 [ 280.872252] __sys_sendmsg+0xb9/0x140 [ 280.872262] ? SyS_shutdown+0x170/0x170 [ 280.968933] ? fd_install+0x4d/0x60 [ 280.972554] SyS_sendmsg+0x2d/0x50 [ 280.976075] ? __sys_sendmsg+0x140/0x140 [ 280.980125] do_syscall_64+0x1e8/0x640 [ 280.983996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.988836] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.994025] RIP: 0033:0x4130d1 [ 280.997196] RSP: 002b:00007f29fe09c9c0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e [ 281.004892] RAX: ffffffffffffffda RBX: 00007f29fe09ca58 RCX: 00000000004130d1 [ 281.012143] RDX: 0000000000000000 RSI: 00007f29fe09ca00 RDI: 0000000000000006 [ 281.019396] RBP: 0000000000000006 R08: 0000000000000009 R09: 0000000000000000 [ 281.026657] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f29fe09ca40 [ 281.033927] R13: 00000000004cfb68 R14: 00000000004de888 R15: 0000000000000005 08:26:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001200)="11dca5055e0bcfec7be070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80000000, 0x867aa859a83f2bde) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/170, &(0x7f0000001140)=0x1f) r2 = syz_open_procfs(0x0, &(0x7f0000001180)='map_files\x00') getdents(r2, &(0x7f0000000140)=""/4096, 0x1000) setsockopt$inet6_int(r2, 0x29, 0x49, &(0x7f00000011c0)=0x8, 0x4) 08:26:47 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0xffffffffffffff79, 0x4) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x2, @bcast, @rose={'rose', 0x0}, 0x4, [@bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000140)=0x1c, 0x4) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:47 executing program 5 (fault-call:5 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='./bus\x00', 0x161045, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvfrom$unix(r0, &(0x7f0000000200)=""/83, 0x53, 0x0, 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/207) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x4) syz_genetlink_get_family_id$nbd(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)=0x101) seccomp(0x1, 0x0, &(0x7f0000001980)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x9}, {0x6}]}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) getgroups(0xa, &(0x7f0000000140)=[0xee00, 0xee00, 0x0, 0xee00, 0x0, 0xffffffffffffffff, 0x0, 0xee00, 0x0, 0x0]) write$FUSE_ENTRY(r0, &(0x7f0000000440)={0x90, 0x0, 0x8, {0x2, 0x1, 0x7fff, 0x1, 0x62, 0x4, {0x0, 0x6, 0x1, 0x5, 0x9, 0x211, 0xfffffffffffffffa, 0x100, 0x8e, 0x3f, 0x8, r1, r2, 0x8, 0x3}}}, 0x90) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) 08:26:47 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="ba7f5ea0fe46a75b81a917eeab7a25c78ca66ad4fb400c32161963b9fc0b58f9ae4cabf7f8fc4f5157888d3968b0946e37dafea9d72a4fabbcb7ea78e226bb632463336098e6fc78243e619cb7feac9903e1a2520fcc520da8a8808b5fc73425e159b8cd25d4"]) 08:26:47 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) fcntl$addseals(r3, 0x409, 0x0) sendto$inet(r3, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000140)=0xffffffffb5143b3c) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x75c3, 0x0, 0xffffffffffffffff) 08:26:47 executing program 1: r0 = socket(0x3, 0x80000, 0x93) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000000c0)=0x5, 0x4) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000040)="010800000058ee9800bbdca841fc8cd97893961edc2d6041b50899cfa3", 0xffffffffffffff11, 0xfffffffffffffffe) 08:26:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0x7, &(0x7f0000000000)='TIPCv2\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=r2, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 281.348909] __ntfs_error: 1 callbacks suppressed [ 281.349014] ntfs: (device loop2): parse_options(): Unrecognized mount option ^F[z%njj@ 2c XLOQW9hn7*Ox&c$c3`x$>aRR _4%Y%. 08:26:47 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') fcntl$getown(r1, 0x9) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)) fcntl$getown(r0, 0x9) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000080)='net/sockstat6\x00') sendfile(r3, r1, 0x0, 0x1) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) sendfile(r3, r1, &(0x7f0000000140), 0x5) 08:26:47 executing program 1: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000140)="63bb50321a28b39fd97054b067f7d3898ee8833990d7dfd902f6626a98a07f5eb93b8dd8fbe0fb10bde97c8399ffd41c7cf5fc8c72b24291e622ab3c6bb47a78e51364918cb95e6460aab0bc2a4b9dc78261779b7c3a470704029016ed69e932a5f1d5ce3809fbb1430f86f2", 0x6c, r0) prctl$PR_GET_CHILD_SUBREAPER(0x25) add_key(&(0x7f0000000100)='rxrpc\x00', 0x0, &(0x7f00000000c0)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:47 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x18) ioctl$int_in(r0, 0x8000008010500d, 0x0) 08:26:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000000f, 0x4, 0x4, 0x5}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x5f6, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x4}, 0x10) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x0, r1, 0x1}) 08:26:47 executing program 2: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000002c0)=""/29) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x20000000f, 0x4, 0x4, 0x5}, 0x2c) r1 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x5f6, 0x0) ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000000c0)) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x4}, 0x10) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000100)={0x0, r1, 0x1}) 08:26:47 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) write(r0, &(0x7f0000000180)="428ac76fa71b89dcb419360d9e3e19738fdbfcc8ae0919076865b917e7f1daefeaae264f7510c158a309a8c3300ef81102e5f39fac58784e553c599c33ade5a12960ad8b5e4b581d2a3f4256c815e0988511b8b55c4355c4696100074dfb25b98d6aeae64b3588dae7b067f519aafcb4c6b192cfa3b6da5d7316dcd0b72db7d14d39102a8a884a357ac30762369641305e9f33a494e64d4893b31c1d078fa65a15797888a1d3bf9840786299c61ad843af27293ec40583be444db11bfa84a33191b248775d0e88668b31dacb5a2d04125e", 0xd1) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:47 executing program 1: add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:47 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0xc0605345, &(0x7f0000000280)) 08:26:48 executing program 4: clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000005580)=[{{&(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/65, 0x41}], 0x1, &(0x7f0000000200)=""/146, 0x92}, 0x80000000}, {{&(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002580)=[{&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/124, 0x7c}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/168, 0xa8}], 0x5, &(0x7f0000002600)=""/138, 0x8a}, 0x1}, {{&(0x7f00000026c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000002900)=[{&(0x7f0000002740)=""/136, 0x88}, {&(0x7f0000002800)=""/207, 0xcf}], 0x2, &(0x7f0000002940)=""/92, 0x5c}, 0x6}, {{&(0x7f00000029c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000002a40)=""/255, 0xff}, {&(0x7f0000002b40)=""/121, 0x79}, {&(0x7f0000002bc0)=""/4096, 0x1000}], 0x3, &(0x7f0000003c00)=""/50, 0x32}, 0x3f}, {{&(0x7f0000003c40), 0x80, &(0x7f0000004040)=[{&(0x7f0000003cc0)=""/89, 0x59}, {&(0x7f0000003d40)=""/91, 0x5b}, {&(0x7f0000003dc0)=""/69, 0x45}, {&(0x7f0000003e40)=""/91, 0x5b}, {&(0x7f0000003ec0)=""/101, 0x65}, {&(0x7f0000003f40)=""/231, 0xe7}], 0x6, &(0x7f00000040c0)=""/236, 0xec}, 0x5}, {{&(0x7f00000041c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80, &(0x7f0000005440)=[{&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f0000005240)=""/77, 0x4d}, {&(0x7f00000052c0)=""/118, 0x76}, {&(0x7f0000005340)=""/78, 0x4e}, {&(0x7f00000053c0)=""/27, 0x1b}, {&(0x7f0000005400)=""/35, 0x23}], 0x6, &(0x7f00000054c0)=""/188, 0xbc}, 0x400}], 0x6, 0x2000, &(0x7f0000005700)={0x0, 0x989680}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000005780)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000005840)={&(0x7f0000005740)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000005800)={&(0x7f00000057c0)={0x24, r2, 0x22, 0x70bd25, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x48050) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="e1", 0x1}], 0x1) 08:26:48 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xfd13, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:48 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f00000002c0)=""/29) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:48 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockname$ax25(r0, &(0x7f0000000100)={{0x3, @netrom}, [@null, @netrom, @bcast, @null, @bcast, @null, @remote, @default]}, &(0x7f0000000180)=0x48) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x125080, 0x0) bind$isdn(r1, &(0x7f00000000c0)={0x22, 0xbe0c, 0x9, 0x5, 0x2}, 0x6) 08:26:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") clone(0x10040000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() io_setup(0x1000, &(0x7f00000000c0)=0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x7, 0x4) io_destroy(r2) ptrace$setopts(0x4206, r1, 0x0, 0x0) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x4000) connect$bt_l2cap(r3, &(0x7f0000000080)={0x1f, 0x3110, {0xffff, 0x4, 0xffff, 0x3, 0x3, 0xe0}, 0x611, 0x6}, 0xe) tkill(r1, 0x1c) wait4(0x0, 0x0, 0x0, 0x0) 08:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000100)={0xff, 0x1, 0x1ff, 0x6, 0xa5e5}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) ioctl$EVIOCGRAB(r1, 0x40044590, &(0x7f0000000000)=0x2000) 08:26:48 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000000c0)=0x1, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'irlan0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x8927, 0xa07000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'team0\x00', 0x4800}) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 08:26:48 executing program 1: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000040)='.dead\x00', &(0x7f00000000c0)={'syz', 0x1}, r0) 08:26:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) socket$inet(0x2, 0xd34916b770e6d407, 0x8) socket$netlink(0x10, 0x3, 0x9) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) sendfile(r0, r1, 0x0, 0x8000fffffffe) 08:26:48 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x84000220}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x38, r2, 0x700, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x14, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4a0}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x4000) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') getpeername$inet(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) 08:26:48 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000180)="012100fbb21b0f1346480588bad150b74938f35c6afbcb0e2b19f6e9eccc1f011c4cd256dc011a69eb67445bcc4f6b2a88a119533561603ddb379f2fbab8b345c64f19fe722f0b0bf41c3f634bed5d1b97bac514e9d1000050bab1b7e1ccc7", 0xfffffffffffffd0e, 0xfffffffffffffffe) [ 282.322199] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 08:26:48 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) request_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000380)='/dev/uinput\x00', 0xfffffffffffffffc) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000004c0)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000180), 0xc, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB="05000004", @ANYRES16=r1, @ANYBLOB="00002abd7000ffdbdf25080000000c000100080001000a00000024000200080005000400000008000800010000000800080004000000080002004e2200000800040005000000380002000800080001000000080007000000000014000100ac1e000100000000000000000000000008000b000200000008000400030000001400020008000d000100000008000300070000000800050008000000340002000800060009000000080002004e20000008000600ff0f0000080009007e6d0000080008004000000008000b00020000000800040002000000"], 0xdc}, 0x1, 0x0, 0x0, 0x4001}, 0x4040080) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) syz_open_dev$dri(&(0x7f00000006c0)='/dev/dri/card#\x00', 0x6, 0x100) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="a671c3295d31bc2237be2ebd7d2896e1d9646790ce7eb27b2022e0171021f103f5fc7feeac907c24860d4cf0fe5ef13e9c3551baa5775a3b5651b5d0d8f74ac7ca417e4aaaa6ad2bb3eaf4bd103227f5e7154421fa04000000000000000000000000004b724c866619"]) [ 282.391937] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 08:26:48 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) r1 = add_key(&(0x7f0000000240)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="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", 0x1000, 0xfffffffffffffff9) add_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="1ef7f14f3efce67b12e8971bae8b7a67215f78587dc0deb149073956317cba4504bdc7f2e62adb7e3a3ee3d8f5e800d1", 0x30, r1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r2, 0x9, 0x8000, 0x4, 0x0, 0x12}, 0xfffffffffffffdda) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 282.463814] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 08:26:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f00000001c0)) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x100000000) r4 = semget(0x1, 0x0, 0x80) semctl$SEM_INFO(r4, 0x7, 0x13, &(0x7f0000000300)=""/252) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e24, 0x10001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xe5b5}}, 0x7ff, 0x81}, &(0x7f00000000c0)=0x90) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={r5, 0x80000000, 0x9}, 0xc) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000100)={0x80000000, 0x9, 0x452}) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000540)={'nat\x00'}, &(0x7f00000005c0)=0x78) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f00000002c0)={0x1, &(0x7f0000000200)="237ef5a89f0861076caa979c1aae3be0138fe197cf1b11965d21f8816c882262bb46cb7bb5a2a550350405b95c881206dd3301ca34c53aa888acca62eea62ec6b87afe6298fe67f4e75b8dc601ee197df4b7de7d4d8da3fa04e2dbae1debf3366dac6c660c889f592513f7cfb174100545994231da8a25536b87393c894791997db9e8364e4fc880932ae85bf51b4dc07e238ea4b1f0528348a93006015f5b7777f83a2e66b1944fe8a6bbcc9fffa81f"}) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f0000000500)={0x9e10, 0x3, 0x3c}) [ 282.532631] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 [ 282.544598] ntfs: (device loop2): parse_options(): Unrecognized mount option q)]1"7.}(dg~{ "!|$ L^>5QwZ;VQJA~J+2'D!. [ 282.601733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 [ 282.661232] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 [ 282.721887] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 [ 282.771203] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 [ 282.837167] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 [ 282.853761] IPVS: ftp: loaded support on port[0] = 21 [ 282.877717] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pig=14839 comm=syz-executor.4 08:26:49 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:49 executing program 1: mount$overlay(0x0, &(0x7f0000001500)='./file0\x00', &(0x7f0000001540)='overlay\x00', 0x40009, &(0x7f0000001580)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@index_off='index=off'}, {@metacopy_on='metacopy=on'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '!'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000001300)=ANY=[@ANYBLOB="04190000d9cbf6d65923904af50564133bbae2d5bc6054ba3eb30b3041788e8904006150adadc7aee96f3a5924e7d7e85c6c21c8500a95eca5ae72b65b0eb6bfa3a8844303edd7a378d824fb030000008db61234aa116b0445d96293110766312d7d1a63e3ccbd09f81483c6a7636a94fd8ed70cf8ea721d28a5d16b891334d716a5cee7b008c3cf2c76c456d245b4fa3918c41acb99817e00000000000000000000009d8ed1aadf14df75f6b6faac986493fdc2d4e33c228c55a3ffea3f79fdad32fc4c5b37276200b80e861d9d7d9285d98c53f89ff824feecd91cd514f8dcfbfa903e012c7130644dd6ecf2f8013c1a0023714066b93c63549798b597393eababe3fe318ed2ba6426adbdd75f7083c77aba8fd8a651d6f8d8f3294e3b6f919006a4bbeb2402bc054fddfaee2387f61a1b6fe7eab9a9641e8b34819bf30f5ccecf929f0dfe54703e91c0bc3020be4ea6fb4222fca16a350420053c927d2dfafa9ffce628b90e5055bcbb72c7f8de525bbcc069191fb288743af4f4a74c1aeda6a55eda8f9c50716430045fbfaac83fbe45b927c81c2500"/429, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x14) syslog(0x0, &(0x7f0000000140)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={0x0, 0x1}, &(0x7f0000001140)=0x8) ioctl$IMGETCOUNT(r0, 0x80044943, &(0x7f00000014c0)) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000001180)={r1, 0xfa, "bfb87accbcc6858462964ea0be1d95f3ed1b53141cb8fabec563e5acddb390ed6ccc510a8b9e6843eddc4d834f55a86e2bf70f330a42ddfd3df7ed1f7c9216fa73c9cffd6f458369b68cac8a0b5aa62e92974f2803618fdffe2e7a409e86ada8b876c9ed3dcd222dccbd505cf8eb8ead31910a769202193246eab396eeb0f08816f7bf31b208f72244576ed6ad9af5eaebdcad143881fd43bd09967d7c0f08158ec9637898a58c8cdf16f706d80fa250ddeb602fbcfb3625b23d4c869c195ef88b3b26bec0decae5b6f5d393e46577133a7c02f106295229f51f7544839ca26db4f4759c09a5990c5b0a9d8c6035482d2c55f642749f82e97621"}, &(0x7f00000012c0)=0x102) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0xf809, 0xfffffffffffffffd}) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x94ef, 0x2) r2 = syz_open_pts(r0, 0x109002) fcntl$setstatus(r2, 0x4, 0x102800) write(r2, &(0x7f0000000000), 0xffffff86) 08:26:49 executing program 4: setrlimit(0xb, &(0x7f0000000000)) timer_create(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x40) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000080)={0xf7e, 0x3, 0xa5dc535, 0x400003, 0x8001, 0x8, 0x80000000}) 08:26:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') 08:26:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000000)=0xffffffffffff8001) getsockopt$inet_tcp_int(r1, 0x6, 0x14, 0x0, &(0x7f00000000c0)=0x106a) 08:26:49 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xffff, 0x301840) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x503100, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000200)={0x18, 0x0, 0x6, {0x4}}, 0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000280)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000002c0)=0x24) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000300)={r2, 0x9}, &(0x7f0000000340)=0x8) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f00000000c0)={{0x0, @name="97e3b2ac1d6b264ca6fbf62d407bf2981b2221ed64ceac23ab09333c447adf16"}, "4d407346cacfba3cef68ed94ae0ae2c279b5772150f716105459d186de7e6078", 0x3}) 08:26:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x2000000080002, 0x100000000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in, @in6=@mcast2}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000200)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x2, 0x238, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x2b0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x20000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000240)={0x55e1}) fsetxattr(r0, &(0x7f0000000000)=@random={'os2.', '\x00'}, &(0x7f0000000040)='broute\x00', 0x7, 0x3) [ 283.207658] audit: type=1400 audit(1560587209.144:97): avc: denied { syslog } for pid=14884 comm="syz-executor.1" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 08:26:49 executing program 3: clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000000)={'rose0\x00', {0x2, 0x0, @loopback}}) ptrace$setopts(0x4206, r0, 0xf15, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r2, 0x1, &(0x7f00000000c0)={{0x77359400}, {r3, r4+10000000}}, &(0x7f0000000100)) tkill(r0, 0x23) wait4(0x0, 0x0, 0x0, 0x0) 08:26:49 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) r1 = msgget(0x3, 0x44) msgsnd(r1, &(0x7f0000000280)={0x0, "30913710e754761ce097713e09d40f15350af055f9d73b9eb4ec8b578815536decd7ff11234eed13dd8df0e605a68bf5da61b60f8c3e2f64fb1f82bee7e59adb0043c803f5c012d9c8619542a3a7ae23cd96298a3cac10238f41dc529b34660f4017429315e5c69d6de97640"}, 0x74, 0x800) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0xc4, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa7eb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x16a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8010) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) lsetxattr$security_capability(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000640)='security.capability\x00', &(0x7f0000000680)=@v2={0x2000000, [{0xffffffffffff6319, 0x401}, {0x8, 0x3}]}, 0x14, 0x3) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0, @ANYBLOB="07005059cf22a2b5264803000800b400aec905f700103608"], &(0x7f0000000140)=0x1c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r3, @in={{0x2, 0x4e20, @multicast2}}}, &(0x7f0000000240)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x4, 0x6, 0x8000, 0x1f, 0x8, 0x9, 0x7, 0x2, r4}, 0x20) 08:26:49 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x0) close(r0) 08:26:49 executing program 0: r0 = socket$packet(0x11, 0xfffffffffffffffc, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000003e80)=[{0x20, 0x0, 0x0, 0xffffffffffff7fff}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x157, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4(r1, &(0x7f0000000000)=@l2, &(0x7f0000000100)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xfffffffffffffff8}, &(0x7f0000000180)=0x8) sendmmsg$inet_sctp(r0, &(0x7f0000005480)=[{&(0x7f00000000c0)=@in={0x2, 0x4e20, @rand_addr=0x9}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)}, {&(0x7f00000003c0)="7c818af73e54e710a5fce7565b374c0418c66f035f7b007fa960d0550df3b7e6673ee3be94f9905dc2", 0x29}, {&(0x7f0000000400)="ae4dbf278809ad740ddcfaa13562416262d662920b6a2d5cfacca060d7094d4f2f5c560121106e730b27460ee93a1b6372", 0x31}, {&(0x7f0000000440)="2daa214f9bb5baa8fe57d127f5d08e434346e22187e4351001af78319f0aec0d84c33b71cf8e01abfda5bc5dff89c72b605af32ace071c4300107bbce20aa5326671a9dcec", 0x45}], 0x4, &(0x7f0000000500)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}, @init={0x18, 0x84, 0x0, {0x4, 0x8, 0x400, 0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x3, 0x800c, 0x7, 0x3f, 0x80000000, 0x7ff, 0x20, r3}}], 0x68, 0x4000045}, {&(0x7f0000000580)=@in={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000002ac0)=[{&(0x7f00000005c0)="477b02736a5b8b88dfe7688444e95d39772cd62eff195ba5ad5347ea2bed024419920bc5399f4e90d40b2b2c5fce7eb0aba7c2a9726ea36fb71eace6e22d70ca310d532c6cae32b934230243f50355168a98106644ab67d248966e32d510a780c2100d61e9760c540df6fc096942e2c1e9350c3920b1a7b85a6e276a8b1d6aae6d6ce10e51bd1bdb623858a8c1d7f9a5ffad9ccbb2f56c758e5f8c776b16", 0x9e}, {&(0x7f0000000680)="f37868234b97c5ea0019f93911391c5b5095a96b3ab056031cc9a7f4c4c409d79365c634689cfced8ba8dea358719612c9d38d3834dacd751daa7cb36a471c8f2c1497f2b29399b8ad9af8b8dfe6bc192d1a0308ab52b6437fda76c6e608a7e4a90fad79e2c9a1456a4678ad9516053fd66ac729da851de04f82eec0f03e435315e18d770c671ab04290a1e00fed8ff79057e29f17df34e9451792507767e745913e", 0xa2}, {&(0x7f0000000740)="a3b879caeca1b37f0d", 0x9}, {&(0x7f0000000780)="3dd2b04a475c36b5aef98149ea66bc868066c17cf86cea0e0671925011262a22e0626edd2df3bb4bdaba9d63d23f84602d3ee86e71ce41631b9b7867180be4d0ad4370271fade7cc66b5a38d785a7c09faecfb0e4c6e979eceff82925c0453dd0edcdbf40edcf295216895efcce11bb322bc9e3cc9f49a4affea2ed8fad50b870c96653f54a980b0c61aad325a1d94b886318dc1fb052dd010d44aba878b1c9fa7d179fc58c5002a5676e40c62c264ce202a183691de7674f036ce0f35f650a379724c24785966d5", 0xc8}, {&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="b8b04712e7ac1399d5cd048796945f296d751cb1e2de6e3f6957473dbb9b8bada63e777b124657b3f0e9fa5ac848de9bcad734921fb3e4790f95b5be34e174e3df4e6cb46a74e0de7b82d481fd9b080c13981d1e3dcf51db611e83f32a70013744d2f21716758c224ff7b356154400035251b392ba75071f1c12d35aae9f9ec328fecd5dd214b8044444185e75923b9364087cb703b5fd0a9c161a453539f5811e547770ea0755f39ad83d4f8d116735d42fecca9e7b4d9e1086bd4ce3237af5cb", 0xc1}, {&(0x7f0000002980)="b0ae2a87620e0d233bc97e357dc7e21548f17e156eb81c4d7fa513b5ec6f89107e5afffb7b9ef8b9c6b521553241c731684002f1c8a56486ffdd98a6d30bad50c4c201d856023b921f03927dd2f2c4f5bc7e893ac1e89e94132ed331d15d242281d12a8b3dc7919c2235c47f9da60e358313423ca1273635a5ea1c0e97720416b69d58401488014f37951cc82eb63b7c86605c8d0d0e230348177b83c36e3a964408d23efc6772524e5cb6081a0b988aa875c251dbb6ccf88854f9c9ef37d6f9fa718a4a947bea74658418cb6ba3551d40bc149fd035f55ee9e82946dda512b2b5ce14", 0xe3}, {&(0x7f0000002a80)="5cfaf740bfd23e3370e31c7b76274af552be188ad7c352434b81f411717eca2c902110b7eed82e29931aafdc0de6fe", 0x2f}], 0x9, &(0x7f0000002b80)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x4}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x200, 0x2, 0x1c, r3}}, @authinfo={0x18}, @init={0x18, 0x84, 0x0, {0x2, 0x7, 0x6, 0x13}}], 0x68, 0x40000}, {&(0x7f0000002c00)=@in6={0xa, 0x4e24, 0x446, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, 0x1c, &(0x7f0000002dc0)=[{&(0x7f0000002c40)="2bfbe085652b8cae6ae182f175e70951b4dcc8fceb369e55ba0d9c67e55f65c54456d57976c8222899fa325b1296b998a840e8f8e0201d74b3473b9643a52eedd9095c479186aad1ff29b33ad610944167efc3a123caf6acdeeb9ae0493a", 0x5e}, {&(0x7f0000002cc0)="67f81ad757c091219a8f22a4b7f2faf1f53cdefbc44f8206aa754b9323876af97703a4304a8659a89ec51efe4c6702188d291406d506f6fc308e909e863ec0ae7b16d6fb86652f67e0512b165eeec5513194b1fe786202c8c28836f40feb5507fb6c998f48df5c5d0921cd4d4188ab3bc02529dc3e2a0744adcb22b500d477b115fb84f59556be7b0ff7872e7d66f83cf26b3dd46bf3ed2e385ad09929049403d1979b3bfd6f679a996f928560669c7f802e214d9694cdb15baa2755fce6e6ea5bafd3aa3cfa615792649ea2777f6857c229c73d6b84a0b2d4bc", 0xda}], 0x2, &(0x7f0000002e00)=[@sndinfo={0x20, 0x84, 0x2, {0xffff, 0x204, 0x6, 0x1, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @empty}, @init={0x18, 0x84, 0x0, {0x6, 0xe06f, 0x5, 0x662}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x74}}, @prinfo={0x18}], 0x80, 0x4000000}, {&(0x7f0000002e80)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000003140)=[{&(0x7f0000002ec0)="fbe27d60ebffcf788147c4097b12ecc2d97ae7ba2c19c6224407b187207547d7ef970f3ac3b12e3116f5d2b792ee072b14d9399f0973645bd28453161f0c591283fe1368745d323b79c277f7b2d6108c658a432417104533cb610df80061930429e5742b9c2036abda4e112586b53b7ee248e96f90900584ee8faa618d1f33f1ed7970a2add98da3884d535d18a933071761a66179b98d83f6d0b3bfc9d1363b56cdb47e72391ba78dca50989fe896c693978bff37299d3fe392cc", 0xbb}, {&(0x7f0000003ec0)="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", 0x1000}, {&(0x7f0000002f80)="df463d68ebea97651b07a8922705cf73176367b59554bbe768109efcecd207e6f5ee2abbf70e7b81b5cc6be89cb0746a07dc86e22bd129", 0x37}, {&(0x7f0000002fc0)="e76f23eb5fc27d488da293551fbd79cf691b9e17f218b78f04c0d9312fadd219361e521f04946489e4bde04caebf97f88b5d17870e04de3c464ef8a44c668dd3c179", 0x42}, {&(0x7f0000003040)="74bdebcb26b6fd4b36ffbfb607686f1fa0f0aa008383852c016664c0a9202038572739a15c838288325392e507ed5d702ca91dac51aab855a7f7e00d845c46b447e16cfe0b710a9989c03d306fb28309ef61d8d9ac404879461e84bbe31e0bd65b86119633028936389c45c93399264077952a54e626cad84e53e314c102099408ba2bb5047ab12ab88bb7ef72e0b62c9e50059326c934a8e89d47bd40f5b89d189b2ff5e2851c20b082310e3d21595397e123a2637e809246ad947b0a711e93bf110215e320e7", 0xc7}], 0x5, &(0x7f00000031c0)=[@prinfo={0x18, 0x84, 0x5, {0x30, 0x81}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x7}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @sndinfo={0x20, 0x84, 0x2, {0x9, 0x9, 0xfff, 0xcc1, r3}}], 0x68, 0x24000004}, {&(0x7f0000003240)=@in6={0xa, 0x4e20, 0x6, @loopback, 0xffffffffffffffe1}, 0x1c, &(0x7f0000003540)=[{&(0x7f0000003280)="d71acc59cf7138e180ef07eecf34615337c6180f14bce95a2368c035befb3d6069fa8fb1108d17cb302455654f76cbbba422ad26cb33575017a08ccf10d94d1716159acee475bb3ce6dc7ff56021d79d7513df397863a28f6e048f02920fdfe8d2006dc1ce2e", 0x66}, {&(0x7f0000003300)="2fe8dac074d9b7d0d3228f8446f00797b098eb1309bca907e4cc1e30041bd6", 0x1f}, {&(0x7f0000003340)="acbdecd713dbdef6a7f1aa78d2a2d9c563231b457ed1787933c78738", 0x1c}, {&(0x7f0000003380)="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", 0xfe}, {&(0x7f0000003480)="1a4a4ae6", 0x4}, {&(0x7f00000034c0)="5b8df4c991cc58f229049f8f506f1edf0929d21920b5f4231e084ead39544e8766e79c1f", 0x24}, {&(0x7f0000003500)}], 0x7, &(0x7f00000035c0)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18, 0x20040000}, {&(0x7f0000003600)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000003a80)=[{&(0x7f0000003640)="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", 0xfb}, {&(0x7f0000003740)="42c62aa1a787242b93c535203209b7a1fabf3416a7b72dea34a2a7abb2e12eefc32d9c0551f3a2335a27ef9fcfccee31e36f2c85f9af79d6932d7d72538d51a41905c0542a20ba4907157f838017e2ddfc29d66788f0595119cc416d2c21e004cb2872a6bc8b307ac172bf5455d95cb381ee1f982c5a066dda840ee0c9e84d6a5cee5dfa5d86a896d7c549ace58c44e6c5231fe72184d098d81c6627fd70a662a73d3593e9fbf1f1d1c7e0c77753e40f28cc76eae6111c2da96083e5c5e56c5392b21f03e6d3739679182db3c7f1f203e590", 0xd2}, {&(0x7f0000003840)="158fd5f15fc183ffb62c5431a98bb19727b31cf8eb88b254936cc339bd18b1edfea78463404667a2a3a9e6fbaa276eced25bae985291d43cec783ba3fc0f62a6c2d26e11b1925a7cc0fd8132c7172640ab56bd3ba3c087b4dcb4480f7921bf2459414f6caf767706b7680dd12172fcb62f1cab57cc6373327c57452ce2e8e4553a6e00adaece55729ada51d81581f37ed4e096a57244c362b15cb7cdb8053e64e939f27f40192e189d1ce2ab05a644659ed6af77bfbd10603f8d08e7d4ab94ebc3794bedffa7a991e504d5b216750423072b64ed44d6e65bd48820f20be6d4d1", 0xe0}, {&(0x7f0000003940)="f5f89511b9f23af92ce9561a11d62c7028dff569bb0fb11d3aa897ba00cc2a27cd563f168b81731dc4ca0c53a5c14e2173228fe0fff1bf8b49d6836616838564091c8077693019c24a1b589c7a87498defcc8cd05befa16772f179d98f80a7130c8373bd85d90ff655e2bae99d3decfca0cbcfce40a67cf288e3c358f32b24cf055de600f5424b7769c7deaecf556b4ba6aee8921e9da22003169e9278a45260f0b4e48f11e34e9a0c5783906c796501c6e2ce005e2a3bd5100c2c28aaacbf14394d1df7a591a120e569bd5631071c94196ee0e9fa06cf0051d88a9ff3df756a", 0xe0}, {&(0x7f0000003a40)="119db2e4a70ea829d5b5a50c80606c8228c173c201fe887efef57d5944302fb102083cd8534964b1a260025f0252b44ceaea", 0x32}], 0x5, &(0x7f0000003b00)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0xc, 0xb67, 0x6, r3}}], 0x20, 0x10}, {&(0x7f0000003b40)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000003e40)=[{&(0x7f0000003b80)="5367c87f6a6d610874562be9e4f8ca4d3f418fc1053ead96b4f2ee73b152b5c842331991f55fad0216212c39363baf78ddf5862c3a9bfe2c13dd5c614fcf846dfaad9b13945b80a6471dbb8d0f3a94620685348279ccad76dacf8cec158a35c7849dcb2b856c65d352ebb28288217b891ef1961cba2a523ee777b2593c4ac05bab6e9c28336dd4016afab7f9d5d2d35ad9b0990629e1b07257894390e5e6a06314a121c4d440", 0xa6}, {&(0x7f0000003c40)="cc374068648df5f81189f68c7e0f23a6ba2e2fc2f5c29bc49b17807cfdd2d513ffb775f214b464f4a60b4ea2168c9af4df436ce3658807f852c18f8fe8214bc7bac7b14720ffe01161e3b72c8eb8baf34f0194c09409a8a61a4fb5e8d53503da476a13c0a561d9c74672af533b52a3e8694ec0fb9eeb04476b2be5db1714da06dcd2e4dd6d6167e57ddcb0", 0x8b}, {&(0x7f0000003d00)="d72ae4786b50c2bc2295a1bf9380e05d4d4e86ffec424ec044f844841f7aabde060a503a3c05786aad2550a0", 0x2c}, {&(0x7f0000003d40)="53f604c99b19bd717ad62ef78e450414ed0de75e6e26400efb8b7f74d4510558683e3b884282277df03d4d33515f812798f9d06f589efaca151fd1437877b5f8371cbefd372b220483428417b7bf574ce5226f7b811bd07947db8f04690d86f8f875256d9cfd2f211ffd70d4a843a926a991ea4c4cd56c98a65585d90fc9a5d41da82e0e4d2355dd6c57074a2a4b2f82c796b5a4affac3e4d2e3871f090c8ce134c53b54bc83bc8208cca9a4a2cdb3de538e480b761c16c8e23a2d10aa2452b33eb2a53b1d9baae5b491c02fb6ad69502f58e2fa1392a32f76db76f1157fa58d9d8eda17fb7b8ff393245bd58571c15857b774", 0xf3}], 0x4, &(0x7f0000004ec0)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}, @sndrcv={0x30, 0x84, 0x1, {0x1000, 0x0, 0x1, 0x8, 0x255, 0x2653c00000, 0x4, 0xf52d, r3}}, @sndrcv={0x30, 0x84, 0x1, {0x8000, 0x1f, 0x3, 0x8f0, 0x10000, 0xc638, 0x11, 0x5, r3}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @sndrcv={0x30, 0x84, 0x1, {0x4, 0x6, 0x8002, 0x0, 0xaa, 0x90000000000000, 0x1ff, 0x7, r3}}], 0xc0, 0x4000}, {&(0x7f0000004f80)=@in6={0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0xe5}, 0x1}, 0x1c, &(0x7f0000005340)=[{&(0x7f0000004fc0)="86b4668dff816931cb2dd6e0395f4d3bde4d3291e9a7000132edade381bf45968a9bf612a9ac5ab2a20f873d59a9410e5e4891dedbacbc0f999b393eaa8b6d47f65c32fede9f21efda6dbc5a1e70172ade7e9bbcabf635bc1fd40d151a99edbde1a691e4bbd61bbacdda1f3ae7f9d578d18a41e7a67fe8681e111c79409921ef4951d3021b832ce012f0e32f6e09c1909808d82f51c803e0433b526c4594e3e5975973db8764a7be312efaff6e9547511aca08967b493e1838d782daa176267ba01872682f5aed56382e", 0xca}, {&(0x7f00000050c0)="6c7e034977f883e43f41ecbc5fc4c37e969631e27205726a9cc0378d37c698afe9674a712102cee408b590a62c69cf5d1f9d8e84112a481c66b3a0987c8fa21005ce4574179eb3dad4ed01d721b2b0f003052259877c41de0cfcde6d8af5f80dcdeec85e21519bc1a3703f848697a746663623422483e59b5f683e186645dee1783f4c9a84a43d75fbb6ead1159acd0543c2cb689124d6da47a11b70b1943dcbc8023dec39888cf84d7a4a30a951114f669e6316606459e3220fdcfb42", 0xbd}, {&(0x7f0000005180)="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", 0xfe}, {&(0x7f0000005280)="74fdaca83e3f059f32a8783481187d6cfa51d57800a4fe8454d82c9182ba150a87741cdea710059f2b1ca7b40244a06ca841560184ff3c348f9ef51829203b5e6a0c84aa059f9b1789ca3fba8999239ca0ad7bd41d508d7ea1be8a245287be0933c088a958df4c842d5b0b6d45495e6b56725214cfe6b504768447fd9686ab223d2fee7240aa6f0b067dd816e79c0615fd", 0x91}], 0x4, &(0x7f0000005380)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xdd}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0xee, 0x208, 0x5, 0x9f86, 0x7, 0x67, 0x7, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x62b9}}, @authinfo={0x18, 0x84, 0x6, {0x9e}}, @sndrcv={0x30, 0x84, 0x1, {0xffffffffffff8001, 0x81, 0x8000, 0x80000000, 0xee6, 0x8001, 0x6, 0x0, r3}}], 0xe0, 0x4000}], 0x8, 0x14) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x0, 0x4, 0x9}, 0x10) getsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000200)=0x86, &(0x7f0000000240)=0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @broadcast}, 0xffffffdd) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 283.587014] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 08:26:49 executing program 3: r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0x4101, &(0x7f00000001c0)=0x0) ftruncate(r0, 0x7ff) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141446, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000080)={0x1, 0x0, [{}]}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x11, r2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) io_submit(r1, 0x0, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000100)="5bbeccdb66b68364cceaf9cec13e299c8ce3a017236bbcf5670b537a48796ab709a1201da73aea22bdafc3a3a58b31359498842e89cb1e748ae4f867b1c15240b907deec567e598bbce28330c1178cf9f59f34be183d4b13d1d891772f053e2034c90b3303db99048105ce59f6694cd4a299e7bf83a9700fe22e8552282fec25b71b4c456d5454bf667833bd0bf8bb00249e5360dd6554cf75", 0x377140be6b5ef4c7}]) [ 283.627698] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 08:26:49 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x0, 0xc}}, 0x20) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000000)=0x80000001) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 08:26:49 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000040)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 283.695403] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:26:49 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000080)={'lapb0\x00'}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r2, 0x200, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xffffffffffffffff}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x44041) 08:26:49 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="f25dfb87359f366cdf7df8998caebbc5d63f00562fda410104000000000000b90a79e3f7ecffa259597eef21f0af420fc1f4d085198bf6f7eb4b10ce3e040fc4b5aa4b99dd68a6a5190000d6af9d9d29e151ae7e42b14b75e026ee03ce12bbacc6f0fd410778b057adbde050e893ed804a04189073e64529dc6eb2a11ce41bd47cbdeb85175b0ff9c76a4ab09a383f5f70807e5277"]) 08:26:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001380)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000001440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x1c, r2, 0x20, 0x70bd2c, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x4000000) add_key(&(0x7f0000001480)='rxrpc_s\x00', 0x0, &(0x7f0000001500)="010000000058ee98b1bbdca841fc8cd9788f93961af12d6041", 0x19, r0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x420002, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f00000011c0)={@in={{0x2, 0x4e24, @loopback}}, 0x0, 0x1ff, 0x0, "2b1e6e31948f7e5ce1deb9bb6966f6addbf241d586df6f42288c9450493a7551ff0a4a88918f39d22a791e28f55b7f96f69446c3acafc238ba4691ea33c6aca596b438475a4f1851ce6af736f48755ee"}, 0xd8) ioctl$IOC_PR_PREEMPT_ABORT(r3, 0x401870cc, &(0x7f0000000040)={0x501, 0x80000001, 0x0, 0xfff}) [ 283.884914] audit: type=1400 audit(1560587209.824:98): avc: denied { map } for pid=14954 comm="syz-executor.3" path="/root/syzkaller-testdir067361114/syzkaller.cyCMee/269/bus" dev="sda1" ino=17555 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 08:26:49 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) accept$ax25(r0, 0x0, &(0x7f00000000c0)) 08:26:49 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) r1 = msgget(0x3, 0x44) msgsnd(r1, &(0x7f0000000280)={0x0, "30913710e754761ce097713e09d40f15350af055f9d73b9eb4ec8b578815536decd7ff11234eed13dd8df0e605a68bf5da61b60f8c3e2f64fb1f82bee7e59adb0043c803f5c012d9c8619542a3a7ae23cd96298a3cac10238f41dc529b34660f4017429315e5c69d6de97640"}, 0x74, 0x800) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0xc4, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa7eb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x16a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8010) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) lsetxattr$security_capability(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000640)='security.capability\x00', &(0x7f0000000680)=@v2={0x2000000, [{0xffffffffffff6319, 0x401}, {0x8, 0x3}]}, 0x14, 0x3) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_int(r1, 0x107, 0x8, &(0x7f0000000240)=0x1ff, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001580)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000001680)={@l2={0x1f, 0x8, {0xfff, 0x4, 0x3, 0x0, 0x3, 0x7}, 0x80, 0x6}, {&(0x7f00000002c0)=""/75, 0x38}, &(0x7f0000001640), 0x20}, 0x1f3) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000000100)={0x16, 0xae, &(0x7f0000000180)="3924a07353f700861c210f00221517904f43894a4ada90b46e732bbf7a040b397f46809a7ca740e5f9a11bb3e055d3c08cef5d9b7b623800bfbadb5842aa852ee95ac909ef12292fe65d257cca41e0b991c64b62a967da8220497055aed9d284edab6657a1f7020c0bc02370362e82265a402b681fd7c7fac03dd04ce24858fd2aa0cac313f917e828cea1d657b1ee1124bd06c322bc0300c2a1c16eade79799db9278456a7da41f9b126ffdd186"}) [ 284.069708] ntfs: (device loop2): parse_options(): Unrecognized mount option ]56l}?. 08:26:50 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) r1 = msgget(0x3, 0x44) msgsnd(r1, &(0x7f0000000280)={0x0, "30913710e754761ce097713e09d40f15350af055f9d73b9eb4ec8b578815536decd7ff11234eed13dd8df0e605a68bf5da61b60f8c3e2f64fb1f82bee7e59adb0043c803f5c012d9c8619542a3a7ae23cd96298a3cac10238f41dc529b34660f4017429315e5c69d6de97640"}, 0x74, 0x800) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0xc4, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa7eb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x16a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8010) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) lsetxattr$security_capability(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000640)='security.capability\x00', &(0x7f0000000680)=@v2={0x2000000, [{0xffffffffffff6319, 0x401}, {0x8, 0x3}]}, 0x14, 0x3) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:50 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x400, 0x10200) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f00000000c0)={0x1, 0x1, [0x8001, 0x9, 0x7, 0x2, 0xcff, 0x0, 0x4, 0x3]}) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:50 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40000, 0x0) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:50 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) fchdir(r0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000280)=0x2, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="73efb65a9fd2346f576feb7fc805110b27610f3cd38a3cd47cc51124d431af7c3aefc7aa011a3b328ad402ad18c901627e699d37d5135e2243ce0cf35239b6cc26fd1b91a12ac939bfc92b186daf1dc15699d830feedc59ae55efb6120303a4943deb7876735a9ce5de6cfceeb10c5a74692ccaee09647b54ceaaae6cf9a83351baf0cedc1c3f7aa50854bdca56c9b662bb2c93844e040d090757c156b3c8721f0497e45aa6556e12dcd21682b260265"]) 08:26:50 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) r1 = msgget(0x3, 0x44) msgsnd(r1, &(0x7f0000000280)={0x0, "30913710e754761ce097713e09d40f15350af055f9d73b9eb4ec8b578815536decd7ff11234eed13dd8df0e605a68bf5da61b60f8c3e2f64fb1f82bee7e59adb0043c803f5c012d9c8619542a3a7ae23cd96298a3cac10238f41dc529b34660f4017429315e5c69d6de97640"}, 0x74, 0x800) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000005c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f00000004c0)={0xc4, r3, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa7eb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x16a}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x8010) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) lsetxattr$security_capability(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000640)='security.capability\x00', &(0x7f0000000680)=@v2={0x2000000, [{0xffffffffffff6319, 0x401}, {0x8, 0x3}]}, 0x14, 0x3) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:50 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x402000) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x8, {0x1}}, 0x18) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) r1 = accept4(r0, &(0x7f00000000c0)=@ethernet, &(0x7f00000001c0)=0x80, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r2, 0xf00, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x810) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 08:26:50 executing program 1: [ 284.347119] encrypted_key: insufficient parameters specified [ 284.357417] encrypted_key: insufficient parameters specified [ 284.441593] ntfs: (device loop2): parse_options(): Unrecognized mount option sZ4oWo 'a<ӊ<|$1|:Ǫ;2b~i7^"C R9&*9+mV0Ś^a 0:IC޷g5]ŧF̮GLϚ5 PKܥlf+8D@Аu|k0xffffffffffffffff}, 0x117, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000000200)={0x8, 0x120, 0xfa00, {0x3, {0x1, 0xffffffff, "d7160f11e644a3d7120638ee4b1af694787c74d78b06d6c03adaba2fa3bec64b209d77eda4cbc1e6bff2d54598c69b58aa823d87bf8fb977daf101187f590805d50c5ca58bb061bac0bc4b50ba6b55f07b14b9d019c10c367b0244accb35a84e28dfcd1a3b45275a4413a4cc0ea61ce32623e59ddcb9504fceda821ca4af681d1da675740f5131c40751cb16bec66003eaa12b9451f8f740422f87772b7d013f08933b9c50ce4413b72673d016c905d4e1d3a81f4838b5e1988c8057ac73492b240a50cc7266cd43d6b22bdb0927b366e325b93bbf7ecc333e686ecbde0baf0d42c7c6f0071eeede93d468aafc5b351a13f21519f33485dbb430e04639692653", 0x69, 0x0, 0xffff, 0x80000001, 0x2e4580b8, 0x4, 0x2e}, r4}}, 0x128) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:50 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000000c0)=""/150, &(0x7f0000000180)=0x96) 08:26:50 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000280)=0x100) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000340)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0x1015, 0x4, 0x5, "62b62b6610fa13cd359d29ec331d360d", "82ef8927a0c5578d745f6d9115964b4f9e40bde497f8ba26efc76dbc03216af23d0d3c8c90ce8103fb05fc5dc6cd66d4a0a6ff7002bfdcf63cb63e6f0038594186ae304e89ae9725dc7618f1fddd174be7303461d5dfb530bf328021c1136869858d829108beaa12a885432af6dbef8dd8336723392825edfb25a22389701aaf139a0a9f057c677e9708f2ed9f8eadde7dbe9608266e5eb9d7fd2ed5fb82b1b7aebc5edec3358dcd71a4caf85c2e6aa2ac3a607e2e6de228e918d64036159c00b49d218a6f96c8f23d9d13d88e441613aba37c5c18d22695d10d50d5cca8758562dcf58880d924ee17b40b8ac0c3b3cdff848d2d4291945207fc92731327a84362237c0d53a24ae43c12ccb70e19e002ee79bd7d2917370609c8c1254f97d9f4bf2b22ae3254b2469984f2b10c497236b75608a00b6179581e741936652de07b1630c295b01994dae21160d5970037cfb1e8d7bc1dedfe9e82402a7def1e16172444daeac42df91b1cce0655c0ee9f09b1d9b9d597f5457a07cace72ebe632861e7ed176e17f3b43fb4ef0484e4ecd3cc841e743d17a4b296306cf6eed87360418ffedfc2fc319941d44c97064bc28ff0c4dbc889da0a2b7f25d690f4fab2f434df92696d30d8a9e99c1265fca3c79d6fe969eb6f5347025711d301be168cfb8027afc8a50428b99771bed34a1b8ff7f16e7b5472ac92085b84bbb90e1706b3935cff7621fd6fc98cca2bf16678e904d80f1f94cc51597bd41b6edee0f85dc22028afc1fc075c81d0685266d679fa9556f593124c8756ceb6801ae63b9093d843b36b595efbef9d0d6d0a166b7c7e30ce1272bd663e5b7bdc6162f96e3dd7ab9be3b107782757a73fef0d140143b6eb558e12971e27f53e9e38a8a0a762be0dc16ee654aa418f941800428944051bbd22d1deed436be7578f93abef080a78f54eaf89070f269a0289f7cf8cc4c04d31e354d60c3dbe4f4d8c79d668b83cd26ad8c8edfc54748b34a3d368760eb3f380877b51c60bef8fb85c33ce4afcfe5ec8d700936a4325db2072e640acfa98f464c77998322f8aefc6296a5f1e9b65370ad3c75c5797cb796912a824418bf4c131773964e26d001fee5b0a3e2f52b048e45eba17c69e28e07d45b558f7b32269987c57ee614f2e60b992b575bf315dc240b3264e2b1fded6484a0748c6e276cd63d09c964f827831001cc6843b48d5f0b46305e357f79adcaf3cf92cd3db0c3e068327bb83a8eb97b843bbf1621d8ed302de17a8f5cc594c5ec6dd63b9753e86298321f8f71ac1e7118b59a3a8dc221cdd203efb39feeca9858895a0f55f1b777413cc2b4ad5df0072369c9fae8eb631cf7630f3725f0d5ff11a7cdf2267a22d6d786466476ba8cc3ba150ba873471dc55686492cfedffa3cf6d4b48432fd9d22b4cf574d071f7e86160efdd2f757e0935f4c6495b2e6114219a6601556a5df527cfaf8fe63191e6e89ef949193c3ef9060109a2d21345aa098a7d602ad32a5da8ddc8a57729e53b379f28b7170e401df9c01c10836567d7f82b5188bfcab145c3bf2e8ab0c7b1d721ccf5b056ede92a50b0c012b83ce231bdda38b7fab431ead8b372aaafb95116a0ca9bd81ddc38ce6e2f32e9b79af56d7820a612c7dc18143a087129e58d132802eee1c39f5a0916d9ecee7b47e2fa6ee47e85700f155a52eaff92ec61685a5875f6eb8f0f2326b71357d4d393623d86306133a090e24591874d88c801aa444bee39b32d869515bffedc5ec90098eb4ce44be3da0e9c402eff274751d62bc5572363092a505da8df10dad5fc73f70bfa6259306ca1efc2bfec8acad277196daea0ab70cec9923cc8cde0bd9bd45accc69acbf77f57cd2fcf707152dfaec1a2fe064d48b86d2931e334b96122e8acf515ae2ddfc5b1b002b4e563584e401e553e01628a601414f1cc198b1b86128c312af9d9e1473c5bbf1aa19a25a28fb85cd09cc808581aaafd163982db4938c899de6c5613839b3035d13ab61da438d5fbbef02d96554425ae68d760569c49c4535b620a27b8a616176cf766733e0db0140a7bab02b0c8d5061eb5e0d2eae40c34f9957f23cf6a0b513d4a4b13687c7f09e5c9ec62a5ce2fc5587f9ef68e845af69302cb9d7c92c51b4f3310c545d3c27ffcc84def8cb620a92d4f3e228140c2c55adfb903fe796bd51cf2ecf620d252f78e30fef8defb581192262d8e4d2184696ec91d7aa3366bbfaa31324705078d26f877eb768ea3c9a98537e50422bd9e65625b41859be846fb5d302a2e31a4e08566869dfb0f4b3fb948a9abaca37ca12286c87763efca720a299bc90b01b7b47329b9e3130a737b44b52bab3cf7c5c562565b0a38333b450895e4022842632e03c16d851d3a91db5e3f9146d6a119a0bdf3ea41a64620056b622805eb1763fbab851867ba8e969f30782dc7892b6aeff1d1e4b462fd64fabfeec2388b72a43512e5c43157319ba2c9bf5c7d24caf371ec72167fff3a81e6340f50e0c8ec1ba782f981f48f3cc6abebe52c219c1d38de21546b4dbdfea21073841ce22a93e9ab2b4b41bb481311a022e874d7b089930fe927ff64af99c130f9a8efbee58fe765c057987c4b01385c1bbe76900b579de2ca1b445bc5751af3e898bc7f36ea4e82f588d5546bd5e981261c280626a228a0eaf7cfb6faacff1defa5c3647e23ccda5fd32239463d71f73ad80a4964ef6c748b0df5a1526ac7a33ab5268e8adbc968b3689393c2956c6d283d4f552510ff6833a1ef4d5adeeaa4903392f99526bf6edebf5664a1ca6b21c184fd338c0d93a516955f09aef6da45a9d202536a08e3b7b09ea9fd0c8da86200f9619d71c44b3e037f4be7c4e261d17404757a116da0ff30ec9facc54350204f0b6fa78d12a06f02e4f3a9ad3542ee18d35b9f5f99cd5ce8ad0f7e0e76c3a82f3974efdd0e902ea4c0ca657ab21e72ed6d2388303d089cf5b314620a7db986896947d64d79eaee08d32335f8ddc6439b5ecf4be5ef2a1ddf825933d88b95b41137d6def087bd03edc541d952e541ceae19092e26f905103f1bf6c895f60510a015c341a1afb8364918f0acec8c9931a17c1a514e6c7c837cf2f96c2006347138629a3aa1487a2edb1eaa192faaec57ca58677d86ca0174deba3fea4ca60ea3ed39df4fad01c7e1e5a736ca446c4c754b6d5e084543b216ced088720412721f0ac58d4f5b3fce561e0b98d23047c2a0f7f4fb99efe4e24f0f6104591266cdc001154b5c1b3b0e5ef31b3e45e2e548cb9267014acee10e4be42b5cbe2843c47356369ad4baca89cf3ecd51726b73617396f161f0627133a30468f211a71654e83239ea585333bef50f0c23139c8c53ed85ea4a10c259216de78ad7b262bf79b238b7706b591ebd4b624ad017228a9c19482e19f162ea22d84f2f8099fc649564a712e0b9a7ba08fe483e8096525726fec99fc4b8d19905788de1953bae14d8b4e0280c25b8ec5f46aec14ebed14afa2d09e4e1d124efdb6fb7b06315ff193c0273e26e8e2faf7aec6cae713a973bc3fe59b0ae5d7369ec27b507e07cf7b663775d55a6b2f7a1b84d14b481eaecdbc5bcd43154082b14a881bea1af6b779ca4faee474a10badf4d25f0eebe6f27fd0b5df3a40ee072da99ed1e497fe0005e071a508faa9d58528624e14324fbb502997e55689a04edae823a5dd8ca6df003d5727cf89ee3c4adaf47225050c6f418f7c8fcb7b40bc5f432efd19ea8f856fcbca2f8f581c72372b83452eb3484e7b59d82859446d005267b95e871b8de9de632cb42bd1df6fff318d79909950b4c1ae772c1daab20f6b056fea16c908b141bedb05801761232bc871e5bb1178e1974686403bf63f204d2fa3ed8f7f5273a76ff0b54d0b3e268d1e3b9350999b60b30d7da1b7d00858724cfb9f8536707209c5c74042cf25ffd2b902530b5a4ccf990e804e377b6f52f643535301e20b1e1114cfe2f6e6bf5509543839068cadf1653e46f4345c4c0eabc542be030d8fb1536a0e897d2e3bbf24acc8f844513c45c4cc35277ae97efd11a6954f579b5391e27119443d2a7e534bbf49045e6aafaa5c2b4dd7768928ed8b6fcaeb836a9632db1d8f8de3803df36c44325fb1fe49bddafb85f0a0a4050a831ceac5faf996cc8bc38f3c92079019a8ee5aa6349e424420f69c9ccb4bd806833a61d309b1b4c2190f319bcac32fe64a5b5560ad4702d1777f9739a9222386b642a6ea923638a4d8326a12b841acd00b22e6c89a91f17a1d68047397ed226cc9baa32e8b593862aa0a58efd0c36b84f902317e878f9b96e578b1603c8d5d3f8f2a42e16d5e152d1d245c83cff9d6fe17eaad3f68edd01fceb4e56d3014f80d52c04fb34037eb9e842666851b1d3e4705598c0ca516b6036d924fa9936205715de62818764c21b7abfc410a82e618f9199578e197764a204d3d3e5d597eac2f9ed3da331f55222875abd9314b1794d6e15dced9d6695d160391fcc9ced2886a9c0b1517f7afff4e9e4ca08eeb49798a32e56bfef84ab5e6f623a8e5c532556a01cc933733da7e4382771d6b25b98722e177ac87d91521f551969efc160a808e2979586f4a3ccd729d41af2692c5945ab23988d49eda85b3fdb15ac3562541fe37c5816ee3287ad0dd491c2f45765c229d563433c8dc0df9102136769983d2d78a69ec47479041dc54c07d32779db18907010ffdf2e540ac74a46597790e19232ebbd83dbebb60778fbf6933796f3a862c8d549f4cdb989fac02c81d562476b19401f911421689c0c834d29179b961d72b603a3373c21bbac62c4b7985f2380f3c6ce87ac3a3955c341d1f354418d3b684d60ce1bfcc468867bba00e8e9826409b241bd1e7661bb080111a79f80991ac166403596833f4c31bd3741b7769478a31c835c29a4bdb97581067e50f4486a02a4ad1f2a2e284da6ecf4e93f54ea61292ac6230f26f47fc12e024827d53fdedd35bd80a6d94f9a86e22324fcb97d017769dff82ce34a711768dedeccae63feaed916cb50c266d9bc679e5e77b1d7cdf5cff2a3de57c9e270942bd013ac8691d32dfc9998f4a62b85cecf926549a2467cbadeba1342a8918dedeb61dd925df2545148372ceb0367ee0933200209bdc0340cfbce0f9843e42a904f198e0c2a86fb3c57f80a1deac6f387a940f1ed7f8f1026d41a79289f038de23b01a725bf150fae9ac516793c263101a8a50493c262577d38a4c19ab6bcbaecd41bb2bccdf2c992730c1e89e698843cfbbaedbfd7bef933e7d79a689eaa0c05cdef7019063601faaa9cd39e56c29d5966dc163bc742473057ef048c40bf98548019aab892488706085399a4f864a8d0faaf25505be9af8e972cfb96de298f40fb01d99442203fde19bf7cd831b9d341e72b31f1f5141b780c99f8f8a69ef13e4e50ba102405e57098703520671efbda83fd40cba5792978b4f14d55cbc00f90b128cece9f5d7a154818a7cb9de87ca39a10c431b2417ebc682679b498013c7fcc378777dbd7a59740284bc067e4f64e07b8a1cb39932d8a00dc711e2bb012fb5ac0cadd060fff2116b348dd23565dd44ba29298c7f1f0cd2276b0cc80b51227a4d04bf84c352b3cb73d628b14a17cd77eb97dfa17e742d933972d7725e32bd156035673dd5a650cd72f13cc144b1cd0bd663ea3a9f9fcd08256c70cf42a146f5ccb1d93672f8fb80e63dbd8e4d73b525568f32d1c9c0ac8b326d9fb500075ca788a2fce7b2d5fffb43db03ae30fd6c692a2887e0cf54cb32a43643a81b74ad9c0482f8a5c0"}, 0x1015, 0x1) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f00000000c0)=ANY=[@ANYBLOB="010100000000000001000000000000000101000000000000ffffff7f000000008dfe000000000000610802fd00"/80]) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000200)) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000002c0)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000300)={r1, 0x2}) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="3a822e66269daa36636dcc418fc1a64d549f0029bfdc6c2a24ebc545564e00d9aa4ceb3554de1cbb71d80d888a066439fee101946ac5d95d7fe0920808d98aa2efcf590df42ab972e14ae0e3cbec560a9184d951a148", 0x56}], 0x1, 0x0) fchdir(r0) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) getsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000002300), &(0x7f0000002340)=0x4) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r3 = geteuid() fstat(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x6, &(0x7f0000000600)=[{&(0x7f00000001c0)="3569ffe7d969abd41d9b1d0a03c3ded5c51df6f577553b2fddc51662d481b996e71e7554cd3787cde49b8cdb7c79ee8b284e335da07ac3ba6253eee06b318279c612c6ce4dd3d9782ef1e50afbd76e29aa280989f4536db98ec429f446ceec5faee5320409626a0868e0de506c", 0x6d, 0x1}, {&(0x7f0000000240)="7965ff894b7a1530dd0072c89595b61c4b2414889ca07b7de2f2a0505386298655e6786017cac2ffed16bcd23112cf9c90c721b15c725bb47df0256a8231341302f3167157dce20e6db4730e551276a05362014bd0c7a8855c4e8033b5e9f1585f0a", 0x62, 0x1}, {&(0x7f00000002c0)="185f69a611b37201e991c138f39143b9c2e2164d085eebd22f698d777004106a185b4ee5080c5d5dd594c02c13258d0408e793eda0b0345083572ef2f664787579a8333c857112b0e8b928b7bbd0e8a88c5d584cd49721", 0x57, 0x3}, {&(0x7f0000000340)="be5153a283682969ac1757d9c2d10536d9bb27e1adf8d4e86e60d275cbd75b02d7c0b3f89eb785c777673e622bcbf155e6acdba466162486e7732f503267f0ddb6255ccf030bd555641d15333c7b1987b9d9737b515511e26d9a0b6c5bb315275540645f89543d49d47bd9f3240d9f164016d4", 0x73, 0x5}, {&(0x7f0000000440)="07ad477ba257af5bf49c1322457f7d6bd63b4ce51b11a12a34c609893dcdfcbfc3d4818aef3f8fa1039c67c224b50d90059840b200d28264562c22aac400bb098ef27c5ee33dc1e179eb34ffdcddf6f7d641fb111a884631659e870e82e4ea16ab10d5bc8f324320c57e26153af93d6b4d393f4100508449a7538b89b13a74d289bd06b0dd8593065acdde36fcbd8dfc0a2fa4ee10dafa4c31f98606243c9a18f1fdbadfefb373b1f0941616f7bcc2d80ca69366f565069b9f88bdbcae7a3ecca36e3ff0e253296765728c858b79531efbfd34cef3cc592f14e7", 0xda, 0x1000}, {&(0x7f0000000540)="8f69faf2ea5cec42631be0304074839a4d991f232cae8e0ab15dc63d27e89282e936935c0f023474e338b6d2bc450f162759f3c3781e4bef11e1a7f9e36b6087c7fb4befa29cfc5c9f3f591921d44c7122056d22814254efeeecab0af30965af0a7500bf9920285d347a6190822a3f4feeba98bbb107e36d6634efdfe90d4798d8f429f6fba474f39a8422384c17f6e09c64148f91", 0x95, 0x101}], 0x8880, &(0x7f0000000740)={[{@utf8no='utf8=0'}, {@shortname_winnt='shortname=winnt'}, {@shortname_mixed='shortname=mixed'}], [{@uid_lt={'uid<', r3}}, {@euid_eq={'euid', 0x3d, r4}}]}) socketpair(0x0, 0x6, 0x1, &(0x7f0000000900)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000002100)=0x0) r8 = syz_open_dev$dspn(&(0x7f0000002580)='/dev/dsp#\x00', 0xe39, 0x408000) ioctl$KVM_GET_DEVICE_ATTR(r8, 0x4018aee2, &(0x7f0000002600)={0x0, 0x0, 0x3ff, &(0x7f00000025c0)=0xa1ef}) r9 = openat$vhci(0xffffffffffffff9c, &(0x7f0000002140)='/dev/vhci\x00', 0x80000) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002180)=0x0) r11 = getpgid(0xffffffffffffffff) sendmsg$unix(r6, &(0x7f00000022c0)={&(0x7f0000000940)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002040)=[{&(0x7f00000009c0)="9cf82ec950e0a9d9380302b7401e71f7c38bdf66fe61aac29d3851aab12f8e6173fd984680826db900489d7dfac099bdb004985a7e6f7c99d94eb882d2cf5b767da194b4e48d7b038054d05683a3f4bb1eaaaab9569d3b34da3cfe4fa7599e745d56033b4b7282914e39f4a6aee21fddd30e634da848a5505b560b7f5ee209f509b8a2d1ebc90540c86884a6a940eed711bd3e25ff41466ad45f3f2d073f7495f85d25a5dfac37449b419e814f60516e4eb2ec68a7277d99a66d875c15eb", 0xbe}, {&(0x7f0000000a80)="75e70f766a17a9e27dc419c9d30067c5cf9081a7479914e50ae211fa3d2be75ae095c516ac222800d838f0271e4d3c8981a2b64792bc873efd75f9e71df7a702ce072cc490c689d95677a827260035202d7b58099fcf6472f3b4099bad84a5e6a374edad97399eeb9334f61ea4ca1384ac49b03c611fd2ce90da3e762dcfa150094c13bb5633d7bd82ec6193cc6c989ab8fef8ffda88bd25beaabac79e8a89a4ae671052feb22d541f4fa6cf86e7b1f6f8c6b0ec7540870e06b58e2a3199e609e054928841d26fbf37d64f51232537b634df289c11c4c70ac41e4a6467a10b84c0e437722340881df30c12c5585f2f8142acdd", 0xf3}, {&(0x7f0000000b80)="fe86515b6a8b34779ef88fb4a2a7031dce098643aca95c7bf7db20f27124d5de56c622b47883146b6a86efd19dfa1e4f9e24fe2a2a335102922c1fefac6df14d70dd253b56df7a", 0x47}, {&(0x7f0000000c00)="7da530e6471806e2eb8457c58f4a2f6729b2ef5a36dfe73ef0ead7c65635fd095cc4abcac49215ce65a30224a1606b5841599948db4b233340bef6a41bd5329466a76b4abd32fbc684230747318593b573682ccfcf2ecab54680b52c4e8b0990c9814fd8a9b4c0c02776ead838954d1584146672fcc05065a6c900d65de75bae8f3e47335a2f41cfab84af4ec4ee49eba23ad30205daacbe77b9a81ead99a2d94ae9c4b51814441cdb1aa1ee5923bfb62e793ad4ad581ac51b42b36b63ccbd86857ef84fcb1295377bf70a4dab124aad5bdd5deb4c5379251505a28fb35184af7df2dd3b2916a6be4b", 0xe9}, {&(0x7f0000000d00)="71eb7d27c514d1de408923fd642c3269a7e7fbf051c5cf58a536e9b27ba78ab631e8db82d6e64d5764e0be7369489a4243963da54f39285972e0c165030ab3aac7bdfacd99de6bf364d97820b1779d404f88ba4bed0670466a034bfc6c30e614f2575fb3371ceffd064570f83c7d0a253fd88862bda02cbc965907202defa8dc2d83ab360b218beea80d26b3753111985cde7cf08972c1fdac9aace49a9de7a5a0716b07f7407ba9522cfdd1a9eafadd1d653e5337b6f62936", 0xb9}, {&(0x7f0000000dc0)="aad84c758a46345bd742e99e3ed63903c695e23f78e2c76d1e3fcb3987daac3a14c2123a5314c3b54d356a6e9052", 0x2e}, {&(0x7f0000000e00)="09223be6921c2a01ee669ebebc12b0fb6457c6b5ea07b98fa68eeefff0206add962dc55a7d703d0bfc87f51fc9a6160a77f18ac9d7683e9c2f0e509fa3bd3b0ee632bf2dcfe06a36798d507532ea45b716f1f6bd3b725e97c15dfe37c8a7e4197c8dc8163144ea9f36d8894202fe764adcaaef43e1b5d93a9a746294dbe07137c21060a0c241dd59670237160d275c7d93439a6f6e40b114acfb629b7e97f80a04b5fe122a8c08fab7ec4f81bedc8b567855b3f8c836bd4a23ba9d49cfceeca39042027ad305d1af638a39db4df382f5b1312c62b11ab2bb6486c6580093deaf60059b0093d6fddd271b9252fe", 0xed}, {&(0x7f0000000f00)="b06e1bd5c5f84b8184b1c7fad840530314986f21aec353f49469c49dd122cc1f9d57e62a307dbe65d5f06c796a7b8a69a483056058c352a3535ca703430cfc857e8486e919349fb646d1344d3a8fc159bee25557865dedbc957fd96234db38331834ddd1787d3c489464daa4ee58ff4a5aa5a54742ebf05074fc", 0x7a}, {&(0x7f0000000f80)="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", 0x1000}, {&(0x7f0000001f80)="45f26294f982332bd02a438fca238c7ff46cf055340579ed51c63f2c48379c60afea6b9c4ac3849f2e2c54159f038d2daaf73c1af2f5b4a42163f5c66614b6955b535d91e6bb0f3f5ca7189ed147116c260a5745697312d0244a472c27d83266365cb4712c87f67bb321392f4670c65760ac675aab19c16ce735d4e190fdf7b5c869645f00686605d4760fb4e88bd086965c4fac773669", 0x97}], 0xa, &(0x7f00000021c0)=[@cred={{0x1c, 0x1, 0x2, {r7, r3, r5}}}, @rights={{0x2c, 0x1, 0x1, [r2, r2, r0, r9, r0, r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r10, r3, r5}}}, @rights={{0x20, 0x1, 0x1, [r0, r0, r2, r2]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r3, r5}}}, @rights={{0x14, 0x1, 0x1, [r2]}}], 0xe0, 0x20000000}, 0x4008000) getsockopt$bt_hci(r2, 0x0, 0x19, 0x0, &(0x7f0000000400)) socketpair(0x3, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff}) r13 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x200, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000008c0)=0x8, 0x4) write$FUSE_DIRENT(r13, &(0x7f00000007c0)={0xd0, 0x0, 0x8, [{0x2, 0x7, 0x31, 0x80, 'self[ppp0bdevselfem1vmnet1em0/self[em1eth0..ppp0-'}, {0x2, 0x7fffffff, 0x6, 0x765, 'utf8=0'}, {0x2, 0x10001, 0xf, 0x7, 'useruser,#[#GPL'}, {0x4, 0x7ca, 0xb, 0x4, 'vboxnet1em1'}]}, 0xd0) r14 = syz_genetlink_get_family_id$tipc(&(0x7f0000002480)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r13, &(0x7f0000002540)={&(0x7f0000002380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000002500)={&(0x7f00000024c0)={0x34, r14, 0x801, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0xa, 0x7, @udp='udp:syz0\x00'}}}, ["", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000080) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f00000023c0)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e24, 0xffffffff, @ipv4={[], [], @remote}, 0x2b2}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0xff, @mcast2, 0x101}, @in={0x2, 0x4e22, @rand_addr=0x92}, @in6={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x26}, 0x2}], 0x2f2) 08:26:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') bind$pptp(r1, &(0x7f00000001c0)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x24}}}, 0x1e) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0xfc, r2, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x26, 0x20}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xf}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1f}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000080}, 0x40895) r3 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00 \x00', 0x10) syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x40000) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="42d97f4b4c4600000001006c0055d68de07441b628fc22f05ed6841c4d9eeed215d925da3720728b4be11d05"], 0x14) 08:26:50 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000280)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) stat(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioprio_set$uid(0x3, r3, 0x2ced) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000004c0)=0xf95, &(0x7f0000000500)=0x4) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:50 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000240)={0x9, 0x100001, 0x9}) 08:26:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000300)="11dca5055e0bcf0809e0703286128fb8c30bf19dff5be43f9a01630f38c6be8e4a859c924cc54ab9eea63c263f9a03282fe262a1bf04722058b9231d9d66e4ad1bb431892b224d367f7fedccfc0b34aa174296cb05a239be103cdfe6420000000000") r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @multicast2}}, 0x0, 0x1, 0x8, 0xff, 0x64}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r2, @in={{0x2, 0x4e21, @multicast2}}, 0x3, 0x80000001}, 0x90) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 284.882529] ntfs: (device loop2): parse_options(): Unrecognized mount option trusted.overlay.opaque. 08:26:50 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x8, 0x2, {0x1, 0x3, 0x7, 0x0, 0x4}}) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:50 executing program 0: r0 = socket$inet(0x2, 0x800, 0x10007) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x1000000000004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"/453], 0x1c5) r1 = dup2(r0, r0) write(r1, &(0x7f0000000780)="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", 0x30d) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="54000043798d10d230764c01f74e2001c211", @ANYRES16=0x0, @ANYBLOB="000000000000000000000e000000040002003c00010038000400200001000a00000000000000fe80000000000000000000000000000000000000140002000200"/78], 0x54}}, 0x0) 08:26:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r1, 0x80046402, &(0x7f0000000000)=0x7) ioctl$TCSETS(r1, 0x5402, 0x0) write$sndseq(r1, &(0x7f0000000000), 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) 08:26:50 executing program 4: socket$kcm(0x29, 0x7, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000040)=@generic={0x0, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x0, 0x0, 0x6b}, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000200)=0x68) 08:26:51 executing program 1: add_key(&(0x7f0000000000), 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x101004) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r0, 0x40}, {r0, 0x2424}, {r0, 0x1100}, {r0, 0x2a0}], 0x4, &(0x7f0000000200)={r1, r2+10000000}, &(0x7f0000000240)={0x4}, 0x8) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f00000004c0)={'veth1\x00', 0x1ffc0000000000, 0x7f}) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000e80)={'tunl0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000f80)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001080)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000018c0)={0x0, @local}, &(0x7f0000001900)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001940)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f0000001a40)=0xe8) getitimer(0x0, &(0x7f0000000000)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001a80)={@mcast2, 0x0}, &(0x7f0000001ac0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001b00)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000001c00)=0xe8) getitimer(0x1, &(0x7f0000000100)) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001e40)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001e00)={&(0x7f0000000300)=ANY=[@ANYBLOB="9c0102ce56a8000000000000059bb46d755294d8ed205edf", @ANYRES16=r3, @ANYBLOB="00082abd7000fbdbdf250100000008000100", @ANYRES32=r4, @ANYBLOB="4400020040000100240001006d6f646500000000000000000000000000000000000000000000000000000000080003000500000010000400726f756e64726f62696e000008000100", @ANYRES32=r5, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000200000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="e800020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400400000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r9, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040006000000"], 0x19c}}, 0x80) userfaultfd(0x80000) 08:26:51 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001c00)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001bc0)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001c40)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e22, @empty}}}, 0x90) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) bind$isdn(r0, &(0x7f0000000280)={0x22, 0x1, 0x9, 0x66dc, 0x7}, 0x6) sendmsg$tipc(r0, &(0x7f0000001b80)={&(0x7f00000002c0)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x4}}, 0x10, &(0x7f00000019c0)=[{&(0x7f0000000300)="19dc801c852021dc06b910305819ad01d0d9eccbdbf91222602d56cca6b8c5c97274a85d36d874abf55f8166fe2ff5706150c1329fc75ae31f22b654a5d7bbeb12124c185ec43f78", 0x48}, {&(0x7f00000004c0)="8995e6a45757dc44c7258a255b66646fd0c525b9200a857f8154319236bcf9e80caf1fac6734badcb8414197f1891d1c158a19020887c8e2bc1f2d0da047539d12293b59dd0786a36ea54179ca0b94d629a824200183d7ed888ebd8c712d069f7724c5655648fc8ac6125c8b06d65fcb5a11b0cb3243090f452d2d26d2a240797c92137ec1e92e211ee7dbcabcee7847adec91bd781bac8095ae1610a4df386233e282682bf0945ee64e439cdab91148da3ff7f85888", 0xb6}, {&(0x7f0000000580)="ac539cdfdf98a3adb7a11eef4d2ae8a77d955df467438d8cf56a3d8132805627baa3a4143d9b5fe1a0a866dd9373d727c6d41049bf5481c4350a2347aa171de72fba59fc0ee95b751dd0ef299b2fd4a2b237f43d65b9a49ce89047c487922587a5dd128c911033cdb795f3a531d02dc61321e072cc04ae35f65a057c02b7eff7674d2f58b580c76c9bd6f6a874222e0d6fe865518087232d87a551c4198ea793b823862430617604f6ca8c4c28853dfd291536769944e5390b00", 0xba}, {&(0x7f0000000640)="b52dfd1fffd7e36c419e4b7fb191eefb262766a430d6518e62ba3693becf8f8432e45ec99f2bb2cc5a401be55b27151b9e22acad3afded67e8aa867c54af903af9ba355af90901", 0x47}, {&(0x7f00000006c0)="480b39fba2f74c489169ce847a438ce4860c1c28d0fa19aa62813c42cec364d871af3f6c14792c38a560c83f18deab317099a2a20d93477118d2e9d5efb288b1335aadc2c1c3f1d4ba286fc8be3164311214451909051b4b5ac2d313fbf676e9fdb59592189e745d0181b70072bae7ddd9867c5f6619da2d639f88cdd6d24d6bad65eccb66cdc3e98fbec2314e7b6bd46c4356c108bbc03b8dd1ae60585b3611b9142cfda8a15e56cd1ede7eed88a0313b29b0ea97d1a806922fbb4bf37082519558b76836e2236e6e3fb7f160018857296581ba18b6dde346", 0xd9}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f00000017c0)="b9177bcf08e537eef1ec4529280ab14f144731fd578188cbc3aa1ad61e88222f7c3cf6ab7ffa3f966fcd48b42bdf8b07e41016e3784a94aac66285422dea69b458d3a1de65f82199053326485fff34dedf554cdf929d9fa09d3c581a25433d3ebad51e9cbf4f84dec21b7595bc198f7e9376b2d406fbebfca69932bc5b2de81f32b3072420d1ffa0bc315afa2a03a5588776454b5b9ad73e9dd3051cd0fdbdd76ee173400c6a48f9b22c9d748e72b05e68af9020f20b166a5c28324c6dc6fd1128af320003d75b77d6594d095a04782097cac1a069e019480c15c41fac", 0xdd}, {&(0x7f0000000380)="b3022b415dcc0d377f23c0c965913ac4583c3cd649a7f1c3b7d3816d023aedf1b29d1493941c", 0x26}, {&(0x7f00000018c0)="6d3476363db1e00f537238a52822b1d99c204384a7ccb1730eaadb222e2cfb36591e635e3ed1c7a0f4398362432fc73c779dfbc0d1f78e1b893758142d784446721b4f9ea98e2a3717f2a238d7f60da63c7b5abe0776bf970021b475c457d8ee50901a62e7e6a56a8857cf2e00fd60bf43308524cbc04a512b0ad9f6751f3c9be0bee2a1a606f5a0b8d9262302d75ca43e0340052d182f30c65bd6e00da460c1674a041d3531028fcd212ab72806df14edbb687e0daed04a75f9e0a2c3480321a7a14492f296f4f81117367fd5cc6a37e6a07648986a18f1", 0xd8}], 0x9, &(0x7f0000001a80)="d17ee1a3c9190bfd5abdca2ab4bfd30da4fd7b35517224d57b0d13a8df69f8e449f6ed7d3dd66b009d3ac2095ece2885eb88f70d8532b2a3f0c28f2c18ae4445fbe7739ec1a5bb14961bf263213e07af4867ebd05700ca0774ebbac2246cbe9dd0092e36a31e5d813f3ed25d7c5edb29b329dd443e18ed4bda874741b3e6fa8870c5e7faeb66a36570568b07c9fe7836fd8f1b830827afa2841663e26133d7c96e976c2d08f75c65b0d2a55a680e83238b1fe59f2023eccd0b5a5ec941963e1f459cdd90ca87633f390bf8847da6ed747fae419c1a8170485a74ecd7ae6ae17a3b06c8fa8a83", 0xe6, 0xc044}, 0x800) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:51 executing program 4: r0 = socket$kcm(0xa, 0x6, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ptmx\x00', 0x8000000000006, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000600)) r3 = syz_open_pts(r2, 0x0) write$binfmt_aout(r2, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYRES32=r3, @ANYPTR64, @ANYPTR, @ANYRES64=r0, @ANYRES64=r1, @ANYRESHEX=r3, @ANYRESHEX=r1], 0x4c) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='mD\xdfYj/$\v\xbaj2emor\x00\x00events\x00\\\xf1\x13\xd8\xa2\x98\xec\xdcO\xc1\x9cJ\xe80p~i1u8\x14\xd8Z\xd8e\xc6:_\x9ek\xa2\xa6`\x92\x00\x00\x00\x00\x8aAS\x84g\xa3\xb1\x16!\xe2\x00\x00\x00\x00\x00\x00\x00!\x87\xef\"]\x0f7\xce\x8cm\b\xfe\xdbu\x16\xc5', 0x26e1, 0x0) sendmsg$kcm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000003c0)="cce6801671daeea5d0f78719267d87cdf15b2fd774d2e2b465f4a958c598a8c08eee43b21f6084ad95db47a7b76dea76bef36ce8a39b96caa367664c5a6f206a04cc51fcc5174800fc5630137ef94de12ef65f9f0713bf9536f23ddab979931c5bed4f574a0540c0cd42b92d746bb7b1252b", 0x72}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@caif=@util={0x25, "cbee77fa23bc5cb2fa91af2a15a034e0"}, 0x80, 0x0}, 0x4001) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x30000, 0x7, 0x10001, 0x2, 0x727, 0x1, 0xfffffffffffffffb, 0x4}, &(0x7f00000000c0)={0x9, 0x4, 0x5, 0xffffffffffffffff, 0x34, 0x0, 0xeb6, 0x2}, &(0x7f0000000100)={0x3, 0x40, 0x2, 0x3ff, 0x101, 0xc656, 0x4}, &(0x7f0000000240)={r4, r5/1000+30000}) 08:26:51 executing program 0: r0 = semget$private(0x0, 0x800000001, 0x2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'erspan0\x00', &(0x7f0000000300)=@ethtool_ts_info={0x41, 0xfffffffffffffffa, 0x3, 0x8, [0x1ff, 0x2, 0x80], 0x20000000000000, [0xddb, 0xc92, 0x6e17]}}) semctl$GETPID(r0, 0x0, 0xb, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x40) ioctl$PPPIOCSMRU1(r2, 0x40047452, &(0x7f0000000040)=0x400) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x422000, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r5 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r5, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) ioctl$KVM_KVMCLOCK_CTRL(r4, 0xaead) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r5, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x8) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) write$FUSE_WRITE(r2, &(0x7f0000000380)={0x18, 0x0, 0x7, {0x1}}, 0x18) semget$private(0x0, 0x0, 0x204) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000240)) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x200000) 08:26:51 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$addseals(r1, 0x409, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) ioctl$KDDELIO(r0, 0x4b35, 0x8) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{0x1ff, 0x1}]}) 08:26:51 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000001c00)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000001bc0)={0xffffffffffffffff}, 0x106, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000001c40)={0x14, 0x88, 0xfa00, {r2, 0x10, 0x0, @in={0x2, 0x4e22, @empty}}}, 0x90) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) bind$isdn(r0, &(0x7f0000000280)={0x22, 0x1, 0x9, 0x66dc, 0x7}, 0x6) sendmsg$tipc(r0, &(0x7f0000001b80)={&(0x7f00000002c0)=@id={0x1e, 0x3, 0x3, {0x4e21, 0x4}}, 0x10, &(0x7f00000019c0)=[{&(0x7f0000000300)="19dc801c852021dc06b910305819ad01d0d9eccbdbf91222602d56cca6b8c5c97274a85d36d874abf55f8166fe2ff5706150c1329fc75ae31f22b654a5d7bbeb12124c185ec43f78", 0x48}, {&(0x7f00000004c0)="8995e6a45757dc44c7258a255b66646fd0c525b9200a857f8154319236bcf9e80caf1fac6734badcb8414197f1891d1c158a19020887c8e2bc1f2d0da047539d12293b59dd0786a36ea54179ca0b94d629a824200183d7ed888ebd8c712d069f7724c5655648fc8ac6125c8b06d65fcb5a11b0cb3243090f452d2d26d2a240797c92137ec1e92e211ee7dbcabcee7847adec91bd781bac8095ae1610a4df386233e282682bf0945ee64e439cdab91148da3ff7f85888", 0xb6}, {&(0x7f0000000580)="ac539cdfdf98a3adb7a11eef4d2ae8a77d955df467438d8cf56a3d8132805627baa3a4143d9b5fe1a0a866dd9373d727c6d41049bf5481c4350a2347aa171de72fba59fc0ee95b751dd0ef299b2fd4a2b237f43d65b9a49ce89047c487922587a5dd128c911033cdb795f3a531d02dc61321e072cc04ae35f65a057c02b7eff7674d2f58b580c76c9bd6f6a874222e0d6fe865518087232d87a551c4198ea793b823862430617604f6ca8c4c28853dfd291536769944e5390b00", 0xba}, {&(0x7f0000000640)="b52dfd1fffd7e36c419e4b7fb191eefb262766a430d6518e62ba3693becf8f8432e45ec99f2bb2cc5a401be55b27151b9e22acad3afded67e8aa867c54af903af9ba355af90901", 0x47}, {&(0x7f00000006c0)="480b39fba2f74c489169ce847a438ce4860c1c28d0fa19aa62813c42cec364d871af3f6c14792c38a560c83f18deab317099a2a20d93477118d2e9d5efb288b1335aadc2c1c3f1d4ba286fc8be3164311214451909051b4b5ac2d313fbf676e9fdb59592189e745d0181b70072bae7ddd9867c5f6619da2d639f88cdd6d24d6bad65eccb66cdc3e98fbec2314e7b6bd46c4356c108bbc03b8dd1ae60585b3611b9142cfda8a15e56cd1ede7eed88a0313b29b0ea97d1a806922fbb4bf37082519558b76836e2236e6e3fb7f160018857296581ba18b6dde346", 0xd9}, {&(0x7f00000007c0)="1ea42c75e371ed9bd61528a1899f436a3647a383e83f055daaed0826b06a39ab2bf4065fcf4ce1aaf88cc5c0cc92e5ffe060a903ebf8d76b3eab079275be90a027bbbd0877998ade12fe1b37923e4cf930460b12c5026cb787c1f9c2e7bc706c1f5141df13f202ce92a1f22dc05c6ec38f00fb62f12a53064a5a79ac800dc44fa857d412e9b333356634eec3c9ef1fc87a3e8402de67f217c498f49b17a426cb3d0d19c97e82ec5af2d9f001f337afd18d2a5412a0b78834757eeaab194a17bf4037d6e0f23d327f5c388f63eec4c6ebc61100d2f94a5cf1843ac7e6fbaa306a0ffdbc6de9d01d551c67fe6f1ab40f2e17f71eb748f05d346beed11ad5bb6e10a6e1c8f5f3ff5c2a2e3be5eb522ff90450a5c85afc89c2b2b565bdbb59ad26679b98bda77ab2cb5285302a0650c5a0b0456fda3f6acf4e09f1aeb9c2e0cc69c96c21fff5829c89c66765d26d37a595e12f8a76f49c3569196244e37a01316afec58a8626f7202982d226e3a66f21ba5ed307fbc85b67a192088c5c2787b96670a239d9436d2a25f6fd97a20b164f923f93343b5b1e06dc042f7fde51440632ee8cdf16f6b11dd30790f1d09afbe0e43faae93e8a622025faed394b09d3dd0d9e8415dc876d4e7a4af76752a4d48912d6f0a569e8f537563c857784e926c1d8c1e23cfbfd888fdc7490f997c867b3aba325f7da95f3652f836ff695620ea281e5016562cb1d34bbc4022fd760d998edbc8b11b635384ac164e5ef7672bd018f515f86b7826e29866b5313bc8ada382b13f03ccaf8d02a9d62232d36bd350c109420c7c16f97223885eb141c280197becacaf579295b0456a17d45481900e976b3865bff5a6689d0402f8ae56d1a449ca146690e6f65fd7dd46fdb4d9410a9cde553da66cb143c12991fcd4c28ba6db946d04b3cc53c459664a1042a18c9a7efb9fb513db2f5a9e4ee024ab7718f91ff623597f1dcf81ed55bc889b3b8576c4c0391ecc8527c64eeb89bdf670b6541a19d9f8077cdb2c154c5a57013d3b299d8ba2dc5b7529c296dbc70743a4dd946895300673fd9657ba6a10c8595af6d8e7fe9b13fc05818e0bf215d5ff7899abe740e1055770383a6683042eddaf1aaf1572df462f2a9726bc91d9c7453653783ed55636059b1cdca1a0ba51af9b7350ba33b10acaab3c8ee80b9ca229c5171453b288b3f7f095ff557a373bc2ff1e470a865ac93ea6c28b72e85dd62309b48f9edc6594eb5fbe3283b85a6ec463f1a40ac373903108922314f03049ae19e59b15912552d19d19a63460348d9902cf524372568d041bf61c50bfdca747262be5f881e447145d9e85ec34732e6c5b8a2f990c5edbcbde9fc22a1a881ac3023d911cb200a8cb424b91df7f644f707eec5ccb143d679c3e5f8d8b7525d487b2a2245d86cee6921d658782d9c3c4fc57f530b341532175df1f739823792dd1f918f52ce2ad2f0c923793ddbad5ba869cb66a85df824ecdde551fef160979591ae7abdc748d25d4be7e1c9a74f95215e79260f45cf925e5ee240a93eaa053de3616be0aec833eb429e18f871efb05f84abf3f32b3c8dee0b9c3d1bb959d24b1d088ad12c347762c822b7e91b137553d5ed9cd84b4d4d11d124246a948f986277217746539d7404fbe1b4bf9473313b5717aa6a4579da169db1f4d3e83118640192c4b4ef021ae1f99cc4b8678842128d734b34130f7a43ccab63b89ff2d21853dffc3f9ad62efc2b23e77af61083ce4040cca7f61efb7158c960ccb716c49120c25c7e12828f133e002a8e3d5857886045d112ffd4bd2b1c16803d662fe7f3c05511526e6aad24f3550fcd944bc1469576fedc565f169b42458867f5768dc2b4cf0d0845fd789bba8fa7a6c496d1ab6944475277f40e8aafe7104e8617c4d06e38c0b0634636d138c35de74b4b2f9aed51efeac95f07f4445b7ed819ce4fa8e91e6a67023b9205f28e43a64bfc47ad3cc8f9e1ff2096690b3b8d8007b888c8b80d71892eafada7c29eee3f7639aa911aad2d1b82644a1eb7c4cf34795f95ce8cc85ce693d1b8591ffda64c765bee4856e5026c199b95054e2253f33e44eb73add66d39fb6d5d2f3fb0d49f3e45de19586d1fa977d4d93e854d55367dfbab656d9af126ba4c4c1543f32ca6d000ef54be16e793a47a53d0d3a0c5368c07ccc9ea1ea55a3143460205047543849916acab634ea1185c266a0df078b17516f7f1696f88c9fd61eccbbffc637f5e3a6e94b1799bbf4c1c763c80b2685ef922de4dd68c8a20be665d2f6108603deac2678a50c143f4c6955d94c230fde01ede284f2b7ca4bd149c50d018bd9859867577b97350c6c76026286feb448d3406e392d95bb685c12ad27ee151ec0435d09cd9e742df1cb659c00e0b8902482de97b778ef3858edce3b5508cbcd0bd402329bf197980bc882320c0c3f65d1860a649a60c51e0b72fa190fd5e27050c6f07b398c1604aaeb987487e2f53641a682ed7a8563bd0b47346ebd8d520390deaaaae36027c170537a09462e9c638c614d8e864f1e682cad696bf5c4d6c98582cbfcf195a3c3653b869ab8612ae69bd143557b2698ca8a2e9774658528ef56a6ec2f9e5383236177fe8f8d2449420c81b9522cb8f570df8ad41db30b53cab40a5b750aa3f92a79e89f57b927946e146c76dd1b627df6114b25f73ba50e9d2fd912ce024bec62a59fa1d2b379215a0258ed013382b8881580cc5d9c2e3ff92ea51cbd78ffb1da308fdb6385d2dc9623a8a4d956c481f029080fc909247cfe7e99378191564e0e270573ceaaa95e73ba9d60f73d2a838e4e8bec4b526b2523903645dedf6e2d44bc2b75037fa099ab5861328907c51ced1d4dd6834f040cd42a391a2d969c20368eb36d8900a8f9aef6d86493f7cc2cbd9fe980859ed82e76d853d70c631bad7e9efe3722bc4ab6fc08b9670aa42c731a9704e25c7dbc6c38308fb5a14700ad7ac5219bd5185dd9fe32ce8696d5e52d2235cd1cb340d1637c1c7981b85778aa53fa19d2895ac035502e1cdac841a955e3801d0cc3b7e977ebb24cb61847e618a2e022d0e85dec841618373a724d28e2e4ef3565b09f6f78e781f83c93fa8e9a52440a5283b16439568f0e473aa246587a7c3c7631368be362aa0244db41fbc0a63f756155a245478ccc80872a16841e184a085f48cbac25380952f4c862c45f8ffac48e4ed2511f6e06d0a48efc652995a0cec89ce194bf59eea57b00277bf30eb882d9e77407a4315708d0c1a675c489244ceec281dc760573091b00858f643886221b9c81de3dfffce2b8616d3829b8f189074708aecb17c2f934a086ca211e062f797a4f62f2addec37d2026bacdb8b1f98059527a617adcdd697a070db6ad85afc652e1ed44ffdd69f817f765e0d6f15375c84e2199bae2ea09cc6df56cbb1f16b7b534e2d013bd05a2213ee0a0a2c177a7367d76dbdabd0456c8d5c04c445cddc4f2e4d8b175694b4a695ce00f79ed1818058f153eed60da8341ee9b70d2631b943f58daea07cf20ef603dbfe1e1f1556cad0ab0e27755ef4e997602f6b3a7ebdb02c1ed063780f664384b1b4c7510b7122a7d025a3e13239e2d7eae4f5a257c225e7fce3ae302938ec1c4a96c1c16b85be30be10622da9e9a7227e483fb8ea80b996be0503092e3f0482b191da2b4626d6df7b6f1de3642b197df9a7cd5d4669c86e7924a1378f5823c6593a74e5bdcb2c88e5c371ce6e8e113cc46f14c6c2f8290f25c2958534171514633cb46870635553b00542d43b4666b23a4d47fc538863212f52d927459f4bde8d10003c001632571911b009362a6e931ec6b65c46d5ccf9457750e9943ab2cbdf2f28211799105d45844ddfefaf391d1f743f993bfa172d5c4655d0a3ba2c4eb348f00ff6fdf4c28d0b69c44753927465662c204c24dca998ec70abe90618bb268f7d5f91d9c6a623ad4982fcd8a6eb6e57d807f634ac39ea658d94c5a5e3073d718bb969bad68da5320d4e5576ec0cd955f9b91781dfe38536dd2a361c8a0f6360ccdf3dde0c7359118598397bc631c8aa9086742b13fcf171508bedac1adfd09301da49d037e2ba6ec38c8f3f5a9a858a26fc135b426c0228d9e15b7ba979980c015995ae2147d68519c616e4206e0ba6c416892a2b723790051000c15d3a35d5dc5f8dc8f8ee0de0ce09ba8fa7b8819ff0633398bb288644ef9c41092cd93ff952d6f54c6bf39f5c241ebf2bda23a64907821e7dc72f329482237f702fb07b2ce455d0987ef946f8f5847140800ba57ffae17a725143ef8e463a1f6a67807f6f93449bc08bb316559841f0559374bfebd54b3be10814323b03dd37a26d74eb65f5aa89778d9e8cd83c9b3dfac4cdbf4b97bd72adb0643b45af005c4b7ac80bf7740f10e2518af2acac3b1e1fb3eb3fcf9a4a9ded0a2b43bc8994ff7cff77e58ffc9bf896d2e321945382c4d08404c3c635599c6eb733c5699fecc47c5ca530474b9181d28c017d645683ca039d28c1d7c5ebda4e45df4cd98f48061b67d1ffe6d10a3d6009a6e25473693b193f57e1023223c956377112af185d61de5601f2f584ad2f5f20a0ecf8125e2b5245f14854c014cf1f5b90b535e15835d4403d5f5bb178e674d078347469bd69e62269fdc22937dd34b9ad4b1f203a23bd1e0e1ba6bbfaf8acc96a54a0987d648dfd854636ccda1967bad02a673f2c7ba32073a4e70cece44c3e4d987f1bf38c70c08ce92bfe30a4a0a4eae5e2a9e05569497715af5b8eba67703e6fa50af753efc0df2e3818c133ec8ce9776357964237dad97abc2f2c2464942ed88c3f856da5676dcfbe96f3d0a5d0bc49af291828a7d7c1764f7f9f1473fc5d66d3b7f463b18836fa2a01631361b611385a8e8c9f551301888db703c9e6c29ff0d272c8c3cc4c307c8f6d4636505cfa1832df611556f910eae3dc7cf30038f1e0d53ba89dbc78dc8b19f2980971cc23c9c6da6ed9d4cbdefd4aad56c2f0663216cffcf83d55424be323723ba212e607083a84697fc720573fda22b600d522c68e1929dbcacb75a0ad0c09ee92b3d54fae443cd98790673d7f980dc226845a592c4f85fe5756c6c7bcab6a2a69ac7b70e11ba29a63bc203bb9cd80cfc82399ebe2da661a20d675eef70f90d5000baa5fccb6df2961ba70404fc27cb381bf9fa23f0fa448ecd6ab9ac44f086a0d2c78c66adc6a7628da1a53d3c469206a5d435c95864a6612ec75960d0e0cf24cc4d738a315d3143fdd79932d6f39114564eca8bee596adac534152d022d755f1d412065b7a677244c24432bf782b65dc08347e8f6bb5a431995bbcd61f3c79ebab34fd5b7fc20024f962a924d6ab736b957349872049a57177fc8cb6c33587a507cfb30ca5170214a4274131b52eaf9babb9c95c7ca3c082bf1e015a72fdeb0d37473476a7778bb921cc689532ba384db354c148c1a2682bcd82b09140addce18115108f0ea7bad3989426226e23509e3a25b0e54ad80c8086261efee2055d0381d1e50a031589d73fe49195b20a8882ca76ff00653344b75f40b7761c9c961a3b8fca097f3b20ec0d494f81d13cedb64b79114685cff7e6e867047ed1f40ec00f47283e3e66a0d05c648a46689dc75abd0346ddad0d260300bca8cb46306dfed24e630b167bd9e4862dbb0e004efcb98503ea939bffd418ac3013f1566bfb0aadc57e2db984dd4c095bd20c56bf50ede7089ad0127325b1ad2f5dd32539bed421a7aca316ace9fb847884196ec6ff6e67a6c0857e6ddacf61d4a3d19efb6400f8a6d1", 0x1000}, {&(0x7f00000017c0)="b9177bcf08e537eef1ec4529280ab14f144731fd578188cbc3aa1ad61e88222f7c3cf6ab7ffa3f966fcd48b42bdf8b07e41016e3784a94aac66285422dea69b458d3a1de65f82199053326485fff34dedf554cdf929d9fa09d3c581a25433d3ebad51e9cbf4f84dec21b7595bc198f7e9376b2d406fbebfca69932bc5b2de81f32b3072420d1ffa0bc315afa2a03a5588776454b5b9ad73e9dd3051cd0fdbdd76ee173400c6a48f9b22c9d748e72b05e68af9020f20b166a5c28324c6dc6fd1128af320003d75b77d6594d095a04782097cac1a069e019480c15c41fac", 0xdd}, {&(0x7f0000000380)="b3022b415dcc0d377f23c0c965913ac4583c3cd649a7f1c3b7d3816d023aedf1b29d1493941c", 0x26}, {&(0x7f00000018c0)="6d3476363db1e00f537238a52822b1d99c204384a7ccb1730eaadb222e2cfb36591e635e3ed1c7a0f4398362432fc73c779dfbc0d1f78e1b893758142d784446721b4f9ea98e2a3717f2a238d7f60da63c7b5abe0776bf970021b475c457d8ee50901a62e7e6a56a8857cf2e00fd60bf43308524cbc04a512b0ad9f6751f3c9be0bee2a1a606f5a0b8d9262302d75ca43e0340052d182f30c65bd6e00da460c1674a041d3531028fcd212ab72806df14edbb687e0daed04a75f9e0a2c3480321a7a14492f296f4f81117367fd5cc6a37e6a07648986a18f1", 0xd8}], 0x9, &(0x7f0000001a80)="d17ee1a3c9190bfd5abdca2ab4bfd30da4fd7b35517224d57b0d13a8df69f8e449f6ed7d3dd66b009d3ac2095ece2885eb88f70d8532b2a3f0c28f2c18ae4445fbe7739ec1a5bb14961bf263213e07af4867ebd05700ca0774ebbac2246cbe9dd0092e36a31e5d813f3ed25d7c5edb29b329dd443e18ed4bda874741b3e6fa8870c5e7faeb66a36570568b07c9fe7836fd8f1b830827afa2841663e26133d7c96e976c2d08f75c65b0d2a55a680e83238b1fe59f2023eccd0b5a5ec941963e1f459cdd90ca87633f390bf8847da6ed747fae419c1a8170485a74ecd7ae6ae17a3b06c8fa8a83", 0xe6, 0xc044}, 0x800) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB='%'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r1, 0x0) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000003dc0)=0x0) fstat(r2, &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000003e80)=0x0) fstat(r2, &(0x7f0000003ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003f40)={0x0, 0x0, 0x0}, &(0x7f0000003f80)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003fc0)=0x0) fstat(r2, &(0x7f0000004000)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000004080)=[0xffffffffffffffff]) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000040c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004100)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000004200)=0xe8) fstat(r1, &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r3, &(0x7f0000004400)={&(0x7f00000000c0)=@proc={0x10, 0x0, 0x25dfdbfb, 0x40000000}, 0xc, &(0x7f0000003d40)=[{&(0x7f00000008c0)={0x10e8, 0x26, 0x28, 0x70bd27, 0x25dfdbfd, "", [@generic="8d6f1ef573ed0f8d0aabe33b1336fb05d8695f8adcde9820d6b31f10acfb7bf0b6ee62450e8f5f7f1670228a96eb322d9e5ede30328ac3", @generic="82060f46d27ae190eb75bd6e7fe400edc87cbb9a9262ff", @generic="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", @typed={0x8, 0x4c, @fd=r2}, @nested={0x10, 0x21, [@typed={0xc, 0x66, @u64=0x2}]}, @generic="aa05dfe8b86f2fc98a08cd6f50619303026ec80e000f95b9b42662c56db454109dc6662267a68f47d464714149a49eed8a711692f601c2e15a3f2223eba0665c007c2ab3b0a0a982163fd8a8ab20edb10d49b9db8ec518916a68de28daa7eb4d", @nested={0x10, 0x3b, [@typed={0xc, 0x1e, @str='SE Linux'}]}]}, 0x10e8}, {&(0x7f0000000180)={0x14, 0x2a, 0x8, 0x70bd27, 0x25dfdbfc, "", [@nested={0x4, 0x73}]}, 0x14}, {&(0x7f00000019c0)={0x1010, 0x18, 0x0, 0x70bd27, 0x25dfdbff, "", [@generic="5d9978199d3d6229e998f92cca9df5a5abe8863aefe0974096370a9947bf73058e0d6c28c7de13ff9001c349d3e8bb3b4fe6af06a7e236c9598cfce5a88043c7bbc434593dc5ac0dbd0247fc99277261b487b39d14542d2aa7436919611bbfc0b65a116d60e923a9cd706b75a2393f9d8bbe813791fb9f59432a099a0001585c668f3847034393f2cc7f138b826adbc8330d92ce2102ebc56e277626cd918643043e23cc60fb10d3043e2089bb2cc68d9bb9b6a1628b67b9739878ead70d89482c58b8104465ba31232851ad09ec909e1b5a67a42dad76569718ad3ace4495c9dc5db440cb2253dfbbe96db10953c1d779e3c4fd5e94bd14da3d75e7acf2476a9e18a95f2f8fff761cc22b6470ea8ee869fef05416c8c3ad184fb33adb9ebb756152ff46c943906ebab614a0eae26f5c9705878931ccc69de2480a601ad528c066f42236dddf1afed5878c5233cc61362c3a0e29806e79bad7e98fb393fcabcd36216df1b21821de5f1320193e1a30677fd3100ded8daad3e32f843380203aa79af7f3803901ac17bb3afa4aecc023c6ec5858d12cce8bd84d4241c90523fd8862100dfc9d39a051e61688202cad793eb23407aed52d6b6135984223f8843ac79d31726ac8c450d46ec8a816b03d2ff1eebc9f8d75b6a603d6c216dc1e207f86a0de3bc2e450d062f6fd75aeb6f9f7466986dfcb7fa4cbffffa99b7afac32e4f9d91752f663cbc98bbc58a858c946223934b9c0c540b73d9c35e8779b9d76b733d1048eacc7c1095ef7fbb369af9714a315dddc697e9255b7bcc3aa0058eb6a33ef41185ca48f3a8eb28cc705b0bcb68250503918cc1a6075d667701af267fbfcfa553ac66e3986353d1165a5088a257b5bd5c5cd24958b7166aac67d9b220be75ebfcd8eb008d3bd5a779581b3c5c898e49fe9a626fca05a3b81fa3cb3087df8a21b29697d8dc48da953edaf17884b20f15ad2251cb634794502fe93ceb6d3099c4a26797f8d738d1a00de55d3721c6851e680366681e93ff7763a818089a96812703a2d008a97282e94d9846fae8b39432ac5dc4d0163e896d24433f3c3cfc858d5340c78f77d03e203357a6c050ca085333d7bacdf5303033af629216dc8f7c4b5ce1720f3d9602150b90664a7587cda5b5769743d2a8ae9dba8a7b30c34ea7e69da8e9eac8e144e87d43f3c666308603f16f19875ccde6610f7962a2766980ce6533218c37c3ca88cae8ec3d0ee8bec0fa69752991b0b3060bf1f80cfe03a9b50325a063b7126e2b0a964a490fb7c4fc752da4b19d6f83df07932d43fcc27eb080db7a7d6e9f8d300a53702d66b419994a33041093b3326a49d1d79c45bbd47d075f3a72a9c35ab46a6e036d53ec03aad18ff542cbbb6856d38e0597dfbbbe789fa104127fd9cefac250693ccf86efd9f92f715ce1f7b5c3b353bb44834bc3a12f4a966521fd54118e50f0b97bef308c3b286d32f0ac6880442bdbe188edfb7abefc9c0ba163f8d94a60a0c208cb4b1bd9d1971812135818f12ab1e5d0166509689ac768a5c9a5244b708372772dd587b11c4db4eac88ae0637806221503c2fc3257acd51f189271e69c0dc5c609b41ddbba3f9466fa21510184bf57b04bf907aac6e586bf81306f3da6eb6a572f61867b9a0ec6be33dfa8cc102400ec4dabd5813f76985a89975050639ef8ab22c882410d9c2084cb060432ba79efed365a6c46b0179d73e68448c4995a79f4fa7830dadaa99329c02d061c4420242cc8d8ff82bc8f827da062e1aeeecb61216d05bc130211cf182392ee9e8d80f11b5aa7a17090084ea4bb8cf39ea4cb40f6936170c48015f9acb64e84fbcb3c5ee914b3d2f4d221456bc24d7665a163fca80d0c637d2464ba9ea1db5b8262693a5889f24fbeaada408b94fca6b037259999644812662d6adea62f36ca678badc06efcba28c779acc48428e8bd37093857ec1e57f5d3ed24a205504c42d379b2ea54435411ff4dc97c2a68102de268ce35df7ef1ae7e420ab72e6e1eeaf9b8d7aeb8ff15fe2f6484d7a7031b5cecbfd68a3073519c459ac6d26540eba7c9b30614622cf12db66299d4e34e53d1ed1ef787d8abf654d5bbdaa84e27ec903abca6587d9db07b567a3d61a598eb389d678d2fdbf0c54d2d276e2cf200806a75dc32c824a01e86988d7f7f6fa5539d410ebae7a535f3f2d574a09b01d725d5c5764110fbcb1168d0fef2bfbc076ab8f2fe38904bedbe8461e915ec00d31821056b3842b86785ab058236e4936d9b9dabeb9e38c14863eb7f3006bb374058b0fa6c7ca9e55c06785dfc928cdbfb40c51b584428af9e89f65135ac9d71eca82ce912ebc144e79815f26ff8c606fd2996a2733bbab6a05f2ee29666db8f83810158934e9f4b4587594846aaaf81d4936a5b7d2a4edc8d86c71b7c196f9f32e37fd4f3e2ec8ef26f84f4f270e6eaf8b1d243d778cd1d1649cde8f5f7ffcf05a05556ad76a8d3d1b3a11bbb429a297e9629362527fe88de242b156541fb948541b748c268797d87c6468ca3bfc8b58950d0cd13d5ddeaec22609335ae034a75aa8557bafea71effa13aa2ec121481861fea6f20ef350b73fbeb4379911c80ea0e87fc1322655823ec4040f06c928d63b4c710d0cd59b0bd2399ad17514f07255b392b2cdcb99268ead37c877eab76c434f754c5ac723c46cdcaf873f63f4229803b9057b62e3d62717dc9727a175fbe630ece4c0f93ce504b163956299767e259acf80bae9444a9ef1ed8bcd7f1708c2a32397d2de7049458ee87b32451deb79efaf5093d994b96b64d41c8419d9788f01b880d4acf0ae6e8437119957537373a844bf5c2cd107227491ab1722268df3382bd24e25526c57f32e32573700948698fe20dd3dffd9edc54909a3ce9feb0e22d771f4d99eccf230be153762408a0301a83d4283709dc1ad9c32c0992529e4798a44e42d653155477f57d95603b6e165aa615786dd3bbee526680db37b56b22acee8943fe551d701a68ae1d5e930ecd2aa34298f1facf43bc262c96c1f55ac29c48e61482ef865abf481d2280829c99fa6d96d6a83e4daf9ec9eb32b246ade2733ac9e8021bfbe6d267de5f7beb78e0687a068fc7fb54fc5199703abd040380059897436fdda8956e4ede770f32c93c249eb52612440b0cb5eb193f004d1f7cba533a32ec38d48d0782ed65b28a40b5da2e74ce8fb7a3fbdab269df9b7361cddcf887b0786d6fa00ae0808d01a5e9e18b160bc42e9aae1fc8788dd5f4459cb2c50d0c5cb06d8365f8d1a909dc1be22fb7205a0cdb8c5c5318fd513a611db97273f1fca1464d53a902ceba2cd998f2f39d451af716a807b66f323817bfdfd2984d7fcd13014bf8e703b7a77c6fbcf6236b6e5702c1851b64fdbe2776d3e8e4df9b3d782083dd1c30d7f1d530e1369fe01957468d328290c0fdac5b32a406a286091a5dcce21b3a38f2185b08b39d5534de865d2e4025083c27c3d370eddea03ff038476040851eeda968eac042e35f3cab317551d6d8c77b11f6cd89eed366c191ea4b28635811d50528e159812acd5b0d120a686f4ea9525679fd04c471ed4e83263d089de003ba3531dc00477ecd0dc6e8a61cf4215d8d79c6b772fe8ed01b1b0943f2c8c3f29ca67b9cdfb4ace397a7ce4aa5a74624d1a6c01246a0640cfdb8c46b2916c1749fc43192c77198573ebe69b3cab1b8759dc3b340dd94b8cb75b1c228701ddb28399995a6a8210748617a5b53ad119f284c779df3907a209e239b8bbbf0ef90a9274550344c7f7418fe636f66b02a5ff7f6f304fb6782807e3785689a1de147d708b67b41bb6d131dfc2d1f92cb9f9e0a8c9f72f392bd1ec0012367ca5c835e9622a4d5e03204fbabcae332d1385a0fc9db14d5ffabb59ca6fc849145f7405c3287c42e194d0c8b6d612e27c0f367b008af9ff05b94a02e0c4096d6fa0c836b357cb934d878ef3d5156c88ab60403f1dc5453a66c99044afed2a55d2b15f99db6ccdc573ec7a5c8cbf4b9d1305637d3d0a887c0ba9d2cd4289deae20136dd7cd42b549425c5d1e019e62b2c93fae1babd4f522e112e3bd2653337451a2c382159807d444142837d9a578bbc86570bcbfbf0b1276b9aedbdb90d6e86b8031b9505201d21a7cfac5c4f5644f597977c4ce4c124978a966939e78cf06010acfe7d08f9c4ae30d40075731b7d9f5fb0c5e8fe463bee93009a40ab6b7bfb32931697850e4346ee624fb3422b6f7b6a8be19fc393e1cc4cb41ae9da47085c535416773fa0cde905e0e2557dc054cb1f787ad01c30331f60bd54ae12767b8cf4a20ea1e9fac7faf90e31f563eac7f4043a318ba75c3f8da5c656907c428f10ebf68a22de85bd3e66ae7d6487a9041aae02edc119c8c2a9e12d9b0c895cde04f993af48a9d5d068193cc7f92f36aff44a718587cf2aa55198ea37bf2f9d0d693431dbe475f3812e2e58ac08df2c1bde610f4e95aed24635b73fd05398b561cfaf4e1afe68a16c4e061f46d15461dcb92c604a3f66abe130684734b85a081ab01fae59f1eca8f3b75efc2ec078a5f6a42ac265731bccad058bc48dccea25dda5107d8cee2198dce196b408e3a125c7cfa944333fe4fdab36d76983eed7ddb72b6b5a1c8bc608e41618cc2833e83eb66e0c7db40d6d33a4c8518861608d0228eee900c051d9d2ac75dbced172ab40950d579440182d896dbb8db62df1f6875292508899c8ae4c3220c0aac1025a60756048450553fdf35bbcea1c4b23600b3a4a12ee5e2048ddf6dbf6edb8096db8849ff76044b7f848c62bfdb96bd339c60ca900cddcba03895e7ec988278815f827c36e3822b739c999eec833a3abdb858947f35bac04628a2a85fc5c089c4852869125e621eaa6ef6227eb32f36f6f3e43deef0adc1e6bba3f07f639284e9f8634aeaa006917413ed704e699ce94f4afeb10d163e3bff49811ef480e42272376e263fc1b4987ded3bf477c8471c1f010ac7fd2c5d93860021e530683c6d3441cd34ec3e7a6004deb9f6fac82050fc0d89ec71b0afbbc0732e1d49d52fed57c0aa2889faee9be9814c03f76750e7cdd263bc8a16e2bc62670d05c1edc6a6f1d6602bd1d32285c5b8f187fd4da939c4962bcc8b55fbd45f3cadc619dcd72c9e3b4d75ac38cbf7b517cfd57994b9ccb80e845784106012eb2c042bf392eaecebd01ba11e432598416421604442018a4cba40912b9f85a013df607009d46972a54e0a0384ae11cc5cc24340cb3986891f826578025d52fcbc076587b63b22c23a51f338e4f7591ab48100cd8f22df958ebadef69e086e5de0ac36d055d93a2aec0108d4c1f1ff892913bcdc82f1962dbdc854692b11619b1294b21c667c256c623cdcad9df1c0540e44132869a3a3c21db5fccf2fc1cd993a940a3fe6bdb427db4b67dc889807e1689b5386d992a1ee9fa59afb2062c9c0b5674f657f47e58b0a1a5f6e50dd4ae10c4d2a7a7c5a1ca424dd4916e173abeef6540a5314bfc0d7bda00d0c845696c2b7898932ee9fe2dffcb0ca3c05b83de984efef2d8256abd470b16f69c0c821f2eb81f7bcf766620a55610930a9a7efa07d14963d6ae0622730440055158bf4b57f498b2f21ce869f8368f2bb226a90264a2c3002af96ca1d6497dc54fe16a8c281386a15535ce8666e9b2c9345c2b2f9535a78fd6611ab60f5113705da1023d1ea7a4b13639003e7e334a5881a7cb235b1dbcc0ca2537b5aa2e63166c79d301bfa18b720df95a32c50467abb9e3bc3b70fb234928c0c389dca7100e77f365341ad1"]}, 0x1010}, {&(0x7f0000002a00)={0x133c, 0x2a, 0x209, 0x70bd27, 0x25dfdbfb, "", [@nested={0xcc, 0x35, [@generic="aae60d0e12e325ad2b8c740f5e20225555be3a0bdb05af52b3500bcd5378c7ecd34026745d596c3080e8d3aa096e95426f444277ad0f3d684e34e69b6e47de980b3849469f887b99ace0d63d0b59cdb13dc3da5697e9c837b141a26cd5c108bab116043f22d1f94fbf8fb14dac0ee9ee3fe52454e1a01a9975963721be8ef60755e3993ee95646db84e49d4367a4c4ae67b5b046d74cacd3f67abe81b35a262a55fb037a14afa44e7cd12b935ed382a263c491f07f51c873628dc8aed185e33c41a89fc136f907d6"]}, @generic="d7e438f5fa2f7568848107fc3b55b91b7489977aeefdd8433ede3f86a21d3ae73047baece66d24ffd1ad7c62d399deb82fc7a66e6fc2e701ddc700dd2335322b63168b2704e5b026f150456ac0e867ad506e2a131f712f51e44c7f031a2df5cec084d141516d5257af2a95c7065b9fd1cd03b9209b6e0c5099eca36732e7", @nested={0x11dc, 0x47, [@typed={0x8, 0x83, @uid=r4}, @typed={0x14, 0x2d, @ipv6=@empty}, @typed={0x8, 0x3f, @uid=r5}, @typed={0x14, 0x3c, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="818f3b225ad919edc3c1b9ac7fe9a153f813c7a1c137e6c961238986a84b662833b37f7bc2df0464122b97d5c5a7ced1b248d74f3ca5458c688aae6d51265f0a9d2b10dd5e550cc86d88faf41cf03bf7ebe28f75bfa35cb91b7ba03b94b2917f1c8e6e47870a4f89e692de12e743c4a6a369390dd77e67f830cac2450bc120202114996e2a83724455607da20684a64a236491099c539d2dfb604b1f6dbfadc4054ace1644e3ade131a9c065eeeb23882fafa816439827f0a5d6652cd7", @generic="5bf13ef45aceaf86814435f21da326078e45458fcd64408c10f635925d8f4b929fd644e681cb219798ebef923e89b3952b82903bc674ebce4c8a164d373bd4bbb1d9dafed29e18e2954d21acec2207b8546b5773d49c7c85c384ca745d95ede175c90c176050e933766f0d77c68e70ba0ad3ce19f158172522a1219e2aa8410cba098fb3d3204389f30c4f5cd406d7a5e2e9d7e4d3d8148d7cc7af244a18f4b50b9b87def290ceef17effd429e584381ff6e56e2a915d3fd5a6c761a5390e286dc9c7010cdfcfd3f", @typed={0x18, 0x41, @str='vboxnet0vboxnet1!\x00'}, @generic="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"]}, @typed={0x4, 0x52}]}, 0x133c}, {&(0x7f0000000440)={0x428, 0x2e, 0x100, 0x70bd28, 0x25dfdbff, "", [@nested={0x190, 0x29, [@generic="c2757690377c02ea82c9867e94c149e66cea312a4409055e9ad47de471b9b71a5a7d4fd755f28853812c0cf55c8af417cba64cc14ccebbded405e1256ba8c6f3372828ac21af3f107bc0a540cc54f17479c513e61720831c202e6899ebde342aa9f4d6315aac", @generic="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", @generic="f98e98f3623c508f46de8e1a00e4dea8694460b698cb8de66f53d25bde6b96da", @typed={0x8, 0x10, @u32=0x2}]}, @typed={0x4, 0x1c}, @generic="87e5ca3fd5910775712405f71608c47c879b395357c1c0a0217f1b31c22d83660da72310da90925bef7502ea742c0c5a6767dda1db292997ad5e10b22ade5302d20aebe59fef3fa9cf321a684337065ab4a830fab5de3d52dbeaafd9328dcad5bc69f8246afb2d11ed6cca4827792df3ed1165e86bc7ccf68a256e2acda01e649d6adfabce308708", @nested={0x134, 0x72, [@typed={0x8, 0xa, @uid=r6}, @generic="dcb8060a31efcf95ea820082387087d9f94a61540d05974f8656f0f4767209ac1956aa0d96b6e30c89385fd47539bd418ce2588cbb151e2a99496bdfd04aa8e35bb5272780a7391f9c51f63e082cf0156594ed566f22a4a80a02eb6e3d2af253a64eaeebed391e28dad736d6e43d4a144bf67019a9e10f518e27a586a3c6dd073de16ee001dc9781649107061a39104b3394aa45b5601dd7a22fc3f4fab0217016f399d0c8d1221a163bfefbbf91c065e995699306e46791606695087bef19679aae6c", @generic="86c7354b613a8adc213cfa9fda5f048e4eedd604091d20f708170115706dd74c6d0b5d023f4b7f109da0eed97dacb30c92a3e3956613bd4fbb7e9aff3f4e56e81d305c97457a64e3b895ce6e57a81290a37be547577708528ac305975722600af1ab90a2"]}, @generic="0bff7b0533b9b958b68b4e5f0aee7b96e3890ab5bcc1a9a6a19dd765a6a0c243b21cfb27f07085c09a8fd09d5502e93120dc540acf70c8a9b5a29cff2afc7906308c2ea435958d7a083a030782407a369ad516a13166c3ec04bf7be86816cac3de5b9ff73c3a69f77139d8fde3f4f42adbae31bfc5efe6d13de803a1e10454fc6f2145760d0aa2944459be546992bfbb5fb340801b5897166cf10eb57041259ad6df8e698422984c54cceda5d7268b63218a7f4cacc9b9b2066059d9bca4", @typed={0x8, 0x58, @fd=r2}]}, 0x428}], 0x5, &(0x7f00000042c0)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}, @rights={{0x28, 0x1, 0x1, [r2, r0, r2, r0, r0, r0]}}, @rights={{0x2c, 0x1, 0x1, [r1, r0, r0, r1, r1, r1, r0]}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r13, r14, r15}}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r2]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}], 0x110, 0x44000}, 0x4000044) connect(r2, &(0x7f0000000100)=@l2, 0x80) r19 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r19, &(0x7f0000000080)={0xf97cff8c, 0x8, 'SE Linux', "0f00000000c46f000600000007000000"}, 0x20) 08:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000180)={0xffffffff, {{0xa, 0x4e24, 0x4ac1, @loopback, 0x4}}}, 0x88) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r1, 0xc04c5349, &(0x7f0000000300)={0x8, 0xd038}) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) 08:26:51 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(0x0, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000480)={[], 0x0, 0x400, 0x3fa, 0x0, 0x0, r1}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xd, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9e6f, 0x0, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x51000, 0x4, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x0, 0xc1f}, 0x0, 0x0, r0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x440400) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000140)={0x6, 0x101, 0x1, 0x4, 0x3, 0xb4, 0x800, 0x5, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000002c0)={r4, 0x2}, &(0x7f0000000300)=0x8) request_key(&(0x7f0000000000)='ci\xacu\x1e\x938G\x9f)\x9d0Zz\x0e\x87=s.idmap\x00', 0x0, 0x0, 0x0) 08:26:51 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) ustat(0x3, &(0x7f0000000280)) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="82685d6af9bcd88adbb11118c4ca12085b7c123ec94bb525eafd243e20403e4cc895d2bcb5d196031744079f85979bfb3824ebb4df5f4690e006000000000000d7760b946cc719a88345d17a8b4df6e35ee720e9c6245c7199c3ecff90bb83c2195b4cc81f00aa"]) 08:26:51 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffff9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") mmap(&(0x7f00006fc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) fstatfs(r0, &(0x7f0000000180)=""/140) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f0000000140)='\x00') dup2(r1, r0) 08:26:51 executing program 1: r0 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="738060abb75ca5275de783f8e848340bc0d90afda1a86f00e94d7fb75b1dd04d33b8888ae9dfa5cc739a237a6d26f1f1138851b0e2a3dfb10cea2cedbb36fb9c304b81673060a47a41baf0faac41f392265a5e81089bc70dd75a8f81be483ebacf211040a2314d4ce31ec390b4ba15e1980031cf638c1edf5989f9e048d0b580435bbfc00e072e68f07856c6b3919fdbdcec613043f383838b95a2da52049eb7e966183c4ae947f7346a0874011e46e9552d12fb51", 0xb5, 0xfffffffffffffff9) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="0100010053273938fc9a91ed0058ee981adc2d6041", 0xfdd2, r0) 08:26:51 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000d00000000aafe8000000000000000000000000000aa000000002e99a13382ddd59b6da1ee12b9506dca21fd01cab3874a5117eb955ff02adeb05f0d088505197a7a366ecb48268d935b817e262aa9bf50dc49dd9ef64b43284e684e7c92dd6662b947ff31c8c1eacef3ffdb39c573510f857c9955c7726fae55a3f3ab815a721653b86d73562bf12b7e940a9b471d383b6d2148d6b46a6d599a4edac5324c8faa64e41b808f2eee1d5027640fa5", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="0200000000000000"], 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x2) r1 = getpgid(0x0) ptrace$poke(0x4, r1, &(0x7f0000000080), 0x9) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x80000001, 0x5]) connect$rds(r0, &(0x7f00000000c0)={0x2, 0x4e24, @loopback}, 0x10) syz_open_procfs(r1, &(0x7f0000000180)='schedstat\x00') 08:26:51 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x10000002) r1 = inotify_init1(0x0) accept4$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0xfffffffffffffef8, 0x807fc) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") dup2(r0, r1) 08:26:51 executing program 3: syz_init_net_socket$netrom(0x6, 0x5, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000300)={0x8001005, 0x1, 0x1}) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000005c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080), 0x4) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'bcsh0\x00', 0x2cf}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400b80, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x900000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x24, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x40010) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0x8000}, 0x2) 08:26:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:51 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000700)={0xf, {0xf476, 0xbb0, 0x5, 0x2}}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000007c0), &(0x7f0000000780)=0x4) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x401, 0x8, 0x2, 0x3f, 0xffffffff}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0x0, 0x2d64339e, 0x1, 0x4, 0x1, 0xffffffff, 0x4, 0x0, r1}, 0x20) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000005c0), &(0x7f0000000600)=0xffffffffffffff84) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) fstat(r2, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000004c0)=""/218) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="4b0000009d2250072e11c9e943f43de3da421c28819a2a97fa61c228f8766ac9743866aab33a6c83e905c8f97ae1002a93d04bef7f4bda809f41e7251502033bd53df76aa061a6b040ea0691855c88"], &(0x7f00000006c0)=0x53) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[]) 08:26:52 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/23, 0x17}], 0x1) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000140)='/dev/full\x00') dup3(r1, r0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000000080)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x15) 08:26:52 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000001, 0x44831, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44831, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) 08:26:52 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x10000002) r1 = inotify_init1(0x0) accept4$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0xfffffffffffffef8, 0x807fc) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") dup2(r0, r1) 08:26:52 executing program 1: syz_open_dev$sndpcmp(&(0x7f0000001c00)='/dev/snd/pcmC#D#p\x00', 0xff00000, 0x440) syz_open_dev$mouse(&(0x7f0000001c40)='/dev/input/mouse#\x00', 0x8001, 0x8000) r0 = syz_open_dev$sndpcmp(&(0x7f0000001cc0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x20080) r1 = openat$cgroup_ro(r0, &(0x7f0000001c80)='c\xcd\xb8b}\xd9\xe8\xa0N\xdb\x03\x00ac5\x84\xefc\x11v\x14OjHU\xa1\xb9@x\xcdct.u', 0x0, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000001b80)=[{&(0x7f0000000080)={0x27, 0x1, 0x1, 0x7, 0x7ef, 0x10001, "761863a1cced6e49b11e87c81f8948aa830e72d7c2670ea84c23346765ce5590c3eb4bd06a4914cd0ef60b4424d8bce2a17bc1dd37c53156307ffa357b34ab", 0xa}, 0x60, &(0x7f0000001840)=[{&(0x7f0000000140)="1dec42e9f3b90cf4c4bca8b37242c7c0435341a35a3aa6721c5a9865d848f3b8d21a4674ee47405181c07f453da62a9b3fb81d1a6734dd4a9975b0a589217de2956af60ce8cded61275beaa88d9fd41ecf9104509ffbd950a4abc851c9782faa6bdc71bb911d9df56ee5890e9f9889f1421c972aa17b0980e265acf7dc21a849496b58a46b8abff25a77b441ce61c99bd2a8e9ead5c913d3a0bb759db2f690638bf2d3d3a2a7236048e8fc2639cad8b04faf0f696f609fe591e1c68b34d5ac21fc8cb21a5ed2bd8afeb3706632fa5393", 0xd0}, {&(0x7f0000000240)="454c2b7e72c10fe6c60469f4829a1d56df7aa2901744056c8e3b34e7fd57ac2a6cc4445b72ea21f21f11677a9666c6b513d257ae064aad696376c7ae74f7774bc3f28f801acb1f4b2972bb808290646481458c87f3563b1d2819925ed450d34b15d77a661fab0ab9608e0d5caadf9a78de286f62463b11cb76591bc158bf81cc274fdb5171ecbdfdc5fa923e8c0835a9419b89", 0x93}, {&(0x7f0000000300)="0eb43c53e8bf18ff98ef6d0d9430c1fcaabe44ed7987fc0a7e0aab891c5d248e39dbff1e1659a4e3db59879fd5974c8274e75afe162a83b302e905c62bd6ff1c14ac67e15443f37ec75b9e4b05619b7504f36bfaa543ff4034cca14f0c5e48c5a25a01ec078eb14f94017a38efe5bb87f3e520de0efd71709046c300fa59ffbf04bb38ce", 0x84}, {&(0x7f00000003c0)="b94d9be34115140e4b4747dfdee855705b1b1ae270b26c91f000e025a77df086e8d66d2b2b36f87bf4b8f71a82fd8fcefd4022ced264674281dac8984da722e650e5f5276c905cf23c6a082b1f25d782ad0cb5ed9199589de5dc60e9df8943d7df8b3d6ee9b57755bea4da50323bebde45016bbfe05cd0162d94717008c25281df49d9047b41fb5e2b1d738c8546a09132450cddb44de6b1817ceffbea1715c6b5279971df6767f6993edf64209cf9ef0fdae741558d36bea86d1d74fad335f914b7538900a07c7aabe56576e010feaecfef83edbce9fad080fe1393038396861bd85f6e1d588c41ad719a37229551d71da8386d05f8e240323b35b381a8aad01a5a7b1b8d14cefabb35a16e2e5e3172d98d203e8a64755cf6476e81aab698a5206a8589421098fd72b78c15fb539fec129af1ccfee9c1f72f641f2914d69019c691866efa50d7285267a1cc02412abc03a7c56fc9fda8a1f7a9f8436007222f2fd7797931ed0b43bed7fb71505a20aa9e949e10c598bcc20227085017e1afe35690c45d4f60769c3579bee32c8944e3e643ca1e910335519948468d1fe41af1647e5be4581b6d91bc3adc7e0946c2f5612d06c2e142ada20764b5397fe2f4b970db01371da6fe237ba633180738603d2fbef8ef12437201886022b95e9f28fe47be5c9181edaaf77a3f43000c8b80a0042683e98a7a7c1a7b8870b94e7c3a35b3762fd8439d4564b4199634caac2b5dd2045f42476414ea0e679d83c27252b03a352b6c43ec00eb61eab26926eeb5d9daed0cd495a0585da0cdb9791d8905ef8014152abce3a548ea1485fe37124701a90c558669544f972c0ea06f9ae928e40a9e8a0684dd0bf4e83f88d72bb6777d4a49baea2c9e7efc439ffda3ef41e008800cc0ca46be13b07af9428a4ea7afad23785e96c2b6a3f876fd110b8b4e6f95c8db6b36afedf672bca27465b3f767c8fe1a6bec7db1b8526e1d24bc074d1ea1809e9bef7758976c47e2b5e7746bc039badc9be294eebc2cb8ec173bdb5ab9408608c374310ea19d1efceca8ffff315b44549c11df689f2c736a3a2d18225135c89d986351f17116595bed9155486b4a0f9ab885667a5cedd2d28e9007ffa64014268d5fe3c3dec0d074dd7d93c121219fbd22e8563dbd81e9747eb6edbd74d1b1395b292c22e106cf3a04db0e6e602297b9821b229e23d7841fc707a6e1e2625b2427e29b374f0accce7ccececc5c01712bdc156bfa3a023b57c0338ec45c98e8d0d3fcfac59bf1b4cfb4f8f78f2ef3a371d8beb407b5421599235660dec0753ea9e759e79adff66018ca134db50b723c8d4b3433588eed1bb5e6d46cd62696a077949dd989f5772a6a8f751627f7bc351eae6187331b99944f33cdc9244e16ca7f3aea430b8af2a576d043c4203d9f8350275478665f3be6648a0c8c1af096d99f38f52d4cfa5b6650e84474da17b362cf5f79a5ff94797b0f946c734901dc2511d2d62b659dd79405eb96c8683cd5ff0d15a0a255c46720f32d3c1dbcbf68e0fc4fa4d5013537c02d758b416d5e78f73523e6a4a93d5c8f40f4525849a31399c791c5b96703d8f11a5392b3d13fb567ba676f46af225e7269513f40207c96369d981f016be59bededc0e621449e3685f4a4699c53223bbe6d49d281fc7eae08b99c94a159509f569a975a69a8e06a81933051ad36310b04008765fd75991611c794cf123f4c772ca48c128be45471e05a62c13b58863816280e7fb6f63077c8f6e9f5209be39593d6da817578d1728f2915fca1e60301efb7825b9234b5057bef87d7426fd81bde5aca3d03f3e2efb0448cb6a7e69f69788b0cef91927b9752febed7d23c6bdc5b31f708d83483bbb8c1f466c4e89156c4ab40c6f082a8c3dec38246ae44f2e3640d9b2d3b4e1703bd7d0e2e0c742da8a2fb5b8dad93a227168f9874d815bf96b77cd2499ac393b3ae524cf8401555d5ab80aa5b92591253dbf51a4a32256ff2d24fe7e40061421c545985ee5dbeedcf106ba3ada395154f70e01ed08b7e59f276c2495740e21f16688ad5be33c531d4bf1ea13e3c4b0b3b8fa975cb88fc40fdd981ce553159770a42eddcffca4c4187cfecd81ad7e77c3c41b3565c86d64a3a08cb20060ee4ead3e9a1b49dfcd5ddf82fb62d3b6035ed101b7682fc9680dc6419b9cbcf119da7f293c623ba2fd15cf4d0c42f36142a8a836644e166409c5dc9d308002217884fb1b60060460aedd6ff2c8ffec02c274a4e3af2ac37714eda37cd95ef05e72d212c130617fbad0e80d847ef1928482ce4f1a3f5723c7b07cf94f88a3fcf68c54605f676093e736c8e3ba54ce946939b9fb9c48128785ddeede9da961673c3cf2f1161f195bd9ff78d90e5008c04a1c0ca2219a3fd5af092f6adfc85f7e51b010e0d8593c7c379c9dbe8326a15a1a1e3f6b9ddfa508e25369d23ef12b155107b0072f6f618bc7bab5ab3672ac00f76aef0aea7da0ddd6bb0e72e7590d3f95e751d0231e51df3b0a91208a8519da2028d93f28d853656f64c753493c71196e340a06fa34cc82f33c88ce164a01ec845aab4b8b9279635f97c4989995dd6ba1b689b6addc8061dbec6d574f1e287b719470017a89ff580e2ee8369d606117338fe9ad97750ef4d1d754fcaef4ff1813a9c339d1b9add5a6a85295e32122d1d1c2b1b95362fac1a221a70481f047ad162e45c9803b54ddb7bde49ea6c9c54c17a1757587ab8e8ec61ee34b2951b5d07f56b920ed4e437440191daf19d812ec852b8c487a028d10ace1d3b99a95713a478be29249d1d079fd8395f936504b3b0643596a50b2af290a37b0c48a39a6e43ae22cfdc6811404be1eb9e2d034e0fc171b8cb44072dc96b9c587ff79a193d778e74c58ee24fb6a9710a9b89cbf1a9dd8522a3fc7d6243691b2721345235064ee2ef7c30191917512c74c5656333f65022bdb5f6a6952760813b0318767177ada197a4dd1e34258cf40900dd4012e8959c031be9b95c3cf255bfe7b320034171a9260eb550f94d86cefad96883ba1f021fe18fc7633e550d2bc77afa2362484147a6ae82d91895ecb67fe444512027915ab195139963fc58c851de757a6a5c81e9c465924b26f05a3b3c260147842144351797a614ecdfe552826a22e0b7a976f436aa677d13644c129eb13424e9277b6abfc31f9ba65b7b0c677505df4e4a474c04ee5b2733a34f6e9164e7dfba0d3212de3331cdfecedf436e7b842e8f52b0813bdbe5e80587b9fe93067c7d91fe59799c824a21aa1230724df3cdf3e1924bc17bdb81f6cdf169a0b94a1047048a16c9e362732631d593fc87272c9023426cff126b5dd1b4739311696979a84a6ad623bf99d6c23b27d5350611a82fddb5eb232ff6a86fefb3333ecaf47a7a319a25b24995b1021829804e5adc3e09a28264acd49948eff9744f8975501357fa1c63a9e3108c4be03554b28bf4d626d8d740d95ac93db28fe3de464bbbb57c8bde957f839edce23a740ecf8a06155038065be168b4b340f2464a6a7be09d340ed4c5a110cbe097292d866782e7d1389eba895fc758c7d4e982d65a5552e1a23410c45ea35d69140f20053ea343f9023dc1029da5ec08150542d0711e6018055d57a56945c27b0dba1056d7392cb0d490367717a2c11f672949eb6ad1e058d1a791f7805821e7ace95e95e5ac02eeaab647383899bfca84677db67e9ab42a7ba0e4b325ca56738a9a1f10ec90610492e6c1f94ae84d7c2579e499e0d190dd99d9bb3a0dc62c730bb358ce5b60ff47af81807c142f7aaecb1a6a55f514c03f71fff2a42162ca3fde165af68a8c8ec784cfa7befb4ec02ec0706c295db36934e80f6e7344f443829aef82399e2dffdcb9bdfd87bb8e39eed530c14309a9f38acf6f3a263c703017f196ff7211e57604ff7d4f1b6b5092a5f82d16e3064bc738f16030143bf5daf22bd1414a2839cacd4cfeb5fa89c335a89004695b4264a48a7e2381f719354b01f5f5ea9452db4140cfaed34cdb13ad408e720622f5886d5099fb0ca037dbc15dc6c3a55553dfd7c0a71ceeddfb6eb3481b5038cd264994e1a9b8e85a166cca8cc85346c125f91ee3b9cd5066ef00af3e7911541ea3f20dde95913f3a96cd326f2638a956e7d39e83be2c247db6e9482241fc1df988a670474b39974a5f76a2a0e0a0ad66dc1c415163b46cf1b78dbf9bf452a96b5ff4063611efa6cb7d94248369e846a2306f5c99129dfa91a33a9cb3714d22c00492a87a0d53e3b0d150403b07feb10f9de5e7fc2c52d4e7fad5b91f1166e588e862f8cefe1ce1f9fe7cdcdd852e82c96ffb21ee11c9a00a6f04338c820faf8896e4ee47592b93357d27a018e3051238e6487af5c2847e635fcee88cf33c3f55103278764fa474755da7f44469bcf96ea5dd59a6ef54846b678fa29646499affaaa6c179f4b7e04d8158d8c8573b5677706943961e6bbb86ff0375e0920a23b8df851224401172b9abb17bbdf889682b57cfa2e16fcc0857dc58ed9a9870241328c72b702b5023a5d5d7d1f50b9f9202a68a941bfd9272d0e31f4127075d572b019146bcf1486891bc0e004a36136295fcc1f8981dd2e8f1b3ca114afc4e822673c04df672ced70858cfada866ca1c7d2103d957fb8ed0f8df4bff0b567154a6235e2559fc1ff7f649c41598356c5c6f15762a7d9ea6dadc47bfab9d4ef257e07cd82f0afd7f3ce4feb387cd7c04484db696c0a80456b24fc3b7157549a4481be2d9d34965fdabbbd490e5da22f2af513a863778f39ec0e0c5ef4ded71809fffb96c164b062069bf614282cd678894c33875730e77aab26a11b70168cdc19798dc14f4c1baa062d5bb4a046ad57c9e759320c6e1d3145e4ecd58f20a2fffac5eb4c5203cdc7b6c40329eb5b35d3dc577f2ff88d28c1a2e1e148920ec45446cb94b3a6c3ed4e5ec893daeab0a7a4e1e7d242075008a42ae57916c4c795b8b320688099f8d295d0d7fbee5393883a5a469fa12440c22974b8df2a0f2efa583c4a523914b259192d8306f82ecdfac03d830c264af890e6911ae83096009ebdfd8bc631bad3b6d447157716c42148595948750d97141a7f810e01f9b66f91b9ec54ddf5e10cefce807849f03f31d74fab4e601c9d6009c39e5a5908eaff740087a97b333553594d597bf5ca1cdd31bf4490ffbdb5a2714a72ad8c494cf04dd16112ba727bccc390bdf2f91b1d0e56de0fa7de1560ab7463904c2a3a4d6f7a615d1aea80c9715864789bbf6c29d5bc6286e513b0e6c0f9061e7d4cfd535fcfdf83d701eb4787c8a6d67af77ec5177289cbbdd238ed08aa98f6bec8cb28e3e149d07fe023744b512fdfb5a090d294503c4b68ad62bea0f5932b4e9d7ab7fd2a8a7b9cc3125826f5c453c2065c395fd8e37856a2fb8ad48b70463bb4fb0a9f43d042fd9c20921a1d276facdbc8453961d4d75d47d5cb3ca0e5635242283b73e6308bc08489dcfe40f7f0068afcd43ccc4381be651b9b60b5ccde0e7cf9e0f498fc8a0d8442723d31f93302e6aa627e5639d78900dddb1f3db6eb1df7e073e1cc672d4c6e72ae557a6518b288b4c624b092664c7c167cfc123eb5aa3e7a7271989b5fcdc57b4a06fb5f1f4d852887ff9e955660c35df848ab346274fab44af0fdc662827be5159732ff920481652a39c8491bb75e592c2f0263cd7796679541f39bf3497f117508b2b0b642736901d64bab3129b1fc81917ca714cc9b2fb185945af226b4ff667c78ac672e7878c5fdd106d1faccbb9f80f898a6450aa85b0db", 0x1000}, {&(0x7f00000013c0)="d1a49bf6812ea48da06afbba24435c8154f9370aabe380ce8c3a09feaf214f54fede1deadd271bd5f30a5cbb3ae40771b61a8ca9f17c5b0df309a2bce94f88dd3e789cde489e34fd4f69bb7ebb4c67f9633df4b1313c3142b438cab012c53b5adcabba191e374cc6234cc01cc4b25bfa249f596c8d4fb731abc3f1457ee9ce734326d135ccaa2b6ffaa6dac49b133e9bfda52db43ca99a9785670180c00264ed193f8a1419604b0584f07917ca032675230318786e1a59d2e5dce55780b396bc629da25efbfc056c692a365ec2ff333d15eefccf96c42fce07cc0d88c3798c62bba7b6dd9f5f542d428b5057df82b301", 0xf0}, {&(0x7f00000014c0)="05f828729a42bcbc895cd64ddd3d604435827df139dc3dfbfdd977fdd8146075269f1199901a52f939cfc14a5a838b3ded1da8dfdad899634f0274d8da2a29c92d4410dc05ac9f8a2f63e19dd4a2dc9dfb0637b97c73b79f9f4b20d5f20df626e4964c01f04c0013b0bbbf7b40bc6c5e9583a736fefe398c61cd603a10d7385f8528746d70e8a603ff7fcc6e6342c16f3e7c0d5020e17807be0ab605b5c4fddddc91998a123f99b6235364b316e025c800d4d0d9c9022b8ee7e35d7a", 0xbc}, {&(0x7f0000001580)="f07def87122a838c2f95dd3cd7ec5d4ee8701fbfa6815d313f3060a6175d7dca6d6482e756a953105250e878fb0f94ca8e6b8488b80820904b077219df98979a2c4191e586a3d8863a5f3445aadbbfafd32f35f249bab1955f590eed92c3c3cf23345bbf546aa055921a3699ac95ca2bb00051ab75c1c7ab6f5df483d4e57a4ba455b78ef4a88dd3b2bd94b296432a209190b70a82c38d39fe683fd10049a05bd4ac85909b0926f8687be24611a697a8eda7123bdaa15a48bb37f31740cf3af47709790376c23908373b831db438eef5223dad4349607a45613de3873e257ecf6b60bad71a44298334f00e9294432d60dc267ac596da7c", 0xf7}, {&(0x7f0000001680)="70bb5e1753d5d6fa3d05128d01cddba0ac1fb756a0b5110eb53b4e357644a8f4483837fb8cb6ba76c0d7f151454f77bd1a2f195b844eff390eae5751502dd5ed632613f9b5c27fcb141e203d6f22110c09d606f9d722af45a1dcea0b93529e05625abbceded82841498ec42e9797ecdf0d", 0x71}, {&(0x7f0000001700)="60662e1f30612bbd95d7b4541a69d6c283c6fa47c481797d8dd53333d780e5908d302943b40bbb3734dd2b913f48b3f5bde62689b82aa5c57f4ac25a3e8dae3eaae491572a76ca774722f641f2df1e25060dcf8cb9acccf4f454828af93d72c45a78e194b258de4e5c9d573ab05bf7de62b722664d8949f5000574c51f805be0011bcb719773538efbc9237f11e385a13a534572727bb6e3db8fabd231ebfb1b84b16b59a1730411c68d2ea900e72f8f8f003b398322ac36db7a4328c1b79c7abdfbf4378311f7d3c94d0e81731fe5de58622a90d398c097eb06512852173df41e7ec3539beee72269fe09f46984cc01f1c8a09e", 0xf4}, {&(0x7f0000001800)="6e97c3e77c413a", 0x7}], 0xa, 0x0, 0x0, 0x4004}, {&(0x7f0000001900)={0x27, 0x0, 0x2, 0x7, 0x80000001, 0x6, "7d89990ed9dca54db6187d2ab972ba293baf94be6f3d5fd6ea2473a590155b7b01e4575adea3d048d050720dcd18ed167ee16bcdd93d2cda9e75e951b70d20", 0x34}, 0x60, &(0x7f0000001b40)=[{&(0x7f0000001980)="ec0fffcd9923a7016c220f5aecec469f21fff348da71d04cd62efe6db49620cafc3c", 0x22}, {&(0x7f00000019c0)="01337d7986634405c5238a1c4a27fb58ae4d1d112c96c79eea71bb360ffbbbe45d17363d19fec9b1c7b51f1e85b23de87dcc83277c3db726b0ffdc1a49285caf0e9e552157fd3d1c140863123e3588a5", 0x50}, {&(0x7f0000001a40)="3c920277c1e4b12e90c9f4780059ae7be9ef459eb51421db6cb702d756da1be97eb240b830b57936d3cfd73d081ff2405671d894e27c9f808675be08d85f5ed85baca3d58bc2e00e2d2e0bde479df0bbf9bb1fe5e67c53b0f09fd9ff1397144643e65c749fba92b8034bced25fea3f307cee46", 0x73}, {&(0x7f0000001ac0)="f2c5b1d83cec494f413c7642812e5796b060f9b04cfed2a2b1acfb68d39888f6f35eaf1d394281a5dfde36494ea09935a03c5c08257d00041695cc20f159ab41455e74e1cd2df2c7ccabc49b7da437e5e449902919b4b4057a421265ae21c1dc5c3516aef1906d3c3b6693da7138790dbe9382d6", 0x74}], 0x4, 0x0, 0x0, 0x4000}], 0x2, 0x20000000) add_key(&(0x7f0000000100)='r\x01\x80\x00i\xcbx\x05\x02\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, &(0x7f0000000040)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0xffffffffffffff6c, 0xfffffffffffffffe) 08:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x2}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14) r2 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x3f, 0x10200) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x8, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000ac2766510000000009000400950000000000000095bb0480ff33f9c2304e6f9b24fe9f043ca2029e835f2765a7d73214f015d09960da0009a0bdc991023e3971f0d30a487d2e4f61712afe6e7614054f2c0c18d10f6707b4430419d406d43d75f3000000552f2785fe6df4be67528d2784e5c73670c1240e866bda9e63e439a2f4d80d35ce709dd29258d6e42f4981d406e92cc15bf7154a61bfa92669c8993e60232a8f8943222f4e5978c01dc2524a1a6e64c0e246581d33fcd907c6b0da25ea00"/218], &(0x7f0000000200)='syzkaller\x00', 0x3de0, 0x37, &(0x7f0000000240)=""/55, 0x41000, 0x0, [], r1, 0xe, r2, 0x8, &(0x7f0000000340)={0x4, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x5, 0x0, 0x3, 0x49}, 0x10}, 0x70) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f00000000c0)=0x100000001, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x3, 0x6b, 0xa, 0xff00}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xac5ba43d) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x14d000, 0x0) getsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x1, 0x0, &(0x7f0000000180)) 08:26:52 executing program 1: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrc\x00', 0x0, &(0x7f0000000080)="01e793961adc2d6041ff000000be23000000000100080000", 0x18, r0) 08:26:52 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, &(0x7f0000000000)={{0x9, 0x1, 0x8, 0x37, 0x8}, 0x6}) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000180)={0x1b, 0xb, 0x3, 0x0, 0x0, 0x0, 0x0, 0xd2}) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) setsockopt(r0, 0x0, 0x8000000006, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x105082) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000040)) r3 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r3, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r2, 0x0, 0x102000002) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x1, 0x0) 08:26:52 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="d7df12c3bc80037eb510a315aafc56c4f87c25ff6aee74edee8555e0f5642a23496eb7f86a861373bdaf6673f1bee9a6ab497ce6fe65667aa3c9a19c9d1ed03404c6f09e23d13b4fef195051c7e67fdd58be08f950499c66e74482ff29d990a2b644b00f9718e6d1136f3b2d7ceaf785f831569e17f7a76a60a9"]) 08:26:52 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000700)={0xf, {0xf476, 0xbb0, 0x5, 0x2}}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000007c0), &(0x7f0000000780)=0x4) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={0x0, 0x401, 0x8, 0x2, 0x3f, 0xffffffff}, &(0x7f00000002c0)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0x0, 0x2d64339e, 0x1, 0x4, 0x1, 0xffffffff, 0x4, 0x0, r1}, 0x20) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000005c0), &(0x7f0000000600)=0xffffffffffffff84) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) fstat(r2, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f00000004c0)=""/218) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYRES32=r1, @ANYBLOB="4b0000009d2250072e11c9e943f43de3da421c28819a2a97fa61c228f8766ac9743866aab33a6c83e905c8f97ae1002a93d04bef7f4bda809f41e7251502033bd53df76aa061a6b040ea0691855c88"], &(0x7f00000006c0)=0x53) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[]) 08:26:52 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000140)="010000d7eaf75e25a6ade0920000000000000000ff649c27", 0x18, 0xfffffffffffffffe) 08:26:52 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0xa03, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu//yz0\xf6', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendto$ax25(r1, &(0x7f0000000140)="593ba456623b4d15f9403c1261d8c0d87ab65bb12c9955beb907ca51a44aa320ec2e242d819411cee04c6ffdbdd6fdee9f050e07436921b4fc1f5e832e73e544ae313063b955dfef1f32e8cdfb6fd966122e3b31ac8a6fed128ec88bc3acc170b157a9727882a84bcc4eaeabb1e2ad779e271e0d1197c1a3f8706b604e1a3c37756f446054282c", 0x87, 0x800, &(0x7f0000000080)={{0x3, @default, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x48) openat$cgroup_procs(r1, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) 08:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x1ea, 0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) [ 286.560572] __ntfs_error: 6 callbacks suppressed [ 286.560900] ntfs: (device loop2): parse_options(): Unrecognized mount option ü~V|%jtUd*#Injsfs馫I|efzɡ4#;OPQXPIfD)ِDo;-|1Vj`. 08:26:52 executing program 4: io_setup(0x5, &(0x7f00000000c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20040, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x1001}) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 08:26:52 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000040)) r1 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) fallocate(r1, 0x40, 0x5ed8592b, 0x3f) 08:26:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x101000, 0x4) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000180)={0xc03, 0x5, 0xb0, &(0x7f00000000c0)="1c1978c36c3c1c2c731d5f6f381d07e19d6e106575bc0e7146a544e45c88c6d9bfb0d9d0909e2124f2b928b06d0269967a297145b50da3909652e9b01c341fbefe8e2f10d57aac089d36c68f51d36ae79911e357fd8f42877b4d52a9b56dad32f5e0dc7b3c4af9ea2968bf0b2606daba2bf439ef00106369a28a7f03985af9192668093c5d60afbf7d6a3833665c3769753693414290a82e430a85ae1f7af9cc303f2f36547ee6460adc9d906e77b50f"}) 08:26:52 executing program 3: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'ip_vti0\x00', @ifru_addrs=@llc={0x1a, 0x204, 0x7, 0x2, 0x8001, 0x200, @broadcast}}}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000100)={0x3, 0x20}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) dup2(r3, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f0000000000)="11dc") 08:26:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x114, &(0x7f0000000080)}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="ff000004", @ANYRES16=r3, @ANYBLOB="000727bd7000fcdbdf2501000000000000000c4100000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x8004}, 0x8040) 08:26:52 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r0, 0x0, 0xfffffffffffffcab, 0x0, 0x0, 0x319) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:52 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000031903968b0f4f1930fb76cb76df727000"/33], 0x14}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000080)) 08:26:52 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x40000, 0x0) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x5}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000340)={0x401, 0x200, 0x2, 0xfffffffffffffffb, r3}, &(0x7f0000000380)=0x10) [ 286.790128] protocol 88fb is buggy, dev hsr_slave_0 [ 286.795267] protocol 88fb is buggy, dev hsr_slave_1 08:26:52 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000080)={0x9, 0x8202, 0x4, 0x80000000, 0x0}, &(0x7f00000000c0)=0x10) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000180)=0x1000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000100)={r1, 0xa326}, &(0x7f0000000140)=0x8) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000001c0)={r2, 0x6c2}, &(0x7f0000000200)=0x8) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x20012, r3, 0x0) 08:26:52 executing program 1: add_key(&(0x7f0000000000)='.dead\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffff9) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 08:26:52 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x6, 0x80) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x7, [0x100, 0x8cd, 0x1, 0x74, 0xb88a, 0x1, 0x1]}, &(0x7f0000000080)=0x12) r1 = accept$netrom(r0, &(0x7f00000000c0)={{0x3, @default}, [@default, @remote, @default, @remote, @remote, @netrom, @remote, @null]}, &(0x7f0000000140)=0x48) fcntl$getflags(r1, 0xb) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0x2) fcntl$getflags(r1, 0x401) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000001c0)) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000200)=0x10001) get_thread_area(&(0x7f0000000240)={0x10000, 0x101000, 0x0, 0x1, 0x6, 0x1, 0x1, 0xff}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/131, &(0x7f0000000340)=0x83) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0x3, 0x6, 0x9, 0x960}, &(0x7f00000003c0)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000400)={r3, @in6={{0xa, 0x4e24, 0x7f, @mcast2, 0x14000000}}, 0x8001, 0xffffffffffff8001}, &(0x7f00000004c0)=0x90) r4 = accept4$ax25(r2, &(0x7f0000000500)={{0x3, @rose}, [@null, @bcast, @netrom, @rose, @netrom, @bcast, @remote, @netrom]}, &(0x7f0000000580)=0x48, 0x800) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000002c00)={@local, @remote, 0x0}, &(0x7f0000002c40)=0xc) recvfrom$packet(r0, &(0x7f00000005c0)=""/4096, 0x1000, 0x20, &(0x7f0000002c80)={0x11, 0x1c, r5, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000002cc0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000002d00)={0x6, 0x201, 0x6, 0x4, r3}, &(0x7f0000002d40)=0x10) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000002d80)) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000002dc0)=@int=0x1, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000002e00)={0x7, 0x2, 0xa000}, 0x4) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000002e80)={0x3, &(0x7f0000002e40)=[{0x8, 0x4, 0x0, 0x6}, {0x3, 0x10001, 0x9, 0x8001}, {0x9, 0x20, 0x6, 0x8}]}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000002ec0)={'veth0_to_hsr\x00', 0x7fffffff}) r6 = dup3(r0, r4, 0x80000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000002f00)=r6) write$binfmt_aout(r4, &(0x7f0000002f40)={{0x1cf, 0x3, 0x3, 0x58, 0xbe, 0x0, 0x45, 0x4}, "ee9d0580906839540c58efbcd1c54a0e842bc4b88bfe2535ce98104fde86bd57aae6203d8d2e2c258801a2119584499d6990fb3874f87e4ce383c009a5bce4e8a85c04696a37fb541c9d04c06d4b9db86070f0d367142383943ad27812c0dc076753444547cf75310ad7189357e6455ccae39e81147c724f59473bfd7342d6d8e824942b4b9b48398c383cf54df26a5e696666955a8649dfecac42d12b23f4fd71e3", [[], [], [], [], [], [], [], []]}, 0x8c2) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000003840)) recvfrom$ax25(r6, &(0x7f0000003880)=""/249, 0xf9, 0x1, &(0x7f0000003980)={{0x3, @null, 0x5}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x48) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000003a00)={0x3, 0x3, 0x7}) write$FUSE_IOCTL(r2, &(0x7f0000003a40)={0x20, 0xffffffffffffffda, 0x2, {0xe4, 0x4, 0x5, 0x1}}, 0x20) 08:26:52 executing program 3: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'ip_vti0\x00', @ifru_addrs=@llc={0x1a, 0x204, 0x7, 0x2, 0x8001, 0x200, @broadcast}}}) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000100)={0x3, 0x20}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x140202, 0x0) r3 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) dup2(r3, r2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x0, &(0x7f0000000000)="11dc") 08:26:52 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) wait4(r0, &(0x7f00000000c0), 0x1000000, &(0x7f0000000100)) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:26:52 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x2) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{}, {}, {}]}) [ 286.933678] binder: binder_mmap: 15291 20001000-20004000 bad vm_flags failed -1 08:26:52 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) keyctl$update(0x15, r0, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x80, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x3, 0x4) 08:26:53 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x181042, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000e00000/0x200000)=nil, &(0x7f0000ea6000/0x2000)=nil, &(0x7f0000e0f000/0x1000)=nil, &(0x7f0000fa3000/0x3000)=nil, &(0x7f0000ff4000/0xc000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000e4c000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000edf000/0x2000)=nil, &(0x7f0000f35000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="7bdc2ad404fe8dbc4ff2edd6675bf69fb916a29cc5f468262f1a395aa959fd6f3ecd978ac84b4b6d89d7447179854de5a8a688617a4d8d86276f3c105f0ee46a6311652361146b8416070489bed2d12064893b1746f0a5334ad39f8067f3cb9caf7ca5bfaca477fd5159722d232d24acc856724b1211cff2e1fddbd88d0ccbcfc78195b8d4a68529e561f9569e602339f128800014876c000bbdff1205074c10b1bf613b86a0233eb1c592b622b36da451ad57a77890d9751fedb382241f3f433121d61efc09ac280caede3c30189651e686232e1a4ac86f84733900150c9cfc1521f947c3", 0xe5, 0x48de41dd}], 0x820, &(0x7f00000002c0)={[{@shortname_win95='shortname=win95'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@rodir='rodir'}, {@shortname_lower='shortname=lower'}, {@utf8no='utf8=0'}], [{@seclabel='seclabel'}, {@smackfsroot={'smackfsroot'}}]}) 08:26:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f00000001c0)={0x440cae34, 0x4, [0x40]}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000003c0)=0x7795) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000380)={0x0, 0x2, 0x1, 0x4}) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x800) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000200)={0x0}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000340)={r3, 0x2, &(0x7f0000000240)=[0x10000, 0x4], &(0x7f0000000280)=[0x4b35, 0x5, 0x30a000000000, 0x3], 0x0, 0x4, 0x3, &(0x7f00000002c0)=[0x6, 0xffff, 0x3ff, 0x0], &(0x7f0000000300)=[0x2, 0x3, 0x9, 0x2, 0x9, 0x8, 0x4]}) 08:26:53 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f00000000c0)=[0x1, 0x3], 0x2) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000100)="010400000058ee98b1bbdca841fc8cd97893961adc2d6041c32558a2a350b62096fc8bbf229884309d07b903db41b66c67b2923229c79b826c90a582d3d3703e6617e8f2e4205836176d23b02200dfeb0fda3b75152a8838e5e02203a43fbac9b74d8c", 0x63, 0xfffffffffffffffe) 08:26:53 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) fanotify_mark(r2, 0x52, 0x40000022, r1, 0x0) socket$kcm(0x29, 0x5, 0x0) 08:26:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000004000)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)=""/96, 0x60}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8001, 0x4000) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x408140, 0x110) dup3(r0, r1, 0x80000) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002200)={0x0, 0x1c9c380}) readv(r2, &(0x7f0000000100), 0x228) 08:26:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000080)=0x400100000001, 0x19f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) getresuid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x800028, &(0x7f00000003c0)={'trans=unix,', {[{@access_uid={'access', 0x3d, r2}}, {@debug={'debug', 0x3d, 0x4}}, {@cache_mmap='cache=mmap'}, {@cache_fscache='cache=fscache'}, {@cache_mmap='cache=mmap'}, {@posixacl='posixacl'}, {@cachetag={'cachetag', 0x3d, 'system.procselfselinux@$'}}, {@msize={'msize', 0x3d, 0x1}}, {@cache_fscache='cache=fscache'}], [{@euid_gt={'euid>', r3}}, {@dont_hash='dont_hash'}]}}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1f, 0x4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x100000000000030) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000500)={0x0, 0x1c, &(0x7f00000004c0)=[@in6={0xa, 0x4e20, 0x81, @mcast2, 0xfffffffffffffffd}]}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000580)={r5, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x7ff}}, 0x8, 0x4}, &(0x7f0000000640)=0x90) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000680)=@req3={0xffffffffffff8000, 0x0, 0x20, 0x1, 0x0, 0x8b}, 0x1c) getsockopt$inet_mreq(r1, 0x0, 0x20, 0x0, &(0x7f00000000c0)) [ 287.216703] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 287.270138] protocol 88fb is buggy, dev hsr_slave_0 08:26:53 executing program 1: r0 = add_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="301ecbee09953d8f91b950dc366a2902e19e28d2cf0169b41127f4c693cc659ac5b912cbad4bacadc5c2339622146446b87ce417c89d4e4c246160b2155a09e84b42bc2df4df2a927817f572c4b986078f197984ba53eddbdef70638eb21710ee13681a47dc17796c127e3a52664d4a04b0251dad83bc2f65663174766fb55df6cc89a4c34e5b86596954058f281948f20e0acaa9f7b8b547ab45762bf910c1cdb0374659e7e342d7456a2b55248365c3e735119c7a228bdadc93e1e0cb5a6d00c16bda45b9cd5a68130d1ec1b7011b4c233", 0xd2, 0xffffffffffffffff) add_key(&(0x7f0000000200)='\xfc&\x86k\x00\x86\xa9\xa1\xd6\xf12\xff\x00\xe8\x1d@Wu7\xa7\xd0\xca\xd13\xf0**3hqP\xca\r.\x12\x8d\x10Z\xd4\x9a\xb4F\x17{\xdb\xf2\x9c5I\xe6/\x1f\x1aE7\x01]\'a\xff\x11>/\xbd0\x91\xff\x01\x00\x00\x00\x00\x00\x00\xdc\x91\xa3\xa9<\bI\xae\xe4t\xbd\x1a', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0xffffffffffffff1c, r0) [ 287.299212] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 08:26:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = getgid() setfsgid(r2) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca500000000ec7be070") preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) [ 287.348618] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:26:53 executing program 3: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f0000000000)={0x40, 0x7}) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23, 0x7fff, @local, 0x1}, 0x1c) r3 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$int_out(r1, 0x5460, &(0x7f00000000c0)) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000180)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000002c0)={0x8, 0x8, 0x401, 0x1000, 0x6, 0x3, 0x10001, 0x5, 0xfff, 0x3, 0x7ff, 0x9eff, 0xea1, 0x200, &(0x7f00000001c0)=""/205, 0x8, 0x200, 0x8}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:26:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x400000, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x18c, r2, 0x6, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb250}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x9}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x80, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x9, @empty, 0xd0}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bond0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x2a}, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5dc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x18c}, 0x1, 0x0, 0x0, 0x8891}, 0x0) 08:26:53 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x20, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:53 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) write$UHID_INPUT(r0, &(0x7f0000000280)={0x8, "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", 0x1000}, 0x1006) r1 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)='keyringppp1)\'\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000140)='keyring\x00', 0x0, &(0x7f0000000240)="01299ed865444be02abbdca841fc8cd978939627dc2d6041", 0x18, r1) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfffffffffffffffc, 0x80081) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x2, 0x0, 0x10001, 0xc6cf}) ioctl$TCXONC(r2, 0x540a, 0x3) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f00000001c0)={r3, 0x800}) 08:26:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400001, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000007c0)=""/9, 0x9}], 0x1}}, {{&(0x7f0000000c00)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, 0x0}}], 0x2, 0x0, &(0x7f0000003b80)={0x0, 0x1c9c380}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp\x00') readv(r0, &(0x7f0000000580), 0x46) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) 08:26:53 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x5, &(0x7f0000000280)=[{&(0x7f0000000100)="28d124636bb48acedda8c0", 0xb, 0x9}, {&(0x7f0000000140)="c183e6a4afd1", 0x6, 0x6}, {&(0x7f0000000180)="8c39cd05cb8d634c128d7ecc1c2c7da60eaa692d3e2ae331996ae236bd3d529da1ae918263f15ac31cbe7fbb67c724a10fa2a6a323329a3ed265c813558e53ca6617db18a4c90f151b06b50183171b1d1c48241eb5ecbdcba9f29afc79c2fdc518c0f7cec5f963cdec1ea5e32670768c266e6e363118132fc17c87515fc9a5", 0x7f, 0x400}, {&(0x7f0000000200), 0x0, 0x8f}, {&(0x7f0000000240)="5a467b9313df3db6c8d637878395c3723cf564bd17da60", 0x17, 0x81}], 0x8624d096667589ee, &(0x7f0000000300)={[{@noflush_merge='noflush_merge'}, {@usrquota={'usrquota', 0x3d, '!wlan1&GPL&-/'}}, {@noheap='noheap'}, {@discard='discard'}, {@noinline_data='noinline_data'}], [{@obj_role={'obj_role', 0x3d, 'rxrpc\x00'}}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x802, 0x0) 08:26:53 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x2) lookup_dcookie(0x7fff, &(0x7f0000000080)=""/44, 0xffffffffffffffc6) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0xbaa4) 08:26:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000002c0)=""/246) r2 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x8b, 0x8000) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f00000001c0)={@null=' \x00', 0x9, 'ipddp0\x00'}) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$bt_BT_FLUSHABLE(r3, 0x112, 0x8, &(0x7f0000000100)=0x7, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 287.761534] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 287.837060] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 08:26:53 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000080)={0x0, @bt={0x3, 0xcf7, 0x0, 0x1, 0x1000, 0x3, 0x2, 0x3f, 0xfffffffffffff358, 0x6, 0x5, 0x8, 0x5, 0xe7f2, 0x2, 0x20}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x70d000) [ 287.906413] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:26:56 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x683a, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x9}, @timestamp], 0x2) flock(r0, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'gre0\x00', &(0x7f00000011c0)=@ethtool_perm_addr}) 08:26:56 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200080, 0x0) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) 08:26:56 executing program 2: r0 = perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x10001, 0x4, 0xfff, 0x80, 0x0, 0x100000000, 0x40000, 0x1, 0x2, 0x3, 0x5, 0x4, 0x7, 0x8, 0x5, 0x9, 0xade, 0x3, 0x100, 0xfff, 0xf4, 0x3, 0x5, 0x7, 0x1, 0x5dc, 0x80000000, 0x2259, 0xffff, 0x400, 0x80, 0x375, 0x6, 0x8f9, 0x3, 0x8, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x1440, 0x7fff, 0x3f, 0x2, 0x35f, 0x7, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) r1 = accept4$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000340), 0x80800) tee(r0, r1, 0xb2f, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000004c0)='security.selinux\x00', &(0x7f0000000500)='system_u:object_r:hald_acl_exec_t:s0\x00', 0x25, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r3, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TUNATTACHFILTER(r0, 0x400454d4, &(0x7f0000000000)={0x0, 0x0}) 08:26:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20}, 0x10) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400, 0x100) r3 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x90000250) recvfrom(r2, &(0x7f0000000100)=""/158, 0x9e, 0x100, &(0x7f00000001c0)=@caif=@util={0x25, "8eb37ce2275d4205d3384eaa637af19a"}, 0x80) inotify_rm_watch(r0, r3) r4 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/udp\x00') sendfile(r1, r4, 0x0, 0x705b663e) 08:26:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000180)) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:56 executing program 1: r0 = add_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="4c6a5ca998958d2a7c07c0162ff116786a83b729a13498345c074c585f7ce0e3645c336598617d8c4f82a7177ba3a97f85ff72", 0x33, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1d1dca841fc87b51ee1961adc2d6041", 0x18, r0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x109101, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) 08:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x100) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x7, 0x6, 0xb04}) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f0000000140)={[], 0x1, 0x8, 0x5, 0x0, 0x8, 0xd000, 0x0, [], 0x7a6}) r3 = syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0x5, 0x101000) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000300)={0x20, 0x0, 0x10002, 0x1a82}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000340)={r4, 0x8}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000001a80)={{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @empty}}, 0x5c) 08:26:56 executing program 0: mincore(&(0x7f00006cb000/0x2000)=nil, 0x2000, &(0x7f0000000100)=""/34) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82203, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x100a, 0x1}) 08:26:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000280)={'bri`ge0\x00', 0x7fff}) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x80901) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000180)={{0x4, 0xa}, 'port1\x00', 0x41, 0x2, 0x7f, 0x4, 0x4, 0x8, 0x7fff, 0x0, 0x2, 0x7ff}) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:26:56 executing program 1: r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='[vmnet1vmnet0self\x00', 0xfffffffffffffffb) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='oom_adj\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x5, 0x4482) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS2(r2, 0x402c542b, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000280)={0x4, @local, 0x4e20, 0x3, 'lblc\x00', 0x8, 0x1000, 0x68}, 0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000580)={0x6, 0xd1, 0xfa00, {{0x800, 0x20, "03aea52e16e45b88ed9cc2fd6fe619dcffad3d0b54edcd1558bc4e963e185a2427e51d8e59d2a9788f0c30e53260e1415a699250426a2415a5c3b0e0e7222024be9d3770c3e75249adc0193efff5e38def92987fb7f42d54cb4d8bcfa8543f779d77dc6e6540d502b394a45bd1e4b786bee8bf002cb5c4123cea008b0a02b274af9fb60521de1a951086134b3959b547b223361a8e1d5250903145350f00ee018688f79d2487fb11cd2884d43322a668e6a6d77a470be792b225993794e79e7ed732c413950aec772aa96988f35ca71d734bc38ffaf4c1e4eaa25a0aaa4b1894c229989494ec8e20462459cd8c31ddbc74eb1cef614ba8e8d23afa0e9c5ad57e", 0x4a, 0x6, 0x9, 0x6611, 0x39d8, 0x4f93, 0x1f}, r3}}, 0x120) socket$nl_route(0x10, 0x3, 0x0) gettid() r4 = getpid() ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) prlimit64(r4, 0x3, &(0x7f0000000140)={0x1, 0x200}, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) getsockname$ax25(r2, &(0x7f00000004c0)={{}, [@netrom, @default, @bcast, @remote, @rose, @netrom, @null, @bcast]}, &(0x7f0000000540)=0x48) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f00000006c0)={'hsr0\x00', 0xffffffff, 0x100}) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x1) write$P9_RGETLOCK(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="00003f01a2ecabab19ccd20ae7259fca047aafc2befd8da9f378d129f01ca2b7742f68bc528ffffb1958eadd0eecf8dcbb36c1a3d2a8411cd20cdee9c5913c02f510d9195a8f00"/84], 0x54) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x80000000, 0x4, 0x9, 0x7}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={r5, 0x7, 0x81, 0x6, 0x508c, 0x401}, &(0x7f00000003c0)=0x14) close(r1) add_key(&(0x7f00000000c0)='rxrpc\x00', 0x0, &(0x7f0000000180)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, r0) 08:26:56 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) epoll_create(0x5) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000080)={{0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) [ 290.473975] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 290.496186] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 08:26:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="8500000000000000250000001a0000009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x40000, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r0, &(0x7f0000000140)="f9287e93cd2e889b02037caf0fbf5fcc40ffef28880f0e0b1482a90499d0107b6aeccb28d23e361d1bd8964e701b3bf78fc51830fbc95c05b2738e868f943597e65ac0ca5306a7f2ca4daee87c1d46f34a0caae7b633a4a5cb440b2a7cb6f8f4acc2bbd1a1bdf500baeffdb71852bb504ff810727c8275fb3e0cba3c23931a63", &(0x7f00000001c0)=""/230}, 0x18) [ 290.536478] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:26:56 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x353, 0x0) perf_event_open(&(0x7f0000001000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8440, 0x0) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000100)={0x4, 0x0, [{}, {}, {}, {}]}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc4c85513, &(0x7f0000001000)) 08:26:56 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000004c0)={0xfff, 0x373b, 0x2, {0xe, @sliced={0x7, [0x10001, 0x5, 0x7, 0x1, 0x2e, 0xfffffffffffffffe, 0x5, 0x8, 0xfffffffffffffff8, 0x40, 0x6, 0xfffffffffffffff9, 0x9, 0x80000001, 0x9, 0x6, 0x0, 0x1, 0x1, 0x5, 0x2, 0x9, 0x9, 0x5, 0xe58, 0x7, 0x6, 0x0, 0x7, 0x2, 0x8, 0x10001, 0x2, 0x1ff, 0x0, 0x1, 0x81, 0x0, 0xffffffff, 0xec5b, 0x381a, 0x401, 0x2, 0x100000001, 0x9, 0x8, 0x2, 0x80000001], 0x9}}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f00000005c0)=""/4096) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x400c900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0xd, 0x3) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0xffffffffffffffec, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="1be7b39c158a4dcdf7ff30eb00ede2782be85ba121809413cc8990e875ab969c6a9d46f64d945bfd91ba6f6e9c12ac53195a642d7cd24d97c09f87f970ad1fd913264cc5474ad2706cf84479df16995b35c8d23b1b82dfb05fd98e42df981485"]) fallocate(r0, 0x10, 0x4, 0xffffffff7fffffff) getsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 08:26:56 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) syz_emit_ethernet(0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) 08:26:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000100)={0x20, 0x1, 0x8}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendto$rose(r2, &(0x7f0000000340)="31391eb655293c6c321f45bf9c941ce359a2a139f4429567e7f796ea4a7cd95a5d8149ea1bbfc6536f5e036d61cb6abb73dad843b1f66e6f70d482c66b3353374254acfeb3a8523f19d55d28d4a53397614c12808262ee77f52f235717684cb638c769c87ea43fe2d03a0748dd7f36e7b426a335ac4b57dbd1ec2da7f6981630e6ad6b67a1aec095054451206970bd293a2b86209af1caa6504312bdb54c58747b00bc7ae8b2fa230c6648517004625f2546fe", 0xb3, 0x1, &(0x7f0000000400)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x6, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]}, 0x40) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000180)="493b1996714df3e289cc2bda60cf92efb21e4d04968a542fd0877d8391a12ea79aae6f63839f461bf1bc8129c661f93210b2b91bf8f4fc713ac802937ac4978b59a802f6481f6d1a2ec4fc4b08ab18205f18a6aaba5283ee6e7ffad5f9ff589381d5d112590dd93b012f0ac1add7a04a7e6bb2efa6626de072b396999dfc0250de4f5e805e482a0ae56eb7abff7b695746af8e1bbea4b1941d618dfa0a9cd56241410259015fe7f7a615124d92275ad8130c7d0f8ed3001d27f9e14dde6be7db890edb7ce027ce64743db88e363f2f4ab96770d9a3b71f8c2144645dedde199ee71774167a0fe23f4f817209dded1fa2f4ebbb86ec3f", &(0x7f0000000280)=""/103}, 0x18) 08:26:56 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x2}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xc0}}, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/172) 08:26:56 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f0000000100)={0xec, 0x3, 0x401}) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000180)=0x91) 08:26:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x32, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x11, &(0x7f00000000c0)={0x2259, &(0x7f0000000040)}, 0x4) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x101000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10200000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="52fd287c0c4d3f86805decf37e47997ca84a27467119841ff98eeb671932120a71aa869fc12565f6d2195f6ad16c047ebdba5dd7192f2b52feb122e242463f343199193c012bc0a4a8f313b9c30cf045628b16df0c5c8da97e", @ANYRES16=r3, @ANYBLOB="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"], 0x238}, 0x1, 0x0, 0x0, 0x24004004}, 0x4) 08:26:56 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x102, 0x0) write$selinux_attr(r0, &(0x7f0000000240)='system_u:object_r:shell_exec_t:s0\x00', 0x22) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00002dbd7000fddbdf25010000000000000007410000004c00180000000562726f6164636173742d6c696e6b00000000000000000000000000000000000000000000000000000000000000000000000000000000e6560a9ff417470ca929f8f04903b383fd6ea80c26e7fbc5ce0154f12d86b911d6653a8459485079bfbdbe98c8d9f2f6833df3b927004fe547c0586250fc364fd6a079dd115246e9133ef3c9457dc55690cc204fe1c49e7b36fbdfc9"], 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000280)={0xd90c, 0x94, 0x20, 0x7fffffff, 0xffffffffffff0000, 0x1f}) 08:26:56 executing program 3: r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='[vmnet1vmnet0self\x00', 0xfffffffffffffffb) r1 = socket$inet(0x2, 0x3, 0x2) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='oom_adj\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(0x0, 0x5, 0x4482) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TCSETS2(r2, 0x402c542b, 0x0) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000280)={0x4, @local, 0x4e20, 0x3, 'lblc\x00', 0x8, 0x1000, 0x68}, 0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000580)={0x6, 0xd1, 0xfa00, {{0x800, 0x20, "03aea52e16e45b88ed9cc2fd6fe619dcffad3d0b54edcd1558bc4e963e185a2427e51d8e59d2a9788f0c30e53260e1415a699250426a2415a5c3b0e0e7222024be9d3770c3e75249adc0193efff5e38def92987fb7f42d54cb4d8bcfa8543f779d77dc6e6540d502b394a45bd1e4b786bee8bf002cb5c4123cea008b0a02b274af9fb60521de1a951086134b3959b547b223361a8e1d5250903145350f00ee018688f79d2487fb11cd2884d43322a668e6a6d77a470be792b225993794e79e7ed732c413950aec772aa96988f35ca71d734bc38ffaf4c1e4eaa25a0aaa4b1894c229989494ec8e20462459cd8c31ddbc74eb1cef614ba8e8d23afa0e9c5ad57e", 0x4a, 0x6, 0x9, 0x6611, 0x39d8, 0x4f93, 0x1f}, r3}}, 0x120) socket$nl_route(0x10, 0x3, 0x0) gettid() r4 = getpid() ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) prlimit64(r4, 0x3, &(0x7f0000000140)={0x1, 0x200}, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_NOTIFY(r2, &(0x7f0000000240)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x10}}, 0x10) getsockname$ax25(r2, &(0x7f00000004c0)={{}, [@netrom, @default, @bcast, @remote, @rose, @netrom, @null, @bcast]}, &(0x7f0000000540)=0x48) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f00000006c0)={'hsr0\x00', 0xffffffff, 0x100}) setsockopt$inet_int(r1, 0xffffffff00000000, 0xc8, &(0x7f0000000000), 0x1) write$P9_RGETLOCK(r2, &(0x7f00000007c0)=ANY=[@ANYBLOB="00003f01a2ecabab19ccd20ae7259fca047aafc2befd8da9f378d129f01ca2b7742f68bc528ffffb1958eadd0eecf8dcbb36c1a3d2a8411cd20cdee9c5913c02f510d9195a8f00"/84], 0x54) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x8, 0x80000000, 0x4, 0x9, 0x7}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={r5, 0x7, 0x81, 0x6, 0x508c, 0x401}, &(0x7f00000003c0)=0x14) close(r1) add_key(&(0x7f00000000c0)='rxrpc\x00', 0x0, &(0x7f0000000180)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, r0) 08:26:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000640)="dedca5055e0b0000002f96129e75779ed0a1f924518d7c0070a15b4e0c30f4d105b8b593a0fcc679567e8279e2e75b1d75d8daa0697c8dcd41a05f0593f96eb1da804eafd92464e09762dee397147ca5c51d971742b1c440a723dd79e484d75ec8bd07f2ab33b2f6ead6506f62b5e6f60379387edb19134d576bdaacb63e092a1a5263016aa4988703e7d1c36e2e5a772dde951212d844d1df926a78179c16302ae2ac787f7089405c6da981d7b21eba692d93702c903747ce7564d0e88a61de2071ce") r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x3, 0x8003) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f0000000200)=""/253) ioctl$SIOCGETLINKNAME(r2, 0x89e0, &(0x7f0000000180)={0x0, 0x1}) sendto$inet6(r1, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c) sendto$inet6(r1, &(0x7f0000000f00)="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", 0x5ad, 0xc040, 0x0, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000300)={@remote}, 0x14) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000340)={0x0, 0xc8, "10ad7fc8af14a621771dee6f95eb54803ebf1dd20b9dd7efa345ac734d52960d9299b352349ba90639eaf69e4467669dd4fbf77345c8a2ea930e0f1151bcd8be77a1018b48d01bc71f65dd1565a08252e44bac5c74552038969ee4a7ecf496b711829498ad2a6f96a7728c185c042092a0eb1a15e441daafdec0aa4a84ea2da674850a4d9383b821d4f451f673b524725f98b3bbbb1c6afdf387b7c446a3438939cace06adc71be69d3c914df6757234e1f28882b871eda01d5988c73fa238f332556371c77bb2e2"}, &(0x7f0000000100)=0xd0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000440)=@sack_info={r3, 0x8, 0x6}, 0xc) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) ioctl$VT_DISALLOCATE(r2, 0x5608) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000), 0x4) 08:26:56 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x106b, 0x8000) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000540)=""/192) 08:26:56 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="589555f993649fb6629b63ea06653159867d840aaa0451859375aad7eb3cc0e3bb75d7a339c9cb5470f0aceecc3fd5a2d033fe0e675c2c215ea47cc6ceaf3218"]) 08:26:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f00000000c0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000140)='I', 0x1, 0x204007ffd, 0x0, 0x0) recvfrom$inet(r1, &(0x7f0000000280)=""/85, 0x55, 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f00000001c0)="83", 0x1, 0x4001, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007fc0)=[{{0x0, 0x270, &(0x7f0000000740)=[{&(0x7f0000000000)='z', 0x1}], 0x1a6, 0x0, 0xfffffffffffffe82}}], 0x0, 0x20000000) 08:26:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x2c, r0, &(0x7f0000000300)="fce749c2444fb9fce163044ca3", 0xd, 0xa1, 0x0, 0x2, 0xffffffffffffff9c}]) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x80000000000004}]}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r4 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x20, 0x1) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40d000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x8c, r3, 0x300, 0xfffffffffffffff8, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xcab}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffff0001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x1}, 0x4004000) 08:26:57 executing program 0: r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca505") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) syz_open_dev$adsp(&(0x7f0000000440)='/dev/adsp#\x00', 0xd63, 0x4040) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f00000000c0), r3, 0x0, 0x1, 0x4}}, 0x20) r4 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, 0x0) socket$inet6(0xa, 0x9, 0xfffffffffffffffc) syz_open_dev$loop(0x0, 0x2, 0x6) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) keyctl$assume_authority(0x10, 0x0) add_key(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)="c5e2800f55f262097fb4614b7eaf30ec337412d626ee7daf9138ab1a1d7970b5e1804db3a38c6e29", 0x28, 0xfffffffffffffff8) ioctl$FS_IOC_GETVERSION(r5, 0x80087601, &(0x7f00000003c0)) keyctl$search(0xa, 0x0, &(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0) 08:26:57 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = socket(0x2, 0x0, 0x10001) sendmsg$tipc(r0, &(0x7f0000001780)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e21, 0x2}}, 0x10, &(0x7f0000001600)=[{&(0x7f00000000c0)="c552f67ee0e968576a326b70770cdd4c9e54f20994b731c2b01f1fe8b2f97ad671c1e8ce44174fef417480ec5116d82098e60ee711e93774809cc47be22b8c87c5eac5fdfaba65e742e849e33f9ccc27ff3197c10271a44426e08082ea6ce9efd5f4964514214d2904f774c4f351abcfa6db718032719c364de7211e603c3e73700b1c3a64b62a8ca1001be0a01683753c72e5c4f437a6020b59f707c1cd5842033adb24d0ed7ed53f1a206f1d4caf1d6ee76753b711fbd08f7441a06bf6877e996749923b9ade1c9b63fc69672fd4881df6ebad7278e17d0109615409c4e38670c51607659a41e8590af82fd151e7a44139bd8977bc1b14dba25702694a33142c06d39013cdf310404d2f02a138a5ba425c8c14b4e3e74a4d85f7da578bab43e3d46063aebbc6465c2a0d58d76a1ebade0566a1f0ff84b049f37a93f2d2f1ad563e38ebde96c6bf1cd5e9c2319192619d60665232eb8b37d52610d31974bf7d7089404f7fd24bf95ebb192622825d5caed648a84a87c96062fbddcbcf9245c217b3859b7922baa0e9d0e590c76d63266f36da1d8f56e3b146b2d7811b2470ccc5b531a3828c007ff501dc35fb7bf45992e8819c7c32467b0b8ef0c1e8fb5d016357fba54780567896e5050dc1bad84c1d159d4572048ec5e91ce07df388aa44f5dcbc3210eeb118312b40e7004b29a727a11c0e1a8ec08190bfaab885a7cd5f10e5d2f7e5bb909a44a3fa7adeefcbfb25b2c48d98379b99baf56ef2dbe3f02989fc28da0e79fcd9ba3dbc769d9ff97d4dbb15000e3178f20a4dfed57f27f373aef5cd57c56f6489a730cffcacb86afb72a35df44c8c44457b5d5f93c7339958b393de463c9b42f569419687e0f6c15ed16392d406b195fc197ea4cb209c59ce1d97a48cc099770bd5e3e82ee1a8b3dea9259a9684b0963b3cae4cc7bb53f428103533d4d7f43e26999096161de74c70fd5d77341427d127607584c7a2e56bca4d282d96bdca5c4b727f53e31294ca04ddd5d82d17e3b6a460b7036549002e48573a4f02fb9d912fc605fd809377fde7b6daa0b06ab6f1bd71293302b4598e2ce102c5edfc9963ff9cb12ec80434c43c4777398a08e08c1f0f85446570656d64626e45ff27775337fdb75fd622b06b0e1f74a99a53f0f7fde31c91c63b8026694263c37a9b4f1ad1fc037ccf2667cb34ac6b7f4513e084402cfe323947e0cc9702453470c23f9c8493aa6001cc6ceedcb440a8932923e6907a611cee138b3aa43232c64090cdf7f12726d67b363e5737d48438958c4449c0fe4f76da01d355091de110792c4b70b31026707d594db49288768766c0622b144ca964af8bdd64bdf93dacf7075f2030e2799ca649004119a096d1771d872bbf47504a22765857e1b76270514fd283a0754647cbd3ad269d7e3157df59df4ed7e29e8618a50443c39de87d233d6b36e6bf4d5f2e7da9b22014629e421f43146f8e8c7217c362362894421d800a5f5923051493051f49b18b7900b3b804b53c3d54dd34525ecdf560eadca7b989050828292403921164274d0a5f71dd095bd1ab91a7bb0176f4c6dc1a7e626401a47ac8e42778112812dbf14ac6d3cda85dd9577a019d3ce4bd9577d8dc1ab60c26fda1cd37d7b98e0c08875f4833d47208bf023f25fc55a329b1052ca2dbfd04f1cef0f0ce4c23926ccec7ad7ad65d057191eb1170ba37b1f3a5682567bdc30102589555e33144a64c3c36208b12b3a89c5b3aae8645bc43a2ce5fb045229110959200a22f7f2ccb2a36000652f9f502e60dc04ec10d031ec8d536d3b2062fd39706e86778b5a400f2744020141d924a0f92965c43150214e873ff4941f95c0c7c8e87efe17084ab8d6613fd6c6f3463c103bada097adc054e9209c5c902af5595e50342515ec7ca5cb4ab3b8b8c126f7ac37a515c26b8eb9f910950d04c6e766d5b6d5cc06fc0363b300e5353086b458ec48a4e288ce97696773e608fc6fa44fc95d60ed9d8bfec4fcbb5ec82776ea60423e1bd5ffd133ab4754bea23c3ce248cdabc05bbf422bc6e5d5d71abe7eede8831fbef230893035f03d00de2eb989ca2f52495717187a49fcf5aa8cdfae7e7e893d2f672d144cfe1f16e69e6cca2809f8e836085027bfb9ad9a3e3e9daafd65a559150190a81ff203453e117cb264073991ee6be3f6651d35a5ead5b18c692ffab5292cc28408265af6d7dcd0b24f16b3f7410f8ea5e02560114951ab917e3383bd6d73904e7dc026f1d766dbebf07e761790022d44d892cec113b1ca85b8fa36dc7a1c96a04cb0d205194b9afca7da66082c8b18ba4619dbfa56bef136cb18bdce9faced732226d63c55171d313cb9eb1c99ee12eac322821f13e1448cab08139e9b3422c378ce1afb691933b0074af2d4d05c1f20f78620280ab5c00cd2af5386b63c1bd6b17834b77dcd310e99258511522673431a6df514e97e1af93f676fa6f2633ad55443a17a837c384070de5896109ce2c6051d76851b79cbb3eaa40a2cda85ddba5a5aca00645bee7dfa0a54b455f9c3c9dedcee8e1ceb874d197d25eaa8ea1f6f059f73c7fc56a1f1ac9ea950136c310ce8dbe9ccff99080b3c14da5eefb56b52e01d1b5b259b8abcaac7638de055766cf111303766f6f63c1a514a8b03a0d26f3155f63bfc3414c7cf3958cd540566d6bf6404d4165b14bf9d90f3cbcc6ddb39f8cd59d08e7654b1fe94012cbcb6a5383bf89806031c0a637d5cf588cd219be33fbc432e6bb41c39d6096847c3a120af694408deb421ea5ab7a372a7ea92c7addae096b5351f7cb763a8562942bd281f4a648929fcbe53f557857e2a03daf50abc71e1db1de5edcf38f8c4c0849fef29aa410ef032bae322b0b31c747c007e16615c72353747a6bdfcb84fca7899d809714030a11b22dadc568d2a03a6967303ffcf19ff6c3b95111738cf6f41cff289a902951e54dbf5107035cbc8c740808dfb07e2c05b6c53201534fd00673fdd2b0c8db74999b33678125020788f710d865f04666e58d3b95a4343e328e6f797477c76fbd101adc07de7c9fe81ea16897efd0a5adcb0e70d63d6419844db5b13cb5f68ee93322a17c2f572416ea05d05230862fa7f7cef07fad1e374858afa7674860e7d56e03639d5241cd5e2645a516d603b49222a5f1e82351dbbaf22f35d0db7b6eafd74264647c01176f5c630204a4610a0de3109ef90af42a2081816b5c82d4e90f5cc626298c74c975004b75367f7c54c6809766afa6da387ecc09b21659c91747ceb0744796d503f060684608971b5f7be6e5c217401db9e7c3a19d98d71f4e3f36d7734c48876dfc1c27c9546cd5a7d289a8d1c75fec8cbdc65aa06859b718cfe4a17203dd41f51d79634ea3775c68e1b957821308267048662534adc533d827359d020c2c7693e9c12f656ace6e03ef827a3af7d0c811a11ee1b13724ad6c75a65b8f23978b09077fa36adf3d86ab4042ebce6b29a690031c426ba0644389a5176632b224c2c6e78266d59a7ca7c3a699af4fe091e7cda29e7db3100c1651f5f7d3f1eac2338e9881cfe3d55cb01976963c8e844dbd14e33ac7b686c42de26b3fa4b6d5ced94cb6f39b409f574706cfca9d89c48923f946b012556ccac00a3f089e3c122ade04b728f98390c462346b99c67beb821b38981b32ea3bafdfaefe46cc24188f97005a2572f24960f53c001e94b366dcd4d476461b1a64f87cc4abfd37dbfcd390b4d47ece3c077d20db6c435e0d52cf623e9ca616e3e6b77a667994e705477bdac7abb1ce5574aab7d2ceebeeef1380b96c8805c05700faf7c0e83d42cc41fa2d859d1526ea91e7a2da712c6b8e9076e65c0f7a7c751aa818fa44dc76534f902bad19fa2c1ad190aaaa6e3252fcd6e763f55556fcda4d61ec65d3c175b72e5d30cfeb430714a3e0b2c41d0367aa2e4fdcb7db4e320c98cbeb9a4c9937b9bedc72d4ffe80b19e70cf3d4d9392f2464f40621a5669a0289003e1d75d32e3bdc0557811f8c55282c6f7e522ce5f98760640598f7e75dc95f0c33110badfd2af7ed998b94fb1e378e9cb9ec910fe5c52f0cb9b882dc91cf751d490498c644be40dba549d4c1bc5299e04d43454264e781d70c0e80dd30e496d09568a91cb8a6a328d2529e05ed1f7a0116f64d5e57fe456535c28a4d4f672d93f8f709a55e3b379beeb689b0cf14c4d5a2ca4a910f0a2b2e87ea4cf8b68f43480072be139f6f6bd16b04d573c81fec7710fab49c5f895c760173143e2edae00469d1df0c355f294c7a4db685bc67a8bb64dce84efb6c88f76ed2eecdf53f38504d286a79928b41ba58e3367eb811491e772cdc3767a3e3646c75f04154ab7d2a9598ec3f6be24927bbeda40b3b347f31c3e5b625230fccc4d3f9209c3f653542c1744900d6e44a93f39e1ac7ca33261025a9a8483c8178b5027cc65cb2a4fcbc7e242b36c6bb93085870ab1d1c3126bc2419cf3650084763d5ebf9e717281c5aea8d4be47e76115fdcc3377960c1a9f90401016f97a328bf606b6ed1ef28cf5ab0153c19836f8ddd668fe7fd3f98c822cff8159e59c5170b6f65fca5cb330d419a4dc7826c0cddbce25b681a34bd0d64236db61d20f23ecd1008aaec56afd767de8a8f9ca1a604363dac25e394a28497d737bdcdfb49e0e2b9035276ddbc62a07c4d192a1a3c67b57c0ce814b78627db2bbf55d60723022816685db3f3d3b96219bb08528bb7340f1285701d5b253c27d403cb3f3c42c9ac1c1144a1e588956c9696a72bdc516cfd94be3d28b1e246e706df78b1aa0433264aceec4cd363fe11aa7143e002fa5deb890165d17599b0ef91575e5b5a2aaf992afed64520a63165d999edfe722d0e9ee5f5774f1043989bac1672456bdfdb16f8d3ab9443bfcddc0b10afff9a8f91c24af5678c087ec48946412421deb27b4795e86b79ccb5b5122668bf595c99a1bc554427b8f764135b84df8f2c69eee3e9cb623899feca8da2cdcd896ec3c31a111fae0e970bd1b1ee5d2be9e69ae70c39f8c8f9744ac1357d8ee1dd1c0832e4cf9943b3218ba292056ac6df2934466aee9fc9059ea3fbcf284dead2f44572f56e2cebdb26d3e04bca5dce5867dbe72e358226c39ef73b2aa5f9b30f019e658e43f9d29601098e44fa497ee4a3986548dbcf828c3268e933931071580a3debbf8c09814da55e1c82753d86a9ab84e65fca607a43ba7cf3c446887d97ca3da3516b87cf09127a9fd7f44b8fbe100d3ef1e1980592b6b44586590ff617482ab672ceb5129a76c769d0f286b359eb801345933f10511931053a43ae7277eadc72bbd4b7410688aaf371d92bf69f0f62a4fc76a74f2c3ee114bffee8cfc30ea37a4ec0ad02dc985aa8c392a4cf3d2112ec837a7c8d7ffec0db2b610399456c5528c472c9e0c6390c13e30576a47f36e2203e543496e87e5599e32c5232484b3511024d4908e3395cb05ff3950308f3e684400577d6d732d6aa482955ec6afa0edf1e6ce1a80958417cd302dcb7810a4a7e4747474c4974bd6b2fc14862a9ffe0ff1ac5e7b79743b98fc45e526547602e4014d5f567354178187f9b3146d93463b8f5714fd1979fe0b81b984954bcd30c06506d7dcc71ef9b0f0c6d8bf2bb9b62793b85a0d52e4399fa2d8d3887a7c14d5dddbd9da15f6dd9c67b7a63c9945ce6defece95a5e1c6b3e1f5cc9a0ccdd2158c0ce5d28d86262edc594b7319f4113c7042e16c1f9e3c8279af6b155a152fed7e914793589720582884cea353ced8b0a4aecd6fe41a887c856472a228bb24", 0x1000}, {&(0x7f00000010c0)="5a5b355993eec2250a6e35fedcd083dc94985b4fdfe368f4670ce25eb23918fbcdb081a1e204ea532dc01f72ccb700965fb3856ee3038798a5553ed205e21a191635db1c541977f962e3bad48a3d2e4de18afa6ed41650709988278bde454beeba8eec563a3f88b7114925598dd323", 0x6f}, {&(0x7f0000001140)="d18e0821c3e2dc6a89adb41c91ed789813708fdb0b5d144c59555b389b4a4a4014cd7a7ddf0a55ec6f955400ab540b082c08962ccc8e3efe9192e5ad0ceae63eea46bd8a5b3cb9010d75184246a85f48d85f5eba77277e4931d70b7566f894b5dca000c606d0a4db312a01502e52dbe7fed6538209d2bf612ca33fe6604c46592ece5f8a291a0b82fd3e4eebf637eddec0fe4b8db7c812e51a129897daa5269b62bd0486609c51000e456080cdfa84e4c49a30f4a267dc37cff1012c88d8a8cf8d", 0xc1}, {&(0x7f0000001240)="c87df7fcfe4084b83a7b13ed33832fbe2fe89c3f9bab282da78de2f6fb152968fd7d700663f0b6aa7c8282777379c36df97dc3ccd172c1f0479837c37226b2eb9f7b4c155119401213282517990364b369ed38c8d584bb943afdcf20a26bb10cae0d3accce64a0da80e3919789888be6ada152b7956f75541b703cc29f70c125f12be0a346f1c025c2e1", 0x8a}, {&(0x7f0000001300)="2bbfd609f76dffda41d8d037b7f831e0774017d51071d20605e411c6d4756026cb3b10d2735c9797cc8c7b8bb4f2b015416f4db0960b4709eef09dc31de9e7b99ba82506a37ed51759252deac4cc92c087b12d8283621fb3ed2724a4c078b42289ece0e0ab0f6af51f82d1c3af66a382011da9", 0x73}, {&(0x7f0000001380)="374cffdf80bdcf6c0166ad73240f97204bcad6f1286608eaf707bb00b423a18bc4fabfcbf99c01e917508e04eb8d07eba5053fc13a87111bddc6535c2c626089a62a83acd9eb1548b964542b9d3fcc3c6b871dd041a873dbab867c07ec4c0f42769bda66d6ad5132ab3df685290611f0f4a059a2cf28616e8c055d9e", 0x7c}, {&(0x7f0000001400)="29794373b4c142d6ff2919daaf49dd037406fdd3c5e4d402a3b1dd7c4d83b9e561f7ad8f5e69beaf4f0ba16f524b74ea5dcb28613d7f5c1115892da1491b1b2760cb2cebcd37", 0x46}, {&(0x7f0000001480)="1fb9ac6e3cdbee959cdaee9bfd88aa5bd42e77260361bfa58b4a2f9b6bd54a0da5f21e41295501cd94f7be638e1c387554542350f2b184874094f76fb1239e966579d584267c636fa9db8be53fcc03299ad0c5379c3f1a1a1d8a19c2e76054e6abf55349b87c3587a5d69256a59fc39d4cd555156488de08f9eb66bf8e350bf5e078f747ff933f9859972caf34b293e4d5d461dff41a37c83aac0cd60bbdbb610f2fb63b36d4e84edd22c3070d6490482ec1665e82a6761853e55603", 0xbc}, {&(0x7f0000001540)="d8e105c8cb98581a13fbec0463fc5979997150cbc54fc52a18c61f3ee5d80cfa1a3cb5422fb770f1ae367b692398678dd0f177527b0158afb62c2fc93bbe63eea89e11b887f6bc6ddff63ba23fe8a80c595c907ad15f67bc92db8e9b145ddf68f9cfffed4d2ffbcfbe7fcd2200d323cd7bed1d3235173ac6d3d39adbd0296392989c20903422660d1b1e0d2172fb65164eaca7e92335bd88aa7897cc29a85cb6ebe23678eb3d40beef31", 0xaa}], 0x9, &(0x7f00000016c0)="ac2de7a632a680cc3bdf553a93feb7fa651877c0d6c235f5109749fe196e37833d9baf77e295a0eb0d1076e45876ac6d041e944b824785ee8b3a8293109d353d14a7b268cb306a5ed85fac499dedbda40f4ea898bcc552ec8a911c1d92a6918b2f6d889f3562f52df9e2c03e7e98de4f11a133fec67c68051b0196a0e4f07f8e4ce8a5a1b9bc2e7bc6b3674910e23fd1e99a390de8fc7b821249a35785d198631fd17aadfcb094de3de6e723", 0xac, 0x4000800}, 0x15) 08:26:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x5b) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f0000000080)=0x6, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) signalfd4(r2, &(0x7f0000000180)={0x5}, 0x8, 0x80000) listen(r2, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000140)) ioctl$KVM_ASSIGN_PCI_DEVICE(r3, 0x8040ae69, &(0x7f0000000200)={0x40, 0xdaf, 0x9, 0x4}) sendto$inet6(r0, 0x0, 0x0, 0x20004007, &(0x7f0000000040)={0xa, 0x20004e22, 0x8, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, 0x0, 0x39c) sendto$inet6(r1, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) ioctl$VT_GETSTATE(r3, 0x5603, &(0x7f0000000100)={0xfb67, 0x2, 0xd1}) 08:26:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000014c0)="11dca5055e0bcfec7be070") syz_open_dev$rtc(&(0x7f0000000100)='/dev/rtc#\x00', 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) tkill(r1, 0x38) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 08:26:57 executing program 1: 08:26:57 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="ae2a5ee47c9882592f406095a56e755268867367bdd02a5a342cfbaceee8b24d7cd775afbc5e893ee0812fd9ece78e3d97151ef2f831c82fe065bb658a9939a94b468bf3d609ba52745bcdff794c001be83bf11f567b6a80f22d3b5af56bf5a804faa7102c75d2"]) 08:26:57 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) symlinkat(&(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00') r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x1889, 0x181000) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000002c0)={0x9, 0x5, 0x82ab, 0x9, 0x0, 0x6}) 08:26:57 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 08:26:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000040)={0x9, 0x2b9, 0x203, 0xe8, 0x5, 0xb2, 0x7, 0x3f, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e22, @rand_addr=0x8}}, 0x1, 0x1}, &(0x7f00000001c0)=0x90) 08:26:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x20000, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000100)=0x7f, 0x4) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') setsockopt$packet_buf(r1, 0x107, 0x1, &(0x7f0000000180)="9accb0052951a9b32fd282ac55b970137e05895a9a125b2084222111fa509061f3c536adeffbae3ca59ea678cbf4694cede9b3303efc1324683634f56abc6d207bea5e134b0f072c16ad408b644c31ef51d0835e08a1f4fccb855bf408f72665d4cd852ab0996ad244c70897eaa46acece01fa425192c511d0287f830169dde2eea455743a875ad2ccb4ce75", 0x8c) 08:26:57 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={0x0, 0x1000}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000300)=r1, 0x4) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:26:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000000)=0x2, &(0x7f0000000080)=0x4) fchdir(r1) r2 = open(&(0x7f0000000180)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0x801) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f00000000c0)) 08:26:57 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) mount$9p_tcp(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) 08:26:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x17f) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000240)={r5, 0xf0, "e879ac71f752594db013082544d62c362d210f3f786fcbb2ebb8fd2b9dc121e04a22ac59bf304cbb4d1d4604fae7a12c3b745e970405804ef7e033b33480404d3990ee76c6aed7568bdc2f25278fbeb805e56cfac277433d816fec446bab4658285ab61b44f790ba591f680106b72e6c04589340737b26f4e425723a4def993d79e659fa3abd7f1cf5aada0a5211d6db8b58ae2e9fef3729fa070f0b0e2f2c13c0b10a1a1679165864e7e4656dc116b685ffa4d7da5f7428a19a63b3a245ba92f796b260f05667db3ba70fc98b90bc4edbdbeffce9c4e753966a01b655fe47d29e0b19d480c08afd15ecdb5ed91795f1"}, &(0x7f0000000340)=0xf8) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x4cc]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 08:26:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r2 = shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffb000/0x4000)=nil) shmat(r2, &(0x7f0000ffc000/0x1000)=nil, 0x4000) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 292.008380] kauditd_printk_skb: 6 callbacks suppressed [ 292.008390] audit: type=1804 audit(1560587217.944:101): pid=15608 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.0" name="/root/syzkaller-testdir484327463/syzkaller.tjXfI8/276/file0" dev="sda1" ino=16641 res=1 08:27:00 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8100000008b0d, &(0x7f0000000080)={'veth0\x00', @ifru_hwaddr}) 08:27:00 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000280)=0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:00 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40, 0x0) sendto$rose(r0, &(0x7f00000000c0)="5e2e77c9bcfef30aca85bfc63308b31448", 0x11, 0x80, &(0x7f0000000100)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x4, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @null]}, 0x40) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:00 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, 0x0}], 0x1, 0x51, 0x0, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000280)="c32f8b297cb88935807d1e646b377a94fd94ebe2d6692378e04e5e78c2406131a4fc3cca349d76d89d0f9cb3816032bb60326eec02fbcaeb8ba0b48ce14e45c2bdd46dd139301fbb459f0086e8e961f4732cdf87a1759fad20bdf28ec52abb672fac132a8720b955144c0703ce94d4f8d91b1b88c3d0c3cb9c88a6ce93e73f45175392ad4b4ba64aa3fbadc4dc20b92e7cf5b51e02cbc62966c9107e12a0598f5d547509386e14cf8df833e296a0c1f898c37dbb93dee6ea418a60ed377fe022", 0xc0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000340)={r4, 0xec, "ce51d41c27640f53d14982c773c48673ca898858ea3772a56efcdcc522d3123a1439bbea6b6ec47688fcbb6b7492040a26d234abab8991dab9f501c2160f21e58fcb2f8722742337a2c36c4f0a3e51761ae352fb5b0d78f2573f07327dde15faa6d747a401ab5d3b2724b57dedc1db167f053503868dc4b2010f6ecbe6a2f46237f429f0dbecc68ff986e2a543520eee98c8d43f68d26a4a8b78c7e8975dd92a9a2e8b591db424f0e215c1bd425b59c2d88bc43fabd8874aa207c564e7e3ecf44cc4fbc69811316637d0c521d1d434ec64a0646666c9502ba3bf252b92ebecab1f39135987e271f45909916d"}, &(0x7f0000000140)=0xf4) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x200, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000080)=0x4, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 08:27:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x100000008004004, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) 08:27:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x10801, 0x0) write$uinput_user_dev(r2, &(0x7f0000000180)={'syz0\x00', {0x9, 0x8, 0x10001, 0x4}, 0x44, [0xfff, 0x0, 0x4, 0x0, 0x4, 0x4, 0xf9f5, 0x9, 0xb95, 0x100000001, 0xe4e, 0x7, 0x6, 0xeb, 0x7, 0x7, 0x800, 0x6, 0x7f, 0x100, 0x9, 0xfffffffffffffff8, 0x5e, 0x0, 0x462, 0x1, 0x8, 0x0, 0xfb69, 0x4e, 0x100, 0xd, 0x455c, 0x80000001, 0x0, 0x100, 0x6, 0x6, 0x1, 0x6, 0x6, 0x9, 0x5, 0x6, 0x5f, 0x4, 0x4, 0x7, 0xfff, 0x1ff, 0x7, 0x8000, 0x4b4accad, 0xffffffffffffffff, 0x395, 0x1, 0x8, 0x7, 0x2, 0x80000001, 0xbbf8625, 0x8, 0x7fffffff, 0x42e], [0x1, 0x2, 0x3ff, 0xeae5, 0x6, 0x1, 0x4, 0x4, 0xe0, 0x52, 0x5, 0x1, 0x5, 0xe3c3, 0xca3, 0x2265b9c1, 0xcb, 0x3, 0xec, 0x4, 0x8, 0x1, 0x400, 0x2, 0x9, 0x3, 0x0, 0x2, 0x6, 0x9, 0x7, 0xdd, 0x8, 0x311, 0x100, 0x1, 0x1c1d80e5, 0x100, 0xfffffffffffffffe, 0x2, 0x4dad, 0x9, 0x401, 0x70, 0x1000, 0x8001, 0x7, 0x2, 0xffff, 0x2, 0x4, 0x81, 0x5, 0x7, 0xff, 0x101, 0xbdd, 0x7, 0x1, 0x8, 0x4, 0x0, 0x8, 0x4], [0x1, 0x1, 0x8e70, 0x7fff, 0x6, 0x3cc3, 0xb584, 0x2, 0xffffffff, 0x10001, 0x7, 0x5, 0x100, 0x6, 0x4, 0x0, 0x8000, 0xfffffffffffffff7, 0x0, 0x0, 0x200, 0x80, 0x3f, 0x1, 0xffff, 0x17, 0x4, 0x1000, 0x7fc1, 0x9, 0xffffffffffffffe0, 0x6, 0x6, 0xfff, 0x7, 0x0, 0x7f, 0x6, 0x401, 0x4, 0x81, 0x4, 0xffffffffffffffff, 0xfffffffffffffff7, 0x7ff, 0x8001, 0x0, 0x4, 0x1ff, 0x100, 0x401, 0xfffffffffffeffff, 0x6, 0xfffffffffffffffd, 0x40, 0xd7f, 0x80, 0x9, 0x9, 0x1, 0xc3, 0x90, 0x4, 0x10001], [0x6, 0x5, 0x2, 0x9, 0x6, 0x800, 0xffffffff, 0xe3, 0x7, 0x1f, 0xc000000000000000, 0x40000, 0x80, 0x1, 0x3f, 0xe99e, 0x4, 0x0, 0x81, 0x81, 0x3f, 0x6257, 0x9, 0x3, 0x4, 0x200, 0x8, 0x20, 0x6, 0x1f, 0x5, 0x3, 0x4, 0xae, 0x3, 0xa4, 0x5, 0x8, 0x9, 0x359, 0x2, 0x3f, 0x8c3, 0x3, 0x80, 0x8, 0x7, 0x80000001, 0x6, 0x27135e63, 0xfff, 0xffff, 0x2, 0xfffffffffffffff8, 0x1, 0x8001, 0x4, 0x0, 0x5, 0x1, 0x4, 0x5, 0xfffffffffffffff8, 0x65f2]}, 0x45c) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) 08:27:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="f920becea968fd9397584004515c6a44e8e2beb73eafad1143aacee244e5c36de10cdb521624d09ff0837c226ff13675f6ff412fdb91482a003b30a5078af0e0858118aa0b74b8da2a51adba61c79096ba7870f5294c4e073eb30143d3c3e96359940d4aaba43d4b77ddf0af150cd02e786378de56f3aa4d1ac6b757c333acf83b08f3b9e82c4daddd25f428a3cfb7adfe39392f752db88c8973c10f725f"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000500)=0xc) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) accept4$inet(r1, &(0x7f0000000480)={0x2, 0x0, @empty}, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r3) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1000008913, &(0x7f0000000240)="0adc1f123c252cd24fff0e6ee410124f8bc30e239b464b2ef950a982ff5ac13f21653f828914fcd2df71603ceda317cf0e289e8520fd4c7b4e991e1c2a2eb242d72a87c736c49f4419843dab5726e3384b3096396c3e5a75218ca9c059") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f0000000400)=""/44, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 294.429343] audit: type=1800 audit(1560587220.354:102): pid=15620 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=17060 res=0 08:27:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0x0}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) write$P9_RGETATTR(r1, &(0x7f0000000680)={0xa0, 0x19, 0x1, {0x840, {0x2, 0x2, 0x8}, 0x30, r6, r7, 0xc93, 0x5, 0x0, 0x9, 0x1, 0x0, 0x4, 0x2, 0x4, 0x40, 0x100000001, 0x1, 0x3, 0x1, 0x100000000}}, 0xa0) write$P9_RXATTRWALK(r2, &(0x7f0000000080)={0xf}, 0x2000008f) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x24) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, 0x0) io_cancel(0x0, 0x0, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, 0x0) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @remote}}, 0xfffffffffffffffe, 0x5, 0x4b, 0x3ff, 0xb213}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f00000002c0)={r8, 0x1f}, 0x8) openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x101000, 0x0) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 08:27:00 executing program 1: add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 294.491510] ntfs: (device loop2): parse_options(): Unrecognized mount option . 08:27:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0xe4db, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000200)={0x188, 0x29, 0x10, 0x70bd27, 0x25dfdbfd, {0x14}, [@generic="b9afa9e831b98663db4444589834f6753b06c64d4ad1636e4cac6c465f3a4c3eb33a8ec0b4dd8c3b9bfcc46fda148ddba9521f8ffc5680d5d185c6fe3f0eedb17353437c1e47bdf01736e291f5ec3b68ee0d808e59ce9e8b0ace7024d91167f40586004350ae3a416089bdbad9ca8127d909671ea844cfe6f0e3551a2d22e7cbf22eb1fb7e17ff726a5f7ae4c1bb40e0d6b59f29771335bece49537f959193761ac522510c3635c07594e069370fa982a28bc13e0388c94bfa5142a17b68b1e508ded8984f7746f78a3c2881568f8ed604683eb2b76c380177bc208a50faee5da78119377b9225a56d403771df4a", @typed={0x14, 0x88, @ipv6=@loopback}, @generic="3d544935c6400fc5b4ad0b7496ff14275978c9d1d7cb7777646e5ccf39317b37e9bae3538f8e87a58f9c43f608e34ed8c81ab58c34715b5a21a8a3df182641ae26bb8f4343060fab6c60dc6c564c7b2a2835e35ed86a21c7571c03ff07693808d1f02dacec79691cf78d56822f3d5dedd7ca"]}, 0x188}, 0x1, 0x0, 0x0, 0x800}, 0x4000040) dup2(r0, r1) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getenv(0x4201, r3, 0x7, &(0x7f0000000100)) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:27:00 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000008c0)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x3, 0x22000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000002c0)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) 08:27:00 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = open(&(0x7f0000000040)='./file0\x00', 0x40800, 0x48) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x2c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x1, @loopback, 0x8001}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x10}}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x3f, 0x200, 0x9, 0xffffffffffff8000, r1}, &(0x7f00000001c0)=0x10) 08:27:00 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f00000038c0)=0xe3) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000040)=0xff, 0x4) [ 294.675244] audit: type=1800 audit(1560587220.614:103): pid=15632 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.0" name="file0" dev="sda1" ino=17060 res=0 08:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388a9782d215e5884f52b2d77743051d52101ea9e6b5f4732a3001bd23896", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x202000, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0x2, 0x5, @thr={&(0x7f0000000340)="63afc6d373e38055c8275d263698ae68e98b109f97e722f351bb14070a140620a6e6b4de715a9a213cd511bd79906364c6f4e90f99509c3ece06de0c99a75b62f541b95ee247a6011c0d4af56d09031f136073a831ec9708f4a84be6038f4d9f2f0f74020efa893775ffb2bdbd92177696e025c319bc612f5578facec7e3babe09ecc2237dcb93c718778c224c713cf354d574f0ea3d387507bb102393b471a31763f181187585acfc96b5", &(0x7f0000000180)="651b91e0c8e83e7f75b522a2c5ec44a1c8b7488eb784be3a8135509607f651d0a2"}}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) [ 294.749632] ntfs: (device loop2): parse_options(): Unrecognized mount option LSfWJ s|XȺjAĖew|g"g C\ybވzD %`NHP . 08:27:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) creat(&(0x7f0000000000)='./file0\x00', 0x90) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:27:00 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 08:27:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388a9782d215e5884f52b2d77743051d52101ea9e6b5f4732a3001bd23896", 0x79, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x202000, 0x0) mq_notify(r3, &(0x7f0000000240)={0x0, 0x2, 0x5, @thr={&(0x7f0000000340)="63afc6d373e38055c8275d263698ae68e98b109f97e722f351bb14070a140620a6e6b4de715a9a213cd511bd79906364c6f4e90f99509c3ece06de0c99a75b62f541b95ee247a6011c0d4af56d09031f136073a831ec9708f4a84be6038f4d9f2f0f74020efa893775ffb2bdbd92177696e025c319bc612f5578facec7e3babe09ecc2237dcb93c718778c224c713cf354d574f0ea3d387507bb102393b471a31763f181187585acfc96b5", &(0x7f0000000180)="651b91e0c8e83e7f75b522a2c5ec44a1c8b7488eb784be3a8135509607f651d0a2"}}) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 08:27:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)="b83c101100c03528f267ac59da9bca7e4cd207dc137480dc69609ad06a1e469c4cd611daf0d21c17df43f06acbd0f67c70b65973d125117719e103f13f0231c7adcaf93e2204678abf22528cd1c2c690a7eadc0a97af0907bb897158c02e50dfd12d9f658f27ba4630e208e62d09338f7fb9eb1d299e8488b11c", 0x7a}, {&(0x7f00000001c0)="6b3f1ea1e226aa7da2b6a0f4d6c337de93e2a8ab7fa4a6fe93cd6737c85b1a3d792575df0629f33665af55a2b3cf0a12c5f66f87b528727796013f78d8884a38495b8abe3557f5432056b8d1ca4e8a938101c4743ac10cc07b5b6652df96e6e5a77d4402eb1b6febdfc8f5f9960ac494943cb2c8", 0x74}, {&(0x7f0000000000)="900c09ff98cf9e2f6263df999f3124c3a55aba0ba5e9380f7a2c2859613fafa57fc8b2bbf8773076f7c01a21901d9e27ed", 0x31}, {&(0x7f0000000240)="9f8e828b119d690352d45a5d98f0c06681e1bf2b66a5224ab94eeebcdc04e2f4946a323b65c02747064bc960ffadd83d3c403941d4712b3119d752ee260020ea7170ecd6cd94a0c2de02760c1aaff9dc07314109752dcdc8817fd05b6093c6baeeaf1ee85b871b6eff7b42f20bc4bc70c4e08626e2cfc62ce4207c5d9ac55d2162d614d216a670da24c96aa36b95918cdd93c3c3fb934dc3e715dcfb245c68e02a60fdd514df431d39fcafc915b8", 0xae}, {&(0x7f0000000300)="0bb69bd7d0fa488b134d6c68d283cc3b52676d5ad090c34ad474e7a3cb89ad1f33622ea0eae413e6f2a8971c3fd24eed1a4592dd907d69035fa1deb05ef987906199501bc63b09d060ce2db0f37254cc0fbb96f8402cd80ded9054e7077648042606ead6dcaeeaf1af99f6791caa26e9c2b2cf1602b5831974af17f52aad90b0a66cbe785a3be084175cc92134d6cba5e99914dd9eef780321b46563a7dd8a4a0b4057f41430ed98f0dc66df36c7d91ff79c0dd96ca93d7fdaf2a181710b", 0xbe}], 0x5) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000100)={'bcsf0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) write$P9_RLINK(r1, &(0x7f00000000c0)={0x7, 0x47, 0x1}, 0x7) [ 295.005921] selinux_nlmsg_perm: 502 callbacks suppressed [ 295.005932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49152 sclass=netlink_route_socket pig=15686 comm=syz-executor.4 08:27:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="f920becea968fd9397584004515c6a44e8e2beb73eafad1143aacee244e5c36de10cdb521624d09ff0837c226ff13675f6ff412fdb91482a003b30a5078af0e0858118aa0b74b8da2a51adba61c79096ba7870f5294c4e073eb30143d3c3e96359940d4aaba43d4b77ddf0af150cd02e786378de56f3aa4d1ac6b757c333acf83b08f3b9e82c4daddd25f428a3cfb7adfe39392f752db88c8973c10f725f"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000500)=0xc) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) accept4$inet(r1, &(0x7f0000000480)={0x2, 0x0, @empty}, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r3) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1000008913, &(0x7f0000000240)="0adc1f123c252cd24fff0e6ee410124f8bc30e239b464b2ef950a982ff5ac13f21653f828914fcd2df71603ceda317cf0e289e8520fd4c7b4e991e1c2a2eb242d72a87c736c49f4419843dab5726e3384b3096396c3e5a75218ca9c059") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f0000000400)=""/44, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:27:01 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x220000, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@dev={0xfe, 0x80, [], 0x11}, r1}, 0x14) 08:27:01 executing program 0: r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) accept4$unix(r2, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x800) r3 = dup3(r0, r1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@msize={'msize', 0x3d, 0x7fffffff}}]}}) 08:27:01 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$rose(r0, &(0x7f0000000280)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:01 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0xf, &(0x7f0000000040)='net/ip6_mr_vif\x00'}, 0x30) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='moun\x04\x00\x00\x00o\x00') sendfile(r0, r2, 0x0, 0xffff) [ 295.051156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=49152 sclass=netlink_route_socket pig=15686 comm=syz-executor.4 08:27:01 executing program 4: r0 = socket(0x10, 0x802, 0x80000) write(r0, &(0x7f0000000600)="fc0000001d00071fab092504090007000aab6009000000000000e293210001c0000000000000000000000000000000ea05001ec28656aaa79bb94b46fe000000bc000200000300f12fbe780196370d1151ffd633d450000000e5d18064b1ed548d59c40a366c57c6a55e00008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70cce190a60aa47e988399ddef2fe082038f4f8b29d97f391064e763b6f380f5bd92c83170e5bba4a463a1e00d66f91cfded815b2ccd243f295ed94e0ad91bd0734babc7c737d67013375533417e583df0210f883e4000000a6b567b4d5715587e6d8a1ad0a4f0108a8835d731d05b0", 0xfc) 08:27:01 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f00000000c0)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x352, 0xfffffffffffffffe) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) process_vm_readv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/157, 0x9d}, {&(0x7f00000001c0)=""/204, 0xcc}, {&(0x7f00000002c0)=""/101, 0x65}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000340)=""/210, 0xd2}, {&(0x7f0000000440)=""/169, 0xa9}, {&(0x7f0000000500)=""/104, 0x68}], 0x7, &(0x7f0000001880)=[{&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000640)=""/141, 0x8d}, {&(0x7f0000000700)=""/87, 0x57}, {&(0x7f0000000780)=""/254, 0xfe}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x5, 0x0) 08:27:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000100)=0x4) 08:27:01 executing program 4: r0 = semget(0x0, 0x0, 0x8) semctl$GETNCNT(r0, 0x0, 0xe, &(0x7f00000000c0)=""/222) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400202, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f00000001c0)=""/123) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000080)={0x101, 0x7}) shutdown(r1, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x10000008948, &(0x7f0000000040)={'b\xfb\xff\xff\xff\x00', @ifru_flags}) [ 295.230709] ntfs: (device loop2): parse_options(): Unrecognized mount option . 08:27:01 executing program 1: request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='rxrpc\x00', 0x0) 08:27:01 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r0, 0x80044324, &(0x7f00000000c0)=0x1) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:01 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000380)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000004c0)={'vcan0\x00', r1}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = accept4(0xffffffffffffff9c, &(0x7f0000002000)=@xdp, &(0x7f0000002080)=0x80, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000002200)={&(0x7f00000020c0), 0xc, &(0x7f00000021c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="f920becea968fd9397584004515c6a44e8e2beb73eafad1143aacee244e5c36de10cdb521624d09ff0837c226ff13675f6ff412fdb91482a003b30a5078af0e0858118aa0b74b8da2a51adba61c79096ba7870f5294c4e073eb30143d3c3e96359940d4aaba43d4b77ddf0af150cd02e786378de56f3aa4d1ac6b757c333acf83b08f3b9e82c4daddd25f428a3cfb7adfe39392f752db88c8973c10f725f"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x80000, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x1) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x100000001) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000000), 0x4) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) syz_open_pts(0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000440), &(0x7f0000000500)=0xc) syz_open_pts(0xffffffffffffffff, 0x400001) listen(0xffffffffffffffff, 0x0) accept4$inet(r1, &(0x7f0000000480)={0x2, 0x0, @empty}, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000000300)={'irlan0\x00', {0x2, 0x4e22, @broadcast}}) fdatasync(r3) ioctl$sock_inet6_SIOCADDRT(r5, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000, 0x77a0100]}, @rand_addr="58c4c4a733d993a894f49491cb15d13e", @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1000008913, &(0x7f0000000240)="0adc1f123c252cd24fff0e6ee410124f8bc30e239b464b2ef950a982ff5ac13f21653f828914fcd2df71603ceda317cf0e289e8520fd4c7b4e991e1c2a2eb242d72a87c736c49f4419843dab5726e3384b3096396c3e5a75218ca9c059") syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f0000000400)=""/44, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 08:27:01 executing program 4: inotify_init() r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, 0x0, 0x48800) r2 = socket$inet6(0xa, 0x4000000003, 0x8) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) bind$bt_hci(r1, &(0x7f0000000180)={0x1f, r3, 0x2}, 0xc) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0xffd8) [ 295.501528] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 295.527432] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 295.616629] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:27:01 executing program 0: r0 = socket(0x10, 0x8000000000000003, 0x7) recvmmsg(r0, &(0x7f0000007cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000000302ffce2b010000de1f000000ffd229"], 0x14}}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x40000000000024a, 0x0) 08:27:01 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f00000000c0)="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", 0x2f4, 0xfffffffffffffffe) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/checkreqprot\x00', 0x280, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000640)={0xfd, 0x0, [0x1, 0x401, 0x9, 0x3]}) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f00000007c0)={0x6, &(0x7f0000000740)=[{}, {}, {}, {}, {}, {}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000004c0)=0xc) ptrace(0x8, r1) r2 = socket$inet6(0xa, 0x0, 0xffff) pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x80000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000540)={0x2, 0x715e9d63, 0xffffffff, 'queue1\x00', 0x6}) accept4$inet6(r0, &(0x7f00000006c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000700)=0x1c, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@empty, @in=@remote}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) 08:27:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xb, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x40000, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getpeername$packet(r1, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f0000000440)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'bridge0\x00', 0x0}) accept$packet(r1, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000640)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000680)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000780)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f00000008c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001000)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}}}, &(0x7f0000000b00)=0xffffffa2) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000b40)={'team0\x00', 0x0}) syz_open_dev$sg(&(0x7f0000000900)='/dev/sg#\x00', 0x254000000, 0x84000) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000000fc0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x28}, 0xc, &(0x7f0000000f80)={&(0x7f0000000b80)={0x3c4, r3, 0x900, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x144, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xd4a}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x44, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r8}, {0x210, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xd4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x8cf, 0x4, 0x9b0, 0xfff}, {0xc01a, 0x8, 0x40, 0x2}, {0x2, 0x3, 0x6, 0xffffffffffff8001}, {0xfff, 0xfffffffffffffeff, 0x6, 0x1}, {0x3ff, 0xfffffffffffff801, 0xc706, 0x2}, {0x6, 0x926, 0x400, 0x2}, {0x6, 0x4, 0xd2, 0x8}]}}}]}}]}, 0x3c4}, 0x1, 0x0, 0x0, 0x40}, 0x4000004) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x8030) r13 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r13, 0x400454d1, &(0x7f0000000100)={0x1, 0x7, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, @broadcast, @remote, @random="d7082e6dbfa9", @broadcast, @local, @random="6f7c258bcebe"]}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000180)) 08:27:01 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = getgid() getgroups(0x8, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0, 0xee01, 0xee00, 0x0, 0xffffffffffffffff]) setregid(r1, r2) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000140)) 08:27:01 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000500)={{0xffffffffffffffff, 0x3, 0x4, 0x3, 0x8}, 0x7, 0x7fffffff, 0x7}) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r2, 0x5459, 0x0) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f0000000180)=""/202) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000280)=[{r3, 0x4000}, {r2, 0x200}, {r1, 0x8000}, {r1, 0x2}], 0x4, &(0x7f0000000300)={r4, r5+10000000}, &(0x7f0000000340)={0x1}, 0x8) request_key(&(0x7f0000000000)='u\x94er\x00', &(0x7f00000004c0)={'syz', 0x2}, &(0x7f0000000380), 0xfffffffffffffffd) r6 = socket$inet(0x2, 0x0, 0x0) sendto$inet(r2, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r6, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r6, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:01 executing program 4: inotify_init() r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x80000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_generic(r0, 0x0, 0x48800) r2 = socket$inet6(0xa, 0x4000000003, 0x8) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) bind$bt_hci(r1, &(0x7f0000000180)={0x1f, r3, 0x2}, 0xc) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0xff}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0xffd8) 08:27:02 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x8, 0x222000) ioctl$TIOCPKT(r1, 0x5420, &(0x7f00000001c0)=0x1) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) ioctl$SCSI_IOCTL_START_UNIT(r2, 0x5) r3 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="44c20055270fbb9cbc15fb99067b72170e4bc751d285aba72df90e75e563e0fc244d0c3444108853c068ee2627455176ced110f1c22f19202466135546855047fb7fbacae9b3a43c0693c856d7fc3820042a85398e7b824119d241e71efe40fafa96ad5f2a2d1ee6fd3831bf0f57460863", 0x71) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x359, &(0x7f0000000100)=[@op={0x18}], 0x18}], 0x1, 0x0) write$selinux_context(r0, &(0x7f0000000200)='unconfined\x00', 0xb) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 08:27:02 executing program 1: r0 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="6271a5374a1a2e1964e2b7f3ae7f73ddc4306e084ede9ab3d394b4084b3e2327b31ab0f61c00e686b03e75f9fed06b738d775a369d0d41971e5a696720f9e6d15ee6f7722a9b13eafb6fb92ed2f7dab1980ea5d6202e066e2d52506f883a288bed2394cc265f4b0adee7f2ea51e66688e16e0d000e474c0ce7c43fd6f1b87d11cdef07c1b825044911065dc86a169d8f21501ceb6fc7843e4b92380c3f3fef6f967463763700436bb119ad24896c301c7d05ea37e820251e610a9c900d5c44767f5709f87429db9d", 0xc8, 0xfffffffffffffffc) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) keyctl$get_keyring_id(0x0, r0, 0x2fe) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000280)={0x0, 0x401, 0x301a, 0x2}) connect$bt_l2cap(r1, &(0x7f00000002c0)={0x1f, 0x2, {0x6, 0x9, 0x3ff, 0xfffffffffffffff7, 0x4, 0x81}, 0x8, 0x4}, 0xe) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, r0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0x101000, 0x0) [ 296.192001] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 296.213306] QAT: Invalid ioctl 08:27:02 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f00000000c0)=0x42, 0x4) [ 296.236994] QAT: Invalid ioctl 08:27:02 executing program 1: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x1) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000100)) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x109400, 0x0) 08:27:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x6, 0xffb, 0x1}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0x8, @rand_addr="521d9fc6fa4c96af21e47da4ae7eb951"}}}, 0x84) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6, 0x400000}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:27:02 executing program 3: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) alarm(0x6) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x220000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000001440)=[{&(0x7f00000001c0)=""/170, 0xaa}, {&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/52, 0x34}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/48, 0x30}, {&(0x7f00000013c0)=""/67, 0x43}], 0x6, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() clone(0x1002e828906, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 08:27:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x38) write$uinput_user_dev(r0, &(0x7f0000000bc0)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) ioctl$UI_DEV_DESTROY(r0, 0x5502) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") 08:27:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0x6, 0x95cf, 0x85d, 0x4}) r1 = socket$inet(0x10, 0x7, 0x6) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000070a07a3321a2ee3753369db8963493e9adb68031dfbfd946fa2830020200a00", 0x24}], 0x1}, 0x0) 08:27:02 executing program 4: syz_init_net_socket$rose(0xb, 0x5, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x16501, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x103700, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000200)) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000240), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000700), 0x4) add_key(&(0x7f0000000140)='ceph\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000280), 0x0, 0xffffffffffffffff) keyctl$clear(0x7, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, 0x0, 0xffffffc2) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) getrlimit(0x0, 0x0) r3 = open(0x0, 0x20141042, 0x1000000000000) ioctl$BLKPG(0xffffffffffffffff, 0x1269, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r2, 0x0, 0x485, 0x0, 0x0) fcntl$getflags(r2, 0x40a) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000000c0)={0x7f}) ftruncate(r3, 0x80080) r4 = msgget(0x2, 0x200) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000280)=""/213) 08:27:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r2 = getegid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) r4 = getgid() clock_gettime(0x0, &(0x7f0000000540)={0x0, 0x0}) ppoll(&(0x7f0000000500)=[{r0, 0x2200}, {r1}, {r0, 0x8000}, {r0, 0x20}, {r0, 0x3001}], 0x5, &(0x7f0000000580)={r5, r6+10000000}, &(0x7f00000005c0)={0x1ff}, 0x8) r7 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getegid() r11 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$PIO_UNIMAPCLR(r11, 0x4b68, &(0x7f0000000640)={0x8, 0x4, 0x80}) getgroups(0x7, &(0x7f00000004c0)=[r2, r3, r4, r7, r8, r9, r10]) poll(&(0x7f0000000000)=[{r1, 0x2286}, {r0, 0x2}], 0x2, 0x101) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x100000001}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r12, 0x84, 0x1f, &(0x7f0000000200)={r13, @in6={{0xa, 0x4e21, 0xe54e, @ipv4={[], [], @loopback}, 0x1}}, 0x2b7, 0x97ac}, &(0x7f00000002c0)=0x90) [ 296.918151] input: syz0 as /devices/virtual/input/input12 08:27:02 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000300)=0xa051, 0x4) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$uhid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/uhid\x00', 0x802, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xf, &(0x7f0000000280)=0x8, 0x4) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="75aa2f8f331e01284f8a1b00abd54aaecf9eb65d03722c70347761730142ffb3a6a64fca6d240e9bea0c9b5d59a4edeb79608ad9ae7a9cacf303663b2973bb7030a7ccd4ef28056e463b3169548f0d248351ce282e9d1524123c6e598d3802d16c12da9f50e04ce99e5a416537768e4c2f1223e1e1289dd1cd10e561d73f7dffc3c0a4602074bc217d1d7f7b7e7f980bdef52642a51e805c5bf060db97a65abe3a5a0de768a0af81df617b88aa7fd1af77630906aed5fe9d3cc0e9fb730c2e940daf6bb6ec"]) 08:27:02 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x80000) fsetxattr$security_capability(r0, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x2, 0xffffffffffffffff}]}, 0xc, 0x0) add_key(&(0x7f0000000040)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0xfffffffffffffc70, 0xfffffffffffffffe) 08:27:02 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x40, 0x4000) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0xfffffffffffffffe, 0x615, 0x0, 0x0, 0xa5}) io_setup(0x4, &(0x7f0000000000)=0x0) r3 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x4000, 0x0) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0xbc9, r3, &(0x7f0000000080)="f78c6f52e91e3d620d2ca928e3a5aecfa67f0f627dbb35dc80b762942ff5ef1e3b3d5d69d89714c68ec7c5b9cd63fe", 0x2f, 0x4, 0x0, 0x3, r4}, &(0x7f00000001c0)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 08:27:02 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x105300, 0x0) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000140)) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 297.053685] input: syz0 as /devices/virtual/input/input13 [ 297.072951] __ntfs_error: 1 callbacks suppressed [ 297.072973] ntfs: (device loop2): parse_options(): Unrecognized mount option u/3(O. 08:27:03 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x10001, 0x200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000340)=""/9, &(0x7f0000000300)=0xffffffffffffffb2) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000100)="010000000058ee98b1bbdca8417c8cd97893961adc2ddc30ccbec8069e48ac0500"/54, 0x12, 0xfffffffffffffffe) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000080)) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000000c0)=0x3) 08:27:03 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl(r0, 0xfffffffffffffffb, &(0x7f0000000000)="fff20a4b0d3c953bb6") r1 = creat(&(0x7f0000000040)='./file0\x00', 0x100) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000080)={0x1, 0x1, {0x16, 0xb, 0x12, 0x13, 0x1, 0xfd17, 0x1, 0x5b}}) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) 08:27:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) prctl$PR_MCE_KILL_GET(0x22) accept$inet(r0, 0x0, 0x0) 08:27:03 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x4000000000000802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:03 executing program 1: add_key(&(0x7f0000000000)='logon\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:03 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)}, 0x0) pipe2(&(0x7f0000000000), 0x84000) r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x5, 0x40000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'dummy0\x00', 0x21}) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='ns\x00') write(0xffffffffffffffff, 0x0, 0x0) getdents(r1, &(0x7f0000000040)=""/46, 0x2e) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x800000000000001, 0x84) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 08:27:03 executing program 0: r0 = memfd_create(&(0x7f0000000880)='#em1#+\x00', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB='%'], 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000300)=""/148) connect(r1, &(0x7f0000000100)=@l2, 0x80) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000180)={0x0, 0x71, "0b1803e2079e6ec0f5ac541d72857e911fe218140caec5dd6cc82f3b9a18fc84c55a56dca7d68a6fe1b0257fdba4364debbb6daf38f8add58be30f6cfc2aaba4cdbf2619d753f67f269cea38f33c1f663b27bf4d5f3ec8adc3edc32da1be0ef9f5c547b8967f6978f90440803e0a9170a8"}, &(0x7f00000000c0)=0x79) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000200)={r3, 0xffffffff}, &(0x7f0000000240)=0x8) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000000)={{0x3, 0x3, 0xac, 0x0, 0x5}, 0x0, 0x9}) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000280)={r4, 0x5}, 0x8) 08:27:03 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000280)={0xffff, 0x80000000, 0x3, 'queue0\x00', 0x6}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x104200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000640), &(0x7f0000000680)=0x4) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="2724e3bac1c837e44e9d816d1b88d7c5eb68a1b5baf914859f9c3bd2aed6596aed8442e540a2b504dbd1313608354451d9692b1f5c21c1d13269d3fd5b562ba9f4922d0cd3cd16c780903a75ef91f4468f449d0e4db353d2985f6ffebdacf7a5b64fb78125ee51f898d822e8d38f8cb9308f3a8f4e8bd846c1d66059613dddf8cbec2693458e7726084f2a08f2c58c2db4766e82be2af68cfc1aafd5e0ae8a158114afd8a09262e248bf19e2b5fd974ec6811e7b95ef9657fedfca77ac7aae4cdcffd11d1c00"/207]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0x1, 0x9, 0x36af, 0x4, 0x0, 0xffff, 0x10, 0x8, 0x100000000, 0x101, 0xd08, 0x20000000, 0xa7c, 0x0, 0x3, 0x1, 0x9, 0x9, 0x4f, 0x378, 0x0, 0x3, 0x5, 0xffffffff, 0x5b6cd3b7, 0x44c2, 0x7f, 0x3, 0x401, 0x3ff, 0x8, 0x3f0, 0x5, 0x0, 0x94, 0x80, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000340), 0x4}, 0x20, 0x1, 0x8, 0x0, 0x80, 0x81, 0x3c}, r2, 0x7, 0xffffffffffffff9c, 0x1) 08:27:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000600)='/dev/full\x00', 0x301981, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000640)={{{@in=@broadcast, @in6}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000740)=0xe8) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') fstat(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() ioctl$sock_inet_SIOCGIFADDR(r3, 0x8915, &(0x7f0000000780)={'veth1_to_team\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r7 = geteuid() mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x20004, &(0x7f0000000500)={'trans=unix,', {[{@afid={'afid', 0x3d, 0x7fffffff}}, {@access_any='access=any'}, {@dfltgid={'dfltgid', 0x3d, r5}}, {@uname={'uname'}}, {@msize={'msize', 0x3d, 0x9}}, {@access_uid={'access', 0x3d, r6}}], [{@subj_role={'subj_role', 0x3d, 'cpuset.effective_cpus\x00'}}, {@smackfsroot={'smackfsroot'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@fowner_gt={'fowner>', r7}}, {@subj_user={'subj_user', 0x3d, 'TIPCv2\x00'}}]}}) sendmsg$IPVS_CMD_NEW_SERVICE(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x88020}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x144, r4, 0x808, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x68}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9a}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x10}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5a29}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xf40}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}]}, 0x144}, 0x1, 0x0, 0x0, 0x20008080}, 0x841) 08:27:03 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) get_robust_list(r0, &(0x7f0000000400)=&(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)}}, &(0x7f0000000440)=0x18) add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="f06512f7ef4caeceb20696a2d0485f8bdbb8affe6f52e1d24b78855a98384e49340fe3283bcfcc8f373ee9953f18cdd458e1c445ef72dafdbbb3ed00b8c5b7ee8d3795fe545a6024a9632a839eae223035fb338ee6380a6a664de32724d329fad9bc4d131887ee9f987220a20329615a12e31c4d9e81ef15e5f09625318b1572526368c073937baa8c013511de8abecf307890ca72a4b4567c4c6c9b148c2ce085f084e78e2fde6e3d9cd86739897f83a3cd9c450fccb053c109b92027814d50f8c436171543fc822f6ada9e4a222dfc07dd95aefcb4cb5040", 0xd9, 0xfffffffffffffffa) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x101202, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000500)={0x2, 0x8, {0x2a4e38e696235e50, 0x3, 0x1, {0x400, 0x7}, {0x1, 0x3}, @rumble={0x27b, 0x9}}, {0x53, 0x9, 0x100000001, {0x3}, {0x100, 0xffffffff}, @period={0x5d, 0x1, 0xd35, 0xffff, 0x7bc, {0x3, 0x9, 0x40, 0x5}, 0x7, &(0x7f00000004c0)=[0x9, 0x17d, 0x70, 0xfffffffffffffff7, 0x60e, 0x101, 0x7ff]}}}) add_key(&(0x7f0000000000)='\xa0\xcfrpc\x00', 0x0, &(0x7f0000000280)="01fe00000058ee98b1bbdca841fc8c962edc2d60410002007644359db3af454127a71e8caa157fbd71cd581012b435cc8297f6a4b6aedced6008b104659ddd1baff1ce389caf84c8c23d88a45a4b9016b300af4797aa2f15375d99c99d510a4b7e8b168cc85b3b86b2fc03f571a29d6db9cee64705bb4fff65a2e23d5576df7d31fccaf4a8ec0e0e8f7303f98e2416eac66de6adf986c256a7064b2507569318c46e8fbef47695cdcdb9e1d9f0351dfcb85c0a5d59f035232ead4eac169047877c09c36e8a2e77352fd37b5198e8e01fef8f2dbfe9358a51eda4a4e46a50eaa3b9375cd6a28b01b4684a48fb359386bfec82a1528cc35744ff85308693cc583a794553e5d4efacd76e05f74f5f1bb4234f80b1da438936e7bb53030a175eadb0ca868e34cd1e707657496a3c2dec39091701d24f238a7e7011b900f6ab1b0e1ec0b4bb", 0xfaa4d68a, 0xfffffffffffffffe) 08:27:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xffffffffffffff29, &(0x7f0000000400)={&(0x7f0000000540)=@newsa={0x0, 0x10, 0x400, 0x70bd27, 0x25dfdbfc, {{@in=@loopback, @in=@rand_addr=0xa091, 0x4e21, 0x0, 0x4e21, 0x2, 0xa, 0x20, 0x20, 0x29, r1, r2}, {@in6=@rand_addr="4bc115a9525234a5e5cdc7d99d63f1f8", 0x4d6, 0x3e}, @in6=@mcast1, {0xffffffffffffffc0, 0x8, 0x7, 0x5, 0x3, 0x7fffffff, 0x2, 0x9}, {0xfff, 0x4, 0x1, 0x7}, {0x8, 0xfff, 0x80000000}, 0x70bd2d, 0x3507, 0xa, 0x3, 0x1f, 0xdb}, [@algo_comp={0x0, 0x3, {{'lzs\x00'}, 0x0, "67c11de004a8b9e78aff123c6cd8e349199804425f98525f8624d528f48fdfb4daf52e6769b3ecfeda60824e1ed774d69ed19d1fd38bca63f73b992ea919a8425c3cf054735ef07c2ec7e433681ff364575c4e6aa2cce3f615666c46d85078727e84437189e0ec262e9de69a93535832d91df161fe96ce"}}]}, 0xffffffffffffff71}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}}, @in6=@ipv4}}, 0xf0}}, 0x0) 08:27:03 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180), 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000001540)=""/129) getresuid(&(0x7f00000012c0)=0x0, &(0x7f0000001300)=0x0, &(0x7f0000001340)) getresuid(&(0x7f0000001380), &(0x7f00000013c0)=0x0, &(0x7f0000001400)) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f0000000200)="26934099dccf230c3a98e40efcb05865124195ac0eac4b4bdda73038b8b2207023a9c29e54e513a92a717389a89c15005d7906e600c572736ac49bbb48f03a7399cba82ef4e03f644e190841c726b5d576573ba1dcc0e9aed4098578645fed77d3f2dba635fd6764400539f03436450a9525244a8a685fe54f763a61a0563b1ec4e65600250352ea6c1f46ff0533492534f7332f0bdc7a17624efb4e9e90", 0x9e, 0x1}, {&(0x7f00000002c0)="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", 0x1000, 0xffff}], 0x1000, &(0x7f0000001440)={[{@iocharset={'iocharset', 0x3d, 'iso8859-6'}}, {@shortname_winnt='shortname=winnt'}, {@nonumtail='nnonumtail=1'}, {@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}, {@shortname_lower='shortname=lower'}, {@uni_xlateno='uni_xlate=0'}, {@fat=@codepage={'codepage', 0x3d, '932'}}], [{@euid_lt={'euid<', r2}}, {@uid_eq={'uid', 0x3d, r4}}]}) io_setup(0xb, &(0x7f00000001c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000)="0500000093c21faf16da39de000000000000580f7e6ce5d17c490c7600000000001f00000001000000000800"/56, 0x38}]) r6 = getgid() write$FUSE_CREATE_OPEN(r1, &(0x7f0000001600)={0xa0, 0x0, 0x5, {{0x6, 0x3, 0xc8, 0x6, 0x6, 0x101, {0x4, 0x7, 0x4, 0x4, 0x0, 0x9, 0x6, 0x0, 0x2c74b056, 0x6, 0x2, r3, r6, 0x8, 0x96}}, {0x0, 0x3}}}, 0xa0) 08:27:03 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x9) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f0000000000), 0x4) openat$vsock(0xffffffffffffff9c, &(0x7f0000001100)='/dev/vsock\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000080)={'filter\x00', 0x1000, "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"}, &(0x7f00000010c0)=0x1024) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x3, @empty}, 0x1c) 08:27:03 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x320, 0x70bd26, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000180)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, r2) 08:27:03 executing program 4: r0 = socket(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x68042, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xff, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, 0x0, 0x10001) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e20, 0x1, @remote, 0x3}}}, 0x84) 08:27:03 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000040)={0x6, {0x7, 0x60e, 0xfffffffffffffff7, 0x7, 0x1a, 0x9}}) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 'erspan0\x00'}}) 08:27:03 executing program 1: r0 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="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", 0x1000, 0x0) add_key(&(0x7f0000001100)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, r0) 08:27:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0xfffffffffffffca2) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:27:03 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000010c0)}], 0x1, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000080)=""/4096) r1 = msgget(0x1, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000001180)=""/97) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="14bc42000000000000000000000800000900dedf00000000000800000000080008000100000008020500ac14141b080003000800050f01"], 0x1}}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) clone(0x80000000, &(0x7f0000000000), &(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)="f07e8b381cc9749cd4861542c10a63c20b3bdeb382e32e87e478fe602d63f20da0a64a0bb760e646a51687eb7fe4257a9bffad23c4770fef77a9dae45ed1bf72d46e") syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) dup(0xffffffffffffffff) getsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 08:27:03 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) socket$pppoe(0x18, 0x1, 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x105400, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r0, 0x29, 0xd3, &(0x7f00000000c0)={{0xa, 0x4e20, 0x6, @mcast1}, {0xa, 0x4e20, 0x7, @mcast1}, 0x7ff, [0x8000, 0x1ff, 0xfff, 0x2, 0x5, 0x5, 0x9d02, 0x7ff]}, 0x5c) prctl$PR_MCE_KILL(0x21, 0x1, 0x3) 08:27:03 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) r3 = pkey_alloc(0x0, 0x2) pkey_free(r3) utimes(&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {r1, r2/1000+10000}}) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r4, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) prctl$PR_CAPBSET_DROP(0x18, 0x15) 08:27:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffffffffff2b, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000010f9ffffff0000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100697036746e6c00000c0002000800060000000000"], 0x3c}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000a40)={'bond_slave_0\x00', 0x0}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000b80), &(0x7f0000000bc0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000c80)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x40800000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000c40)=@ipv6_deladdr={0x40, 0x15, 0x10, 0x70bd2c, 0x25dfdbfd, {0xa, 0x38, 0x8, 0xff, r1}, [@IFA_LOCAL={0x14, 0x2, @mcast1}, @IFA_CACHEINFO={0x14, 0x6, {0x2, 0xfffffffffffffeff, 0xbe42, 0x8000}}]}, 0x40}, 0x1, 0x0, 0x0, 0x44004}, 0x20000040) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r3) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) sendmsg$kcm(r4, &(0x7f00000009c0)={&(0x7f00000000c0)=@nfc={0x27, 0x1, 0x1, 0x2}, 0x80, &(0x7f0000000500)=[{&(0x7f00000001c0)="c9ef9f119a8fc35421e4b07f719c22db8fbec85cc8d7787f3feeaf05a541fec46b79cc634725faf719a7492541a3ce35c7be91cec563fd1def579af8dd750371c07e6becd09a612f68", 0x49}, {&(0x7f0000000240)="1ca14de339157f692b0ed713b4aba53160b1faa225958bcd5c0455b3df7a8e35f6fef1561a9da87e76712d467dddfd0b9ae76d2b8540b8d0b73d0343cbe45d5368e9be0ae0b63122dfceee83cd936f1ae820f87ec2b9f707c0ec", 0x5a}, {&(0x7f0000000140)="3b1befca3788a4a0", 0x8}, {&(0x7f00000002c0)="39d6ed16697d0a7929c95c1fd49eaace572f93f6cba12be1a670c96a8fba357fbe1a14b41384ed4aae43bd0dfe81e030a0bc350f1090f73b2fa56d00fb9d764613f7138c2a4c5e50ddb7de2bd5e8b52ca0392280e49c59b44e6dd1a7e01ce4fe2a1d51b7a2963b501cba5701fe9171c4132b63e6160e93136c458bcbf17198df389d39fd51d2bb18d6cd5f9b8d0988a6a83faa65cc416cc8871bff9b1cbde70d1734dfdf01b1d9a55cff94fdd229331961d05a244248450693337b1583fa8ee88f5b649705916cb570155958fe40029d64d43672d4d1ee5a63377816950a8b102a2277375aff243c3265a9e1bc", 0xed}, {&(0x7f00000003c0)="7d2050948e560f061892cc1cc93c17175d13254c1b72d89f019f0e911e633dd752509a7e143fde3651bee1f7f0240f78082632cc06cce9e83ec2130ba71b4098a5338388f610eec21bb79ff828cd2790903e708c2bf8436373f4598039cc4b9cf098f402ee971c62789a96dc982dbab5fc6e", 0x72}, {&(0x7f0000000440)="15465a9ea911f05e4c4b87473450aca069283c17a2c5c3af3896d944e3039f6ba107e606838b415797d1f3d2910aaac9ccc0a4b42c42b67cc2e9413286daa434df395d806064c98bbcce819dda8900c4b1314a427eda24bc9b86fcf0d94f9912f14deb4791f8e78f505dd60d89527d3f4eb7ae593f4a20", 0x77}, {&(0x7f00000004c0)="c80161f226ca6ecaccd066a9399400", 0xf}], 0x7, &(0x7f0000000580)=[{0x50, 0x116, 0x80000001, "83ea805534053f338770b81335f1b25409741bb2c704c7aaa7cf9ef2f6292ec6e2b4488096175c124b791dbeea6637a8f4c6b60b69feb0641f51d2"}, {0x68, 0x113, 0x7f, "1c662bd6e3133662b21fd5e77d8e3779c747e80d9bfb99f9c145b98472ddae5e80f810462bd5b96a7a42fc11e48f6473e9a2f6edcb6713a0ab94cc09a25ce864318db3d67fd4afc4458f6936957af2142f"}, {0x100, 0x10b, 0x11f, "e61e35f7271c9e5c9258179e31ef897b5407be418d9387cb520744e56fbaf99fef912b9700024e05997fd8b62d5f992754bf65a7a604b930d25dea58282f96744786a350fa678d7bb8dad7299f36b707abc7bf67363751e8d002c5f67c0e0e908a6c53913fe1b540727d1c0c2b55e4bbdb79774d85391ba43428b9eb403d98cf7f4acc96335f18e4f74bf469316446897ef26be94a6dafb196d58071c3b81fe82d43c4fdd5a052b77bde890f804cbb40b72845a82c6d4369b030ff9eca3733fba2da53eca0e6e9adaa8db75dff1c0cd40c5cc29d5f2e62050ccda98f89bb0437175c6b40d38b35b0df72"}, {0x30, 0x1ff, 0x7ff, "cdd8916d1ff97506071e0c73c7502be5f5bd532a6ace7ddee90ccc138a9538"}, {0xf0, 0x12f, 0x1, "43669130f7012df09c3295bf3c19f0cb5d2e114d06a47d2bf32b07af8c0b3dbc14b5812a1c02277ff15070109f1bbabd6f579a13e0693ee150fb9ea193b8b24c998d81c5fdabe8198a3004c28a24341a963ab7932746be0b748b699b7081ad9c1bb80949174a2222fd8a1a4de1b8572e17628578f965a87ba5bcdab3173e165acf6980681e63ac3a0da90156157dd2005ed6c5926bcd1075bc6878309c26569fa1e254a83f52e6c2a7a1fd936f85dca3d3bb7e3fb3648d6b24b9d5e9d84c20ef730451844f7210a1150dcf5f245d317dd43494f90a9406f47700469f"}, {0x78, 0x11d, 0x7, "f481634cc5deb6020dafddab2c3c6905dd5ab56bf25de933416acb7b5c968621c975b399447ceefa5e3a995d1654cdc04996bcee9f8fa2be7a849c1f7040238fe5e61880c042f4835f0f06e946b4e8788daffbae13d40d88899d5bbe459f918932285f0aba"}, {0x20, 0x111, 0x3ff, "8fbdb4f34d67172d4f9a7e701c326e54"}, {0xc0, 0x11c, 0x6, "c64d8582db5d7132064102bb300011703a0df31105ff0e1820c6e68e76afed188e9ee9e30b56ef501d6b011a7726a88aec0aedb24c405a7f588d2391410fd2318e3dd55dac547c27983dede3863de37fd60e0443988ae2f66fe5c70aa338a0536612e26fb2dbd91007e3b5e1b54b4b2e39202db4e360e413c3204a2f9a4f3f62006c6e4cdd2e0dd97c3cb51f1984ea08efdac8343f5fc2389cec73ee46a2e3d7c7d65aacfe25920cff"}], 0x430}, 0x4800) r5 = add_key(&(0x7f0000000c00)='.dead\x00', &(0x7f0000000cc0)={'syz', 0x3}, &(0x7f0000000d00)="f8ed84dc38e6cc7620aec6c00897b250c9da39ff85f617c88a828112e704fe00ded1b9d1e095fb7b6984a6ef0ec1c4c4a180604e363dee70c3615744f8e497367e0a30a367419432e3bcd66b38433c69e445fce85d3b6f88647bfca623f4f44117ba82d7db2c81a3", 0x68, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000a80)='keyring\x00', &(0x7f0000000b00)={'syz', 0x1}, 0x0, 0x0, r5) 08:27:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x2000000000000006}, 0x4) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000100)=""/48, &(0x7f0000000180)=0x30) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000000)) 08:27:04 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0xa4f, 0x0, 0x7, 0x100000001}, {0xffffffff, 0xd44, 0xfffffffffffffffc, 0x9}, {0x3ff}, {0xfff, 0x7ff, 0x80, 0x8001}, {0x3, 0x0, 0x8, 0x6}]}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x8000000, 0xc}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80, 0x100) [ 298.105587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63760 sclass=netlink_route_socket pig=15954 comm=syz-executor.4 08:27:04 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x240, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000000c0)={0x5, 0x1, 0x22, "2ceafc481dcf2c2b97dbea2f96c62393bfbe588f894044518acdc27e8bc3f1cecf83e03a65f4ba51d548decf483a517fcfc44b4a3389486657ebf6dd", 0x13, "f2444fc41b515011c857075d849285850f4f5836d6ea17d9e820d404541af8ac40952e9afd38e0d77ae2a898d4e56f67a1e67b3f1428eaa61de92f25", 0x20}) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) [ 298.183580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63760 sclass=netlink_route_socket pig=15954 comm=syz-executor.4 [ 298.225987] ntfs: (device loop2): parse_options(): Unrecognized mount option y2VVIYBG#2/G0x0}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000001340)={@mcast1, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1e}}, @local, 0x6, 0x2, 0x6, 0x500, 0xffffffff, 0x2, r4}) 08:27:04 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) syz_mount_image$minix(&(0x7f0000000140)='minix\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x5, &(0x7f0000000600)=[{&(0x7f00000001c0)="43c045225e7f8c40094b54be3e7b1ddaac59b5f192db90ba84a76712804714adbc6a5d399e1927b40d90ca0278c0630ec0f26a9ee72ae7cc8e0ee59eaf3b082923957ee7a2d179f9de794886d11de1cd904c4bd0f08a47686c0907355902ecf355c7bd100bec473f058e1881b665c503b99bbb6ec79ef4f08290031a25994f824abc4b701bd63fe6bd82fcc1dc85ba10c4914e8b59cbb734d244afd541a0ebe24433f14011cccf1d13d90e0b4a", 0xad, 0x6}, {&(0x7f0000000280)="bd768a602b8460002f735ed9225ed61e2ed6569659064a1c1eabc7baed09e731f5fd10a70e565cb64697593f5c32f72f2751b3f06446726ae38dc749e1e323a0f3005e74084ac56cebe04d9a4a75c8bc56ad8212968127a37ede2a931b51195e834b2a3ce682c971be10eac5dca40385be541c42e91a89c895510dd3b4c3045132f0f1e244d5f3dbedb3fcf5b2217e888984c4e4ccad178ac3083c408f68", 0x9e, 0x7}, {&(0x7f0000000340)="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", 0xfc}, {&(0x7f0000000440)="a1d2b67f00d58a172bae1da2ed51c4af290f559ae307a615285fd1a344c44db52aa940280d3f5af40323bc42f5d8353171c0ae554e347c15a514ecbc8c166491c9f0113b70c4242deb6ef5f01e22fea5f0eb88e64e96e500a9970d81f3c5500409ac2ad3c5986f68232043bd9728d8de38ec9f575c7eece15f173f7da174950330269cd5f50db34eb2b22e8c85d4af116ad467502f825b0b4cbd0f40bbf8ca133cb651c733", 0xa5, 0x800}, {&(0x7f0000000500)="7376816b09e17dbf25d4b03d717a23cd107bb947a2c46729375c4a5dd4b48d22105754608e217de1adf71557c3e8adfb0f7844a79fc093c584ef79a25ee8a91c59d6c2c79ec45376c7de5e69276507c02a0375a89aaa72d1d16c30ec99d685b27b2584cc66d1d119330e6356eb0324b6c382bf14d5313ee78c656945a2bbbece8de206377df5ec11908de5f4050117e8b423e56db66177ccbd059a69f9b869a3a0289a0530a0a32971460a8410f1f68fd0f01fde75da9ad0e3b417c7346bbc27a7e597754f0cf41a826a70578552f051d9357ecd486a358af918018d95704483027dea4802e3118028a74ac4570904", 0xef, 0x4000000000000000}], 0x80000, 0x0) syz_genetlink_get_family_id$nbd(0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) seccomp(0x2000000001, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000000)=[{0x621}]}) add_key(&(0x7f0000000040)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)="f80700807bddc1bbb8ceb9ab4ae7ad03c55cb781f55554486660b0fee8988d2b6372afe3dba153760879222469af2f466705d8aa37bf90627f722759ba816ccb", 0x40, 0xfffffffffffffffa) 08:27:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 08:27:04 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0)={0x0, 0x2000000000000006}, 0x4) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000100)=""/48, &(0x7f0000000180)=0x30) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000000)) 08:27:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000000000)=0x1, 0x4) poll(&(0x7f00000000c0)=[{r1}], 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000140)={0x3, {{0x2, 0x4e23, @multicast2}}}, 0x88) 08:27:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="340000001000090400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001400120008000100677265001800020004001200"], 0x1e2}}, 0x0) 08:27:04 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x400000, 0x0, 0x0) fstat(r2, 0x0) r3 = shmget(0x0, 0x1000, 0x780000c0, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000280)=""/201) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x6) accept4$rose(r1, 0x0, &(0x7f0000000380), 0x800) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/mixer\x00', 0x2000, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000b40)=0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000000)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x1}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000080)="95c5992762d7f94a0917c9b4ee3099ecd9a76fdae11e32cd3ee1b817f099e73d94a131d186b1591040b365a2c6550b964fd518d3c01e7f905f33c3e4aa3e0484d834238a5913d82d37a7baa89b393944ad6467a21d6a7e3d814f82350651fad97e2757d8f09d3281e4a8e2325788bc290a4578147cc0d90cc95b4c79dd", 0x7d}, {&(0x7f0000000100)="8fc761785ca6ac011be26aef589814853a279135fb2d9cf1196ea77b27203e3aa9292362f8190e9524a025d5010eee964449a545b4aeb0c676ecb48380e3a15f46f4eff3c563e17b424b6c8d9c55f01a86fdf460daee2d2634b478ee765706c9fd3690aec08cd74c7e708fd11b91450470e9cca0b98849251f4221d0d9822465398ac762787258467c020036c61c1058a00a739af31e82edbaf94888946ebe7d2287b6c1a7f08d1216b34256923ada736bc01cb79154a34b351b05e675b8d9057c12e5fa83ae16e4", 0xc8}, {&(0x7f0000000280)="50b27cba939595429e775f57ef59052e29f03515f8284243694ae06a80600450bc5c0ebd9b976c7bc500472a1ac6a9dbaa552cacf46f19820c3d535941108b309105550a0c7ea0ff6d012a172a534b3468d1e9aa1e83b6864b42153d213a831f654b38716be4ed15a73c811e29f858f0a9358827583f0d32fb6fc2e1e3d42327ef680005ee2cdad965f22b919b9c5fa04de860413a68f0585d7fb92d46cf21f6686c028f229372d36535d6ce9857e1329b0cfa45c7e79f70b019b8e97688114fc177238edbc620d06c78005dd72aa27d9b35743fd4d0b0faea44cd02e0bf7a6c1df6eb2764e96d", 0xe7}, {&(0x7f0000000400)="000629b8ce8af14145a83ba5a1ebb4d7a24fe72a3125037ad965b8a17951e704b9e7590e046bcd1279fa4f592ebca57670aa600723ba1d598921efa0971d25877cada961181b4155434c523dc93e02775a586bce2b4ca20061c2fcc987ed432abde4b974d470dbd009dae341a12b5980da584ed20ef4d0a20a2d5883eb59a4b5", 0x80}, {&(0x7f0000000480)="71bcb825b64612f0923cc505446e0303d1da8a4832f2b1319eb822aebc48cfaa3f219d043678c994b68d53350b9e2dac7d064ff9e5fce67b62f925548b1bab47b4769d1e89aa3d394bb6d4cc7e436bf3397cb733aafb9089108ce5245ec97e60633d95d0a51882d5cfb51495d05a7b9f22972f19f1258ec6d2c410d4d971f437943768e274fcb5259b7a1bd71e584d849a48a0a683864919257142a53d21c86e294b02fe869e3e9f4368dcc95a5d00645c0e3a32e923d29b59ccc9afc3f95e", 0xbf}, {&(0x7f0000000540)="ab4e8b180743765658c416158fc45ca46fad7b30b7b8135981cf561aa58e86d311c15bda663f0faf8270f141a112725c2423578a9c70788440a2b9d7c9b1540137e405b803559bc754a3852042b2c3", 0x4f}, {&(0x7f0000000200)="3474e1aa5c0e01c64d6f89c9adad85e074dfe621", 0x14}, {&(0x7f00000005c0)="6002158adf3570b3a25a40854735b6fa555f23c881f8b26f20e2901b6a31e9446869c83de5cad4dbe956fb152126615e104d9d6d634c2926ecbcd154d097438854e73fad53838a2cfdd1ab07aeb0a91a06c161f518ffc3e517793260f6b62b218f8e06b7c3598b9fd5e4031f48976ee050adedf1a466cce3aca1c94e30b995225b5d2698507f790d7921147a04c014d554c9b7342b06daaa6fa628f8a24b53b70d7dc6d91ddfc66da23ab37cf1b18de8d9c41d3f4793e796b1f3246b5d59fe0d5872a502", 0xc4}, {&(0x7f00000006c0)="d78c9ac19207b86097872ad99baf16dd29379d52d9f59f3429b7136338d1d40e1e906e27a7a3edb8eddc1f33c9a4cbdf03ce5881c61f739a107821a5da57f5f950854136dbafa83865ee1de6ceffb3a64b83ac3523c6e8600f7a2fb8719b8fec83122a0fe99f558a8dfa2abb87aea283fa922f69eba85deb67a27e51a03e3ed67259de6e03f288b9f2449db6eaec75218e62769a40be3b03de26a4ee0e731e4ebccb145faec2f0dc80acab", 0xab}, {&(0x7f0000000780)="39f6a9287f223c6bff6c3b5e9418e12a211d008da831525ebd9eba8125dc86fb8d1449b392a4ea4abad5aaa5af455757c235f39b9535eecb675c28907e71fe6e5448a9e19fefd9186ccc64063111a1d98f338d1a383c3e90ce9ba44b7a3a142b1cc2aa5d2bd961d6709429f1", 0x6c}], 0xa, &(0x7f00000008c0)=[{0x78, 0x110, 0x400, "e4edb071c89221805daaa8766b1efa467d03f1aef725483a8d7eff0f39da78f56a6693c734602b07baac5fa876ea5f2aa9562fbef8415bd8c9a20d48a59b4b2903c852f969c69cc6d088ca2e658466aa2e131a6c6e4a701b982e07101348b65fb2b411071b4decc3"}, {0x70, 0x108, 0xe000000000000000, "27951f5c28c4e8a3fbe2757436583e496d6f06268e6e9e5c2fc9e0ac3445e975e81e194015df0023954362cc5d7c89fb017c2d54470abc5ffc02e9a245f3a1c1d22f0a85ba121b5e9a529af3d4db6b06a55d561ba84d6dcef62b"}, {0xa0, 0x115, 0x7fde7810, "e4be3871874c1d12f422b608a573e02fe3866df726f1f70171138b94a52a3ccc72a6dd21ea45e9f3a8195544d167c0b53b53123986797562b48a8fa8598e23985d25671cabe21f412030f58b0cdfeb80a36a6c92d8864edd0c9597f40c0293556df2af2e4bf6b2d330ca6d0f1e841066f5e63e44d075e0162b8bca3ed5bb573fb072d1523d53864d46e410392973"}, {0x58, 0x10d, 0x4, "3d49f71d14753787783b36db282649c6a7ac701dc7c1cad683b088f6bb08fef2a9a099ae45cf1e6b392f6fa5fc97c19d3aa80e6a0f3da14e33fffbda9c40ba03c6a0e92a62ef8a"}, {0x40, 0x0, 0x4, "141d88b59e588e9dd2fb805915187ca5d77361cd7db81b81773597f0e6a36f4da31d9db0212937ddc2aab12b"}], 0x220}, 0x40040) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x494ed428a68b464, 0x0) 08:27:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$packet(0x11, 0x3, 0x300) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x400080, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000100)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r2}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x8000000005, 0x80000000000006}, 0xfffffffffffffef6) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') [ 298.575415] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 08:27:04 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f00000000c0)=0xc) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f030048000000"}, 0x28) 08:27:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x5, &(0x7f0000000280)="f70d83c40300000000000000f1569620412540a4fce761cf317b0dbf2e7dd8a4ba") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) fsetxattr$security_smack_transmute(r0, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x3ff, &(0x7f0000000100)=0x4) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x105000, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f00000001c0)=0x8a3b) [ 298.752445] SELinux: failed to load policy [ 298.765668] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. 08:27:04 executing program 3: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_create(0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xb) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 298.810281] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 298.861519] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:27:04 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000380)='syz1\x00', 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000280)={0x9, 0x1, 0x200, 0x100, 'syz1\x00', 0x401}) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000004c0)=ANY=[@ANYBLOB="4a5d5e8cebf627ff9b64f0b3e76d0eed9d1193404eac57aac43d941323bfb78c3292261f3325e91ff050e8e5df3938b7fb5bf8d3aa263d13b7c67900"/72]) 08:27:04 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x400, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000480)={0x0, r1}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xe8) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000580)={0x20, 0x59, &(0x7f00000004c0)="f52727fd43bb3ef900757959e241e50b13e96b782f09ddd28fd89e5c4b4f0e858e2d9a7a2b25824af62d22969eb1a09f2ded492186a914cb6dfb8472a735ae13163fb4762c03fe96a454a524494a414a43bee39b92ab6a0938758e7ac595f9a77ebb5ff3592828fb87b277884b4b79df5f6329ef568b04950e321a7572bae8b75ed4a6e58052d372ff16312e454d3aad71e2c38a04a892d491388fdb", {0x4, 0x0, 0x34325241, 0x2, 0x0, 0x7, 0xa, 0x1036}}) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x100, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="cc5e98804823ac4ee1f50164e795447f65079905aba51960aca2c2072aaee1ffc3f12f61b3d282ce0cdd7f", 0x2b, 0x2b8000000000}], 0x1000, &(0x7f0000000340)=ANY=[@ANYBLOB='mft_zone_multiplier=0x0000000000000002,errors=remount-ro,errors=remount-ro,gid=', @ANYRESHEX=r2, @ANYBLOB=',nls=maccenteuro,uid>', @ANYRESDEC=r3, @ANYBLOB="1f00"]) [ 299.095431] ntfs: (device loop2): parse_options(): Unrecognized mount option J]^'dm@NW. 08:27:05 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfff, 0x10000) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000001c0)=""/228) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = socket$packet(0x11, 0x5, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') 08:27:05 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) recvfrom$inet(r0, &(0x7f0000000280)=""/18, 0x12, 0x40010120, &(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:05 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory&e\xd0ents\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000600000000000800"/192]) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x2) 08:27:05 executing program 1: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', r0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x2, 0x0) recvfrom$rose(r1, &(0x7f0000000180)=""/166, 0xa6, 0x40002102, 0x0, 0x0) 08:27:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000100)) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl(r2, 0x9, &(0x7f0000000180)="3f503926dbf7d2d5d13175516dd1dcd06bcfca110d95c3e3545f1498ea8f7cd3a2e1d59b54d895006421c582d12aad9b1dab81fd86956c1e3f72388fd069d117f597738cdf91800894a32ac3d03c59f2fe89334f28382af3046670e7d7a7f97b7fa556d5418240e7cc838b57649034dc4c29130fc4a39f") [ 299.435681] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 299.465893] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 299.491120] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 08:27:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:05 executing program 1: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x8, 0x20000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000100)={0x80000001, 0x2, [0x7, 0xfff, 0x3, 0x8, 0x5f73e972], 0x401}) ptrace$setopts(0x4206, r2, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "f69e495e4b179caf9c52da49fe70f50c32f89fbf"}, 0x15, 0x1) tkill(r2, 0xa) fcntl$setstatus(r1, 0x4, 0x42806) 08:27:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa0000014}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="100001f3140008002bbd700000000000"], 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x40) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x0, 0x0) 08:27:05 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000040)={0x8, 0x280000}) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f0000000080)) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x30929cb3, 0x6, 0x7fffffff}) recvfrom$rose(r0, &(0x7f0000000100)=""/55, 0x37, 0x2000, &(0x7f0000000140)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x1, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}}, 0x1c) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000180)={0x2, 0x5}, 0x2) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000001c0)={0x19, 0x39, 0x12, 0x3, 0xb, 0x2, 0x1, 0xae, 0xffffffffffffffff}) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x20, {0xfffffffffffffffe, 0x8, 0x6, 0x26685aa5, 0x3ff, 0xfdce}, 0x3, 0x2f}, 0xe) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000240)) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000280)) sendto$rose(r0, &(0x7f00000002c0)="eda2c55c51470c0a84bd9f3d0ad6f9272058ae39903c783fbbcf4139660bd47d642688c23b1d6bda46da77393e4c3baf82eb14a927d0ad998dde688fa9247cb3395731f0b31ca9f573e6d26ff095", 0x4e, 0x20000010, &(0x7f0000000340)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @default}, 0x1c) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000380)=""/4096, &(0x7f0000001380)=0x1000) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000013c0)={0x0, 0x5, 0x80000000, 0x0, 0x10000, 0x8}, &(0x7f0000001400)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001480)={r1, 0x2c, &(0x7f0000001440)=[@in6={0xa, 0x4e23, 0x0, @ipv4={[], [], @empty}, 0x966}, @in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0xb}}]}, &(0x7f00000014c0)=0x10) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001500)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000001540)) mount$9p_xen(&(0x7f0000001580)='/selinux/avc/hash_stats\x00', &(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)='9p\x00', 0x1208803, &(0x7f0000001640)={'trans=xen,', {[{@cache_fscache='cache=fscache'}, {@access_user='access=user'}, {@privport='privport'}], [{@subj_user={'subj_user'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@subj_type={'subj_type', 0x3d, '/selinux/avc/hash_stats\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7ff}}, {@obj_role={'obj_role', 0x3d, '/selinux/avc/hash_stats\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'self)]eth1{'}}, {@measure='measure'}]}}) write$FUSE_OPEN(r0, &(0x7f0000001740)={0x20, 0x0, 0x5, {0x0, 0x4}}, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001780)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000001880)=0xe8) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000018c0)={0x0, 0x1000, 0x8655, 'queue1\x00', 0x9}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002a40)={r0, 0x10, &(0x7f0000002a00)={&(0x7f0000001a00)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002ac0)={r0, 0x10, &(0x7f0000002a80)={&(0x7f0000001980)=""/127, 0x7f, r3}}, 0x10) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000002b00)={0xf929, 0x3, @value=0x1}) write$P9_RRENAMEAT(r0, &(0x7f0000002b40)={0x7, 0x4b, 0x1}, 0x7) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000002b80)={0xe593, 0x16, 0x0, 0x800, 0x9f}) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000002bc0)={0x0, 0x0, @ioapic}) socket$inet6_dccp(0xa, 0x6, 0x0) write$P9_RWSTAT(r0, &(0x7f0000002cc0)={0x7, 0x7f, 0x2}, 0x7) 08:27:05 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000200007041dfffd946f610500020000031f00030200000800080011000400ff7e", 0x24}], 0x1}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 08:27:05 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="14742130579fb27abc77194625592789a9e885b8b471b9673f3a728cbcd365663bc5e90e715896fdfbee9035a68dc751be"]) 08:27:05 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'sit0\x00'}) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x581002, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000180)={0x7, 0x7b, 0x2}, 0x7) write$P9_RXATTRCREATE(r1, &(0x7f00000000c0)={0x7, 0x21, 0x2}, 0x7) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000001c0)=""/67) 08:27:05 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) recvfrom$inet(r0, &(0x7f0000000280)=""/18, 0x12, 0x40010120, &(0x7f00000002c0)={0x2, 0x4e24, @broadcast}, 0x10) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) [ 299.776356] Unknown ioctl 1074025831 08:27:05 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000400)) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)='\a', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz'}, &(0x7f0000000540)="3894e0aa755678642797c675ec97969c56f2bf12f6039bb83db491604e9211ccc8408e7618ea37393e03de7717926ee49759d8a25fe0ee491d33465a996e601cab82e84deffd4f43b4b8de7c4fc0f12375966fce546ed08ab352a291b7f16898f20eb89ab513fe62e97796f94ae97e59c92f1eb86a95087d0372707700c803790f74e808663977e98054589d308059a63b0534d429abbad8c75335c1bcd5f596b4ef809be3492bf40907de6a8cedbb24290c9e878204418bbe903f3ced734530", 0xc0, 0xfffffffffffffffd) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000340)={0x0, 0x0, [], @raw_data=[0xfffffffffffffffd, 0xfffffffffffffff9, 0xffff, 0x0, 0x85, 0x100, 0x1ff, 0x73, 0x9, 0x33ef, 0x200, 0x2, 0x3c91, 0xffffffff, 0x7ff, 0x100000000, 0x7, 0x1, 0x8, 0x71, 0xff, 0x101, 0xffffffffffffffff, 0x4f60, 0xbac4, 0x3, 0x0, 0x1, 0xfffffffffffff79b, 0x0, 0x100, 0x6]}) ioctl$KDENABIO(r3, 0x4b36) keyctl$dh_compute(0x17, &(0x7f0000000180)={r1, r2, r1}, &(0x7f00000000c0)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000080)={'sha384-generic\x00'}}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000000200)=0x9, 0x4) 08:27:05 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x105740, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000000c0)={0x3, 0x8, 0x7, 0x9, 0x2, 0x47}) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') 08:27:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f66696c653020406d696d655f74797065272762646576736563757269743f80687063757269747973656c696e757873656375726974795b70726f63f0656d3128200a5280085b53307ad2513c8768900a9bbc21ab15aee0bdbc857da110afeb5864fad23c5c48c123512a02d4b91f92eed25036718420e011418a507a730fd55fb69e7b38fa994dc65796d8df"], 0x91) getsockopt$bt_hci(r1, 0x0, 0x16, 0x0, &(0x7f0000000400)) [ 299.996539] ntfs: (device loop2): parse_options(): Unrecognized mount option t!0WzwF%Y'腸qg?:ref;qX5Q. 08:27:06 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40100, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) r1 = socket$inet6(0xa, 0x802, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0xb6}, 0x1c) bind$inet6(r1, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd6050a09c00081100fe8002000000000000000000000000bbfe80000000000000000000000000002a00004e2000089078"], 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) 08:27:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:06 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f0000000680)="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", 0x1b3, 0x20000000, 0x0, 0x28f) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:06 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="14742130579fb27abc77194625592789a9e885b8b471b9673f3a728cbcd365663bc5e90e715896fdfbee9035a68dc751be"]) 08:27:06 executing program 1: r0 = add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) keyctl$reject(0x13, r0, 0x2, 0x6, r0) 08:27:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000001c0)={r2}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl(r0, 0x101, &(0x7f0000000200)="468067e79201252a2a405c15fdedb5e17a5f417210a0f52def44f82083e03e24b75e4a8d7b6847309e2d88f7f16471b79280ce029b11962635e9e8873bee3d8104d76489b6d989ac25b071410ac8629c7b926640867881f9239c33b512e6e6d8ca0c8f9762ab7bf0e6cf6697b50f37f68b56b02c69aee3ec8ced309d262e5774ab6378f65ff3acfdd2a03b267ad75e590604acccbcdc52aed4f3e5df639a6acccfc92996071cb3d813b708be830315e7cf4bd5fabd968b175dbda28dd84d874d2a9cfa36f5e51433562c6276b47a52915a7e225b9505d862e4") r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r3, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$VHOST_GET_VRING_BASE(r4, 0xc008af12, &(0x7f0000000100)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') 08:27:06 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x202}}, 0x18) setxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) 08:27:06 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000004c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa8c7709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65e02b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xfffffffffffffea3, 0x1ffffffc, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:06 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x101000, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000340), &(0x7f0000000380)=0x4) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000006c0)={0x6, &(0x7f0000000640)=[{}, {}, {}, {}, {}, {}]}) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x3}, 0x1c) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000700)=""/4096) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000000c0)={0x6000, 0x0, 0x7fff, 0x0, 0xe4e}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}, {0x3}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2}}, 0xfffffffffffffcd4) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0) 08:27:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:06 executing program 1: r0 = add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="75689bcea79dcf7feee71168340608c21918c536f698a9325c7b951f4e469f9bd30577507aab34970e03dac2a3901826501f7f8c2bfeab6bf2d7effe3ac67566186afa3e14a1eb738a995ba1368b68a3581803a43a5fa4d989566de983c1ae7a6756224a892c", 0x66, 0xfffffffffffffffd) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961a41000000", 0x572, r0) prctl$PR_SET_FPEMU(0xa, 0x1) 08:27:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x7, 0x10000) getsockopt$ax25_int(r1, 0x101, 0x6, &(0x7f0000000280), &(0x7f00000002c0)=0x4) recvfrom$ax25(r1, &(0x7f00000001c0)=""/24, 0x18, 0x10000, &(0x7f0000000200)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast]}, 0x48) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffffc}]}, 0xffffffffffffffe1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) 08:27:06 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f00000000c0)="010000b8bbdca841fc8c000100001adc2034986ac26ae242fadd772e22ad192d60417ba34202c93aa6b47f292a88c8e5a736169584172ea7a753a8b0964821c74be118be2f34026313878a1ed5de5d84c91814efecb71069dc", 0x59, 0xfffffffffffffffb) 08:27:06 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:06 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000280)={0x4, 0x7fff, 0x0, 0x400}) 08:27:06 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x5, 0xc0800) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f00000001c0)) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10, 0x800) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) 08:27:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x82001, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r2, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) recvfrom$llc(r1, &(0x7f00000002c0)=""/99, 0x63, 0x40000000, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x73030, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000001c0)={0x6, 0x3ff, 0xffffffffffffff81, 'queue0\x00', 0xffff}) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000340), &(0x7f0000000380)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100), 0x13f, 0xc}}, 0x20) 08:27:06 executing program 3: lsetxattr$trusted_overlay_nlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000440)={'L-'}, 0x28, 0x1) accept$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xffff}, 0x0, 0x2000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) readv(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(0x0, 0x100) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@mcast2, @in=@remote}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r2, r1, 0x1, 0x3}, 0x10) getuid() getpeername$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x0) 08:27:06 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x101) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000040)) 08:27:06 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000980)='/dev/dmmidi#\x00', 0x3, 0x20080) lsetxattr(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)=@random={'os2.', 'vboxnet1\x00'}, &(0x7f0000000940)='em0selfem0\x00', 0xb, 0x2) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$cgroup_subtree(r0, &(0x7f0000000880)='cgroup.subtree_control\x00', 0x2, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) readv(r1, &(0x7f0000000800)=[{&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f0000000340)=""/4, 0x4}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f00000004c0)=""/113, 0x71}, {&(0x7f0000000540)=""/137, 0x89}, {&(0x7f0000000600)=""/210, 0xd2}, {&(0x7f0000000700)=""/237, 0xed}], 0x7) 08:27:07 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000280)={0xdc8e, 0x7, 0x9, 0x200, 0x1, 0x1000, 0x3334, 0x40000000000, 0x1, 0x9}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000004c0)="b55a31827a611982f0fcd94ac4d923b2acaaf10bf6d4037ebba2b7c60185a741332f4abaf96ee65608437efcdc5fff460ba291bd9fdcd18b5034558d1716b284cbaa320a62caf9f352611674443e8df1d454e2d298cbdb128db38df3411bb5876f44b023edf4edb9b40f2b689f512fb98e4c650ca2124e6d8bac5e0f6cf59a1b5d31d99ef435dd767948e0bc9e617aade9b14b302daef8b92382b7d02cdc", 0x9e, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000001700)={{0x2, @name="66c678bd527bb6a2e706c136503809a68a066d5e5ec2bf3a3074bb1efda16875"}, 0x8, 0x400, 0x80}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000580)={r1, 0x1000, 0x9b}, &(0x7f00000005c0)=ANY=[@ANYBLOB="656e633d706b63733120686173683d63727970746428736861332d3531322d67656e6572696329000000000000eeff00"/79], &(0x7f0000000640)="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", &(0x7f0000001640)="5bdb0d39a9f79f89a40dfb4cad317772ddfcdbaefdc67e38c284584390dfa8cf00bb4bf7495df3bde66551bd820978a42ccee8e9fb44e52f89a78fc0f7e2588a0b0236b740cad95507d069069a73a64ae8b25fa64dc5700ee522536040969c8ff1f1326a42318898abb0c7fdc442477a5bdc8d1d5ca544a5c10992c981b4a931b7e221faad57c6b1a73181edbe47400fa671b94746f04ffad7dca4") add_key(&(0x7f0000001740)='encrypted\x00', &(0x7f0000001780)={'syz', 0x0}, &(0x7f00000017c0)="a340719d91452051702cf654ec0f6a17ffa2c2a82340eaa6d49853f3c5ca1f3907e1c107aef8ce824b3342884da0f17d3a7ebcce086e9b40e8a7e3b5c5eda80c9f277bf3e89da6c267bbba68dfcdf71c7229801f75e912af991379dae3b1ca07bfc2c1754c12a0e627062d4e7e94acfc67497664cb15b5d70800be548810f22b0dec83ab70338fb40d30ded5ccd8fde5d1595a964eeaca519d34b9d92fa2ade743352ef684378c688329e19b7834ba0878a0bb9f4731233ca62d94014600c82dc937a3", 0xc3, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000001900)={0x0, 0x4, 0x4, 0x81200000, {0x0, 0x2710}, {0x4, 0x8, 0xffffffffffffffff, 0x0, 0x4, 0x78, "31a634d5"}, 0x81, 0x6, @planes=&(0x7f00000018c0)={0x7fffffff, 0x8, @userptr=0x4, 0x2}, 0x4}) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="9602cba169253ba68947877409db1c45d82be5a4e9a46fbdd0991af035572582d9f737148686b8c49d696acc1deafe50674d853f6dfca2124e7c8b163c6dca9ae4d7a427cf1b1c51982c111fd21fdd99f9f9998afe90f97afeaa1e7ba5ff232fcefd65e508c4"]) 08:27:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffff, 0x2000) fstat(r0, &(0x7f0000000140)) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000040)=0x4, 0x4) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xfe63, 0x0) 08:27:07 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x4c) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) fstat(r1, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000280)=ANY=[@ANYBLOB]) 08:27:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x6, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = dup3(r1, r1, 0x80000) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x190, r2, 0x402, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x44, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x876}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1c0000000000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffc01}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcca}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3b}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xecc8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3b43}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x23}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x40}, 0x80) 08:27:07 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@can, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000340)={0x0, 0xe1ee}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, 0x0, &(0x7f0000000400)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setitimer(0x0, &(0x7f0000000040)={{0x0, 0xfffffffffffffffc}, {0x4}}, 0x0) semget$private(0x0, 0x4, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000180)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r4 = dup2(r3, r3) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x222, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x44800) sendto$inet(r3, 0x0, 0x0, 0x40, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) bind$rds(r4, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0x4}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x142800) semget$private(0x0, 0x0, 0x204) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 08:27:07 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000280)={0x3000, 0x6006, 0xffffffff, 0x1, 0x8}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r1, r2) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000040)={0x5, 0x8002, 0x7fffffff, 0x9, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={r5, 0xfff}, &(0x7f0000000200)=0x8) r6 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text32={0x20, &(0x7f00000000c0)="66b8ea000f00d8eadd5484f88a00f0833600660f71d50066ba4100edb8010000000f01d90f0866b8bd008ee0b94d0200000f32360f07", 0x36}], 0xaaaaaaaaaaaabce, 0x5, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f00000002c0)=""/197) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r6, 0x89ea, &(0x7f0000000000)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast}) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:27:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'rose0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') 08:27:07 executing program 1: add_key(&(0x7f00000000c0)='rxqpc\x00\x98{\xd5\xa2\x9d\x0e\xc4^\xb9\x1c\xfc4\x88u\x7f\xe1\xff\xc6\x8b?\xd7\xe6\xdcJ\a\x9e!\xac\xa9\xb2\x00,\x18\x02\xcdH\xd3$\xb05\xe7\'N\xc3\xc9b\r\xf6f\xc0\x88\x96\x9fJ\x9f\x04\x00\xd6#\x06\xf4\xdc\xd1\x80\xd7\x15C\xbc\xd8\x96\xd9\xeb\xb8L\x10\xcf\x8e\xd2BV\xbd\xc5\xc1\x83\xecv|\xff\xf3\xa0\xcds\xe66\xf2\xf6\xc5\xe5\x9e\xec\x13\xb8O\xbc\x12_\x00\x00\x00\x00\x00\x00\x00C\xd6\x8f\xb3\xd5K\xbb\xea\xcc\xe6\xa1?\xb8\xe3\xe4\xd0z>\aE\bT\xb9t\xc7&\xb2\xd29(c\x80\x9e\x15\xd4\xa0\xbbM\\\x88\xfd\xb6\xc2<\xb6S\x1b\x86{\xa9\xfb~\xcf\xf3]\xd7\xba\xbc\x1dw\xe6\xebiZHx\xecj\x01\xec\x00\xf3\xa7\xb1\x86\xddHm\xce\xa0\x98\xee\x84[\x83Q 2\xf4\xd1\x05\xc0\xd6\x16\xb0Vj\x16G\x94_\xcf\xb2GM\xa0\xa2v\x91\xc1', 0x0, &(0x7f0000000080)="010003000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x80000029) 08:27:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") sendto$inet(r0, &(0x7f00000000c0)="58d60416602f560d63fef3328abcbf5e3ecf23b472003c897d641277bcd51a0de93384dd2fb9e70070ae6842a71577953b8d5c8128f341dec2ee777415f55ab725e489d4f7e5929081e05049c6ee9999cc6789f5c688a1d6b37aa70a5ee69c436ba5dc63b141d7eb00123923b88db702ecf6dd3168a3f245e975548f017fb8d7764cad7cd32e5261a970522151903c043cb5e7a3c00f2632bbc4213b4d84aa1f29a90410425d73", 0xa7, 0x10, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) r1 = socket$inet(0x10, 0x3, 0xfff) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x100, 0x0) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000200000a1f000007002808000800160004001200280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 08:27:07 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r1, 0x5459, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000180)=""/202) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000004c0)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000340), 0xfffffffffffffffd) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f0000000280)={0x0, "7304715e67eeb57dcb1d4f57d6a2d0a99aa9c94bf5ef87138da8699163cfbcc1", 0xa, 0x2, 0x7, 0x2, 0x7}) fstat(r2, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f0000000300)=ANY=[@ANYBLOB="5a01ea5746cd22db4c37"]) 08:27:07 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) 08:27:07 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x4) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) r2 = dup(r0) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000080)={{}, 0xffff}) ioctl$KDENABIO(r2, 0x4b36) [ 301.830481] protocol 88fb is buggy, dev hsr_slave_0 [ 301.835892] protocol 88fb is buggy, dev hsr_slave_1 08:27:07 executing program 1: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000080)="010000000058ee98b1bbdca841fc8cd97893961adc2d6041", 0x18, 0xfffffffffffffffe) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) 08:27:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) fchdir(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0xffffff35) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") 08:27:07 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000180)=""/202) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000300)={0x1, 0x4, 0x0, 0x5, '\x00', 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000003c0)="0f50aea4dda64355a66dac5a09d62fbf2ff3569364c4ac7b6aac8589edbb8d5419a3f4dcaa897709af35f22d2a26c55ce9e7f446565d43729a441a5cfbaacc4df97c56e0721fc27b8354f9eb074abb58fa864bc58df59b62e1a87f9d91fde682899c3f460592a4e83dd34676bc65fe2b3dd80004e16875aeeb946d5588fdb2524763b4b4c29f0f348cdb2d3a8abb1f957890090370313365705ed4bdf2fd80680e739c2243b0e243c306f630835f6f8dcb8bd1642a96654b1a0316ab8592e142ffb0fef4c9f1fc72bffaffa5849787af13dd42e9caff6c51e749409b6c7477", 0xdf, 0x20000000, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x0, 0x0, 0xb2) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ubi_ctrl\x00', 0x80040, 0x0) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="20da1bdbe5575d"]) 08:27:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000100)={0x2, 0x6}, 0x3) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') [ 302.166427] __ntfs_error: 10 callbacks suppressed [ 302.166466] ntfs: (device loop2): parse_options(): Unrecognized mount option W]. [ 302.425990] ------------[ cut here ]------------ [ 302.430780] WARNING: CPU: 1 PID: 16353 at fs/attr.c:213 notify_change+0xa2f/0xd10 [ 302.438386] Kernel panic - not syncing: panic_on_warn set ... [ 302.438386] [ 302.445749] CPU: 1 PID: 16353 Comm: syz-executor.3 Not tainted 4.14.125 #19 [ 302.452830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.462167] Call Trace: [ 302.464745] dump_stack+0x138/0x19c [ 302.468372] panic+0x1f2/0x426 [ 302.471557] ? add_taint.cold+0x16/0x16 [ 302.475535] ? notify_change+0xa2f/0xd10 [ 302.479579] ? __warn.cold+0x14/0x36 [ 302.483278] ? notify_change+0xa2f/0xd10 [ 302.487321] __warn.cold+0x2f/0x36 [ 302.490843] ? ist_end_non_atomic+0x10/0x10 [ 302.495146] ? notify_change+0xa2f/0xd10 [ 302.499191] report_bug+0x216/0x254 [ 302.502808] do_error_trap+0x1bb/0x310 [ 302.506706] ? math_error+0x360/0x360 [ 302.510498] ? lock_downgrade+0x6e0/0x6e0 [ 302.514650] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.519481] do_invalid_op+0x1b/0x20 [ 302.523178] invalid_op+0x1b/0x40 [ 302.526618] RIP: 0010:notify_change+0xa2f/0xd10 [ 302.531271] RSP: 0018:ffff88805fc57a60 EFLAGS: 00010216 [ 302.536620] RAX: 0000000000040000 RBX: ffff8880a4906630 RCX: ffffc9000ae5d000 [ 302.543879] RDX: 00000000000000b8 RSI: ffffffff8193a7cf RDI: ffff8880a4906710 [ 302.551133] RBP: ffff88805fc57ab0 R08: ffff8880869f4140 R09: 0000000000000000 [ 302.558381] R10: 0000000000000000 R11: ffff8880869f4140 R12: ffff88805fc57b00 [ 302.565633] R13: 0000000000004200 R14: ffff8880a4906630 R15: ffff88805fc57b70 [ 302.572896] ? notify_change+0xa2f/0xd10 [ 302.576946] file_remove_privs+0x229/0x430 [ 302.581168] ? dentry_needs_remove_privs.part.0+0x60/0x60 [ 302.586687] ? wake_up_q+0x95/0xf0 [ 302.590212] ? drop_futex_key_refs.isra.0+0x56/0xb0 [ 302.595213] ? futex_wake+0x134/0x430 [ 302.599001] __generic_file_write_iter+0x15e/0x5b0 [ 302.603918] blkdev_write_iter+0x1e8/0x3a0 [ 302.608138] ? check_disk_change+0x120/0x120 [ 302.612533] ? iov_iter_init+0xaf/0x1d0 [ 302.616492] __vfs_write+0x4a7/0x6b0 [ 302.620189] ? kernel_read+0x120/0x120 [ 302.624063] ? rw_verify_area+0xea/0x2b0 [ 302.628110] vfs_write+0x198/0x500 [ 302.631636] SyS_write+0xfd/0x230 [ 302.635071] ? SyS_read+0x230/0x230 [ 302.638680] ? do_syscall_64+0x53/0x640 [ 302.642645] ? SyS_read+0x230/0x230 [ 302.646278] do_syscall_64+0x1e8/0x640 [ 302.650169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.655016] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 302.660187] RIP: 0033:0x4592c9 [ 302.663357] RSP: 002b:00007f50b522fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 302.671046] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 302.678300] RDX: 00000000ffffff35 RSI: 0000000020000140 RDI: 0000000000000006 [ 302.685549] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 302.692836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f50b52306d4 [ 302.700091] R13: 00000000004c9183 R14: 00000000004e0118 R15: 00000000ffffffff [ 302.708542] Kernel Offset: disabled [ 302.712173] Rebooting in 86400 seconds..