[ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.230' (ECDSA) to the list of known hosts. 2020/04/22 01:18:47 fuzzer started 2020/04/22 01:18:48 dialing manager at 10.128.0.26:42867 2020/04/22 01:18:49 syscalls: 3000 2020/04/22 01:18:49 code coverage: enabled 2020/04/22 01:18:49 comparison tracing: enabled 2020/04/22 01:18:49 extra coverage: enabled 2020/04/22 01:18:49 setuid sandbox: enabled 2020/04/22 01:18:49 namespace sandbox: enabled 2020/04/22 01:18:49 Android sandbox: /sys/fs/selinux/policy does not exist 2020/04/22 01:18:49 fault injection: enabled 2020/04/22 01:18:49 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/04/22 01:18:49 net packet injection: enabled 2020/04/22 01:18:49 net device setup: enabled 2020/04/22 01:18:49 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2020/04/22 01:18:49 devlink PCI setup: PCI device 0000:00:10.0 is not available 2020/04/22 01:18:49 USB emulation: /dev/raw-gadget does not exist 01:21:00 executing program 0: openat$nvram(0xffffffffffffff9c, 0x0, 0x42, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x0, 0x0, 0xffffffff80000001, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000002180)=0xfc, 0x3c3) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x7f}, 0x1c) bind$packet(r1, &(0x7f0000000100)={0x11, 0x0, r3}, 0x14) sendto$inet6(r1, &(0x7f0000000080)="03042a015c0060004003002cfff57b016d2763bd56373780398d537500e50602591f031ee616d5c0184374a7ffe4ec55e0654786a70100935ba514d40808efa000801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000008d1843e770afd6e9ef5837dbd0000000053", 0x3287, 0x4000002, 0x0, 0x2ff) syzkaller login: [ 189.938232][ T7046] IPVS: ftp: loaded support on port[0] = 21 01:21:00 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="dc5b9910d60cbeab2784dce849bbda15", 0x10) [ 190.086789][ T7046] chnl_net:caif_netlink_parms(): no params data found [ 190.201628][ T7046] bridge0: port 1(bridge_slave_0) entered blocking state [ 190.217571][ T7046] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.237397][ T7046] device bridge_slave_0 entered promiscuous mode [ 190.258430][ T7046] bridge0: port 2(bridge_slave_1) entered blocking state [ 190.277172][ T7046] bridge0: port 2(bridge_slave_1) entered disabled state [ 190.290114][ T7046] device bridge_slave_1 entered promiscuous mode 01:21:01 executing program 2: ioctl$PPPIOCSMRRU(0xffffffffffffffff, 0x4004743b, &(0x7f0000000000)=0xf53a) r0 = socket$inet6(0xa, 0x3, 0x3c) sendto$inet6(r0, &(0x7f0000000000), 0xffa7, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x18) [ 190.325311][ T7046] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 190.344157][ T7046] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 190.386206][ T7046] team0: Port device team_slave_0 added [ 190.389190][ T7176] IPVS: ftp: loaded support on port[0] = 21 [ 190.394474][ T7046] team0: Port device team_slave_1 added [ 190.479093][ T7046] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 190.495572][ T7046] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 190.545572][ T7046] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 190.569481][ T7046] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 190.578316][ T7046] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 190.606453][ T7046] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 190.633058][ T7212] IPVS: ftp: loaded support on port[0] = 21 01:21:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e21, 0x0, @mcast1, 0x3}, 0x1c) [ 190.709416][ T7046] device hsr_slave_0 entered promiscuous mode [ 190.766138][ T7046] device hsr_slave_1 entered promiscuous mode 01:21:01 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') sendfile(r0, r1, 0x0, 0xa808) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) [ 191.027964][ T7176] chnl_net:caif_netlink_parms(): no params data found [ 191.122910][ T7338] IPVS: ftp: loaded support on port[0] = 21 [ 191.345052][ T7462] IPVS: ftp: loaded support on port[0] = 21 [ 191.358310][ T7212] chnl_net:caif_netlink_parms(): no params data found 01:21:02 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='systemem0md5sum$\x00', 0x0) r1 = memfd_create(&(0x7f0000000140)='$.6/%cpuset]\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="7f454c46020000000000000000c4b40003003e000039a594249c17d83d0000000000000000000000dfeb7bba00280593bd5d74dafc20380003000000b163bf0c0079be7a2ce3c134108fe74950f9b93a5ea0cee7257225501bb77bf723be80699ab51e67f4fee76bb7fad4231d844bc3c08f7352c53960ede02054e2418d890a676ec576e6002c7cd466eb935812a2d3e432b9ce916a7036c13c8b86314219123c233beca448dd9f82c124c794f7091e2b1023e629b0ad0ff74ed7d8102e0cbe3166973841c157945f577ea2aeba088227b92e997a01ae3efc82e30d345cbc9a14e11dd91ce716d1d19e059363ca36ea2e099cd3740210f62f32e73b897cca2b1550053d9e9edebbfcaa5e49b6e8148a4cc76efbeb16e3e6fd678792d290e73cb5ac591910db44cc7acbe3ef56f8e7b0bbfd7cdff112f906d369c82e03adc1b159b8f5b6670f26f34d544f1dea25724c7f895d2f1f1669c902e24d6169d941fbee0d1c74de251424cf0baac37166fc1ef3c64b249ddeff68200000007926172a71b7352cded84d4a4a5ed360834d5c802613a8984fdc57d9582c6ea0e632cf33194cae5fdc614766b334c5d18fa05bf41d6001550500b285dd001aa6c334380000000000003cef53baf50f21397786474a5cbf031f5082a2f80eef99cc22873091415b93a1f655497becc8aece5c7c0d8265955cf6bfae3108b232d1c5fa5c85e0bbefb5563b3d00c723b4812692f69e8faec2a1ae3b271e2e4b15b0f6ab9b1904b67862e13801c7708ea4d797a0d22f6043c013ef8707000000ec621591932769d4bbf6d56531c9ada8a8789176095db8f71ccbe2c049324a4024a0bd90410ea72ced1e631b6d85f19ef29586226969692ecf637fdaae710f44d6420d9ca76e670db7157eb39645334db2c27985f17e331210d4d72d0f4c0388216ea877878eef19b9c4279682da12ccf9c71ba39b7a98f7c75929e892b126c6fcc40176459cfb8625f9bf33b6f7ec8f8a69e65d38ab13360e800af529dc2a0ff44d92bac515bb4a7fc2afb9fb9c1989acc2d1c3367240f50fc50b460b6c24b42934a9ca929d355989f6a6eee666d55c987e40ba129fb8b8c42237e2a948a07176e81968dd902b634524e2000000bf0f5645f1348fab967a2893fafa7d39aeb3cca9623bafb4b48bcdb8bc6c5a5d2bcd6303ac2e3b825d7fea9db2dae12aebaf54f4b9c5f43c3fea13a66131ac7c500fc429f83106001080000000bfcaf752a9f532036135e5cf6b7cf00161ebee1d0fa70d541a74d0d721c58b0e1e27d0ed03d3d902ab4d2f8827bbbb386d76108ac4da3d31ef529f5fea6304f2aa7d315740984d596fcfee951843416b690000000000002e668ac3572f45cda952824cb9fb123d06a9f0591ecbace7856efd7755e4c758c1b2b71ef27d4f8e41779baf3f250b1b466d1693c183bebb3efab6680cdbca9216767c204d56f08c9509151822e9db48cde4c9a7d317ced44576e900fbe16249424b34ddad9673ceccaea8f09757b0e62bdd5e22e04f0026beb1e15d628513bcfe423aeb445615e03458dc49561a6468ee2469575293d305834467c8038b4c921cf726f95f3ad0e980c0c794ce732a02ae37a7b3751ee8fb8357cac7d2b848"], 0x3c) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = dup(r1) write$P9_RGETATTR(r2, &(0x7f0000000400)={0xa0, 0x19, 0x0, {0x0, {}, 0x15d}}, 0xa0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f00000000c0)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) [ 191.462430][ T7176] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.489245][ T7176] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.503458][ T7176] device bridge_slave_0 entered promiscuous mode [ 191.558757][ T7176] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.571637][ T7176] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.581255][ T7176] device bridge_slave_1 entered promiscuous mode [ 191.673057][ T7176] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 191.701420][ T7046] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 191.762678][ T7176] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 191.794130][ T7212] bridge0: port 1(bridge_slave_0) entered blocking state [ 191.801434][ T7212] bridge0: port 1(bridge_slave_0) entered disabled state [ 191.810100][ T7212] device bridge_slave_0 entered promiscuous mode [ 191.818576][ T7046] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 191.851074][ T7046] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 191.902916][ T7046] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 191.973418][ T7212] bridge0: port 2(bridge_slave_1) entered blocking state [ 191.980922][ T7212] bridge0: port 2(bridge_slave_1) entered disabled state [ 191.989288][ T7212] device bridge_slave_1 entered promiscuous mode [ 192.032420][ T7212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.044573][ T7212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 192.070613][ T7536] IPVS: ftp: loaded support on port[0] = 21 [ 192.088166][ T7176] team0: Port device team_slave_0 added [ 192.119439][ T7338] chnl_net:caif_netlink_parms(): no params data found [ 192.138450][ T7176] team0: Port device team_slave_1 added [ 192.179737][ T7212] team0: Port device team_slave_0 added [ 192.197742][ T7212] team0: Port device team_slave_1 added [ 192.226837][ T7176] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.233785][ T7176] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.263061][ T7176] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 192.340416][ T7176] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 192.350491][ T7176] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.379349][ T7176] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 192.416055][ T7212] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 192.423039][ T7212] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.450111][ T7212] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 192.488772][ T7212] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 192.495887][ T7212] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.522602][ T7212] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 192.569325][ T7176] device hsr_slave_0 entered promiscuous mode [ 192.626052][ T7176] device hsr_slave_1 entered promiscuous mode [ 192.685779][ T7176] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 192.693354][ T7176] Cannot create hsr debugfs directory [ 192.700842][ T7462] chnl_net:caif_netlink_parms(): no params data found [ 192.752035][ T7338] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.759224][ T7338] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.769940][ T7338] device bridge_slave_0 entered promiscuous mode [ 192.783237][ T7338] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.791973][ T7338] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.800117][ T7338] device bridge_slave_1 entered promiscuous mode [ 192.865011][ T7338] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 192.910216][ T7212] device hsr_slave_0 entered promiscuous mode [ 192.955907][ T7212] device hsr_slave_1 entered promiscuous mode [ 192.995533][ T7212] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.003086][ T7212] Cannot create hsr debugfs directory [ 193.024493][ T7338] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.162863][ T7338] team0: Port device team_slave_0 added [ 193.193488][ T7462] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.201589][ T7462] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.210346][ T7462] device bridge_slave_0 entered promiscuous mode [ 193.223294][ T7338] team0: Port device team_slave_1 added [ 193.230344][ T7536] chnl_net:caif_netlink_parms(): no params data found [ 193.264299][ T7462] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.272310][ T7462] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.283104][ T7462] device bridge_slave_1 entered promiscuous mode [ 193.366550][ T7338] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 193.373512][ T7338] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.399663][ T7338] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 193.456760][ T7338] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 193.463720][ T7338] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 193.502012][ T7338] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 193.521541][ T7462] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 193.545257][ T7046] 8021q: adding VLAN 0 to HW filter on device bond0 [ 193.570747][ T7462] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 193.588503][ T7176] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 193.649171][ T7176] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 193.688795][ T7176] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 193.789372][ T7338] device hsr_slave_0 entered promiscuous mode [ 193.846798][ T7338] device hsr_slave_1 entered promiscuous mode [ 193.895673][ T7338] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 193.903284][ T7338] Cannot create hsr debugfs directory [ 193.934691][ T7176] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 193.984065][ T7046] 8021q: adding VLAN 0 to HW filter on device team0 [ 193.995244][ T7536] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.004298][ T7536] bridge0: port 1(bridge_slave_0) entered disabled state [ 194.012789][ T7536] device bridge_slave_0 entered promiscuous mode [ 194.023413][ T7462] team0: Port device team_slave_0 added [ 194.042872][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.057699][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.101181][ T7536] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.108443][ T7536] bridge0: port 2(bridge_slave_1) entered disabled state [ 194.117519][ T7536] device bridge_slave_1 entered promiscuous mode [ 194.134024][ T7212] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 194.199776][ T7462] team0: Port device team_slave_1 added [ 194.209528][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.218719][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.227917][ T2697] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.235048][ T2697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.273152][ T7212] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 194.343993][ T7212] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 194.377797][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.389295][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.398284][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.408599][ T3278] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.415740][ T3278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.423349][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.432252][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.455506][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.464763][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.479367][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.489855][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.502164][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.511191][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.523908][ T7536] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 194.544347][ T7212] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 194.614153][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.622938][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.633271][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.643421][ T7536] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 194.653853][ T7462] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.661508][ T7462] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.688185][ T7462] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.736676][ T7462] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.743649][ T7462] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.770069][ T7462] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 194.782766][ T7046] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.854079][ T7536] team0: Port device team_slave_0 added [ 194.867113][ T7536] team0: Port device team_slave_1 added [ 194.909883][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 194.918048][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 194.938827][ T7536] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 194.946254][ T7536] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 194.972785][ T7536] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 194.989952][ T7536] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 194.996975][ T7536] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 195.023679][ T7536] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 195.089469][ T7462] device hsr_slave_0 entered promiscuous mode [ 195.136922][ T7462] device hsr_slave_1 entered promiscuous mode [ 195.215509][ T7462] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.223089][ T7462] Cannot create hsr debugfs directory [ 195.278148][ T7536] device hsr_slave_0 entered promiscuous mode [ 195.326248][ T7536] device hsr_slave_1 entered promiscuous mode [ 195.365454][ T7536] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 195.373022][ T7536] Cannot create hsr debugfs directory [ 195.381812][ T7046] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 195.448973][ T7176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.461347][ T7338] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 195.494496][ T7338] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 195.552795][ T7338] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 195.607907][ T7338] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 195.682586][ T7176] 8021q: adding VLAN 0 to HW filter on device team0 [ 195.706760][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 195.714591][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 195.767096][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 195.780031][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 195.830570][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 195.839452][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 195.848031][ T3854] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.855081][ T3854] bridge0: port 1(bridge_slave_0) entered forwarding state [ 195.862816][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 195.871828][ T3854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 195.899893][ T7046] device veth0_vlan entered promiscuous mode [ 195.937173][ T7212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 195.944219][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 195.953433][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 195.961745][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 195.970468][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 195.980080][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 195.989811][ T3855] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.996941][ T3855] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.007264][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.022842][ T7046] device veth1_vlan entered promiscuous mode [ 196.155744][ T7462] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 196.219675][ T7462] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 196.268113][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 196.276393][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 196.284359][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.293910][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.305934][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.314400][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 196.322966][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.331303][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.340994][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.352017][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.364815][ T7212] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.383211][ T7046] device veth0_macvtap entered promiscuous mode [ 196.394580][ T7462] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 196.491471][ T7046] device veth1_macvtap entered promiscuous mode [ 196.504613][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 196.513080][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.522339][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.531464][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.539999][ T3278] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.547154][ T3278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.554869][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.564340][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.573426][ T7462] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 196.634318][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 196.645134][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 196.654695][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.663784][ T3278] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.670945][ T3278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.680417][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 196.695783][ T7536] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 196.730734][ T7046] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 196.749399][ T7338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.770806][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 196.779881][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.788543][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.797720][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.807000][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 196.815448][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.825752][ T7536] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 196.896406][ T7046] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 196.913195][ T7176] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 196.928640][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 196.937978][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 196.948024][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.956947][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.967610][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.976627][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 196.984508][ T7536] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 197.066199][ T7338] 8021q: adding VLAN 0 to HW filter on device team0 [ 197.081892][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.091178][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.102382][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.111443][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.120288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.128712][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.136969][ T7536] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 197.184364][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.193813][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 197.224510][ T7212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.270471][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.279116][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.289015][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 197.296171][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 197.304550][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 197.313423][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 197.321985][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 197.329129][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 197.343585][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 197.352820][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 197.447486][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 197.458329][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 197.468707][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 197.480232][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.489933][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.549726][ T7176] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.590475][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 197.606588][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 197.614116][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 197.624533][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 197.635011][ T3852] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 197.652639][ T7212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.705686][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 197.714222][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 197.783805][ T7462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 197.793899][ T7338] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.811541][ T7338] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 197.822749][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.836028][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 197.844648][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 197.856963][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 01:21:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'bridge0\x00'}, 0x18) [ 197.915643][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.923377][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.932676][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 197.941938][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.008978][ T7462] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.056339][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.064688][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.079156][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 198.087597][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 198.112718][ T8308] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge0, syncid = 0, id = 0 [ 198.118649][ T7338] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 198.143308][ T7176] device veth0_vlan entered promiscuous mode [ 198.166187][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.176436][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.194230][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.209293][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.218168][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.225225][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.233035][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.242806][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.251713][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.258876][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state 01:21:08 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) [ 198.269711][ T7536] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.293395][ T7176] device veth1_vlan entered promiscuous mode [ 198.321301][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 198.335187][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.356150][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 198.373350][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.382462][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.401795][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 198.410337][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 198.451358][ T7212] device veth0_vlan entered promiscuous mode [ 198.469011][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 198.481935][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 198.491898][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 198.501707][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 198.518035][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 198.548873][ T7536] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.620687][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 198.628784][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 198.637460][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 198.645874][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 198.653653][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.662677][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.672022][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.681135][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.700672][ T7462] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 198.712614][ T7462] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 198.728079][ T7212] device veth1_vlan entered promiscuous mode [ 198.920379][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.933681][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.943024][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 198.952064][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 198.961154][ T2697] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.968345][ T2697] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.978083][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 199.019321][ T7176] device veth0_macvtap entered promiscuous mode [ 199.044433][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 199.054271][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 199.069634][ T2697] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.076781][ T2697] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.086718][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.095803][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.104338][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 199.120971][ T7338] device veth0_vlan entered promiscuous mode [ 199.142852][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.151136][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 199.159871][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 199.168561][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 199.187329][ T7176] device veth1_macvtap entered promiscuous mode 01:21:09 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217"], 0x0, 0x2f}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 199.226054][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.234152][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 199.247599][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 199.256318][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 199.265644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 199.274480][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 199.284210][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 199.307837][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 01:21:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, 0x0) [ 199.324993][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 199.349473][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 199.358909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 199.380657][ T7338] device veth1_vlan entered promiscuous mode [ 199.397989][ T7212] device veth0_macvtap entered promiscuous mode [ 199.427017][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 199.441264][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 199.450013][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 199.459996][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 199.469229][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 01:21:10 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, "94d6fc948d23dd4ef5de5a1b3becfbccc57f29cf276707388e7ce5ea168a6d87f29f370262abe1a6f6c618d4f0db8a6e92474cfe2ed23a94a8aec16b423396a62a99f34fd8d54cfc222a3bf76f9d58e9"}, 0xd8) [ 199.480018][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 199.490870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 199.504850][ T7536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 199.543508][ T7462] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 199.576982][ T7212] device veth1_macvtap entered promiscuous mode 01:21:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed717", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd"], 0x0, 0xa1}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 199.622672][ T7176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 199.659160][ T8342] ptrace attach of "/root/syz-executor.0"[8341] was attempted by "/root/syz-executor.0"[8342] 01:21:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x18, 0x0, 0x0) [ 199.659354][ T7176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.695785][ T7176] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 199.706950][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 199.716507][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 199.743936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 199.766408][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 199.811588][ T7176] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 199.838460][ T7176] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.863411][ T7176] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 199.872167][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 199.882888][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 199.900994][ T7212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 199.916805][ T7212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.934837][ T7212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 199.945697][ T7212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 199.959676][ T7212] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 199.973980][ T7338] device veth0_macvtap entered promiscuous mode [ 199.991093][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 199.998954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 200.006488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 200.014937][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 200.024958][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.033862][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.046171][ T7212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.046179][ T7212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.046191][ T7212] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.046217][ T7212] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.047841][ T7212] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.053708][ T7536] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 200.058578][ T7338] device veth1_macvtap entered promiscuous mode [ 200.121522][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.151936][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.164089][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.175158][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.185600][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 200.196572][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.209475][ T7338] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 200.229001][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 200.237782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 200.247009][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.256050][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.264682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 200.274540][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 200.340822][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.358705][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.374753][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.385894][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.396350][ T7338] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 200.407512][ T7338] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 200.420477][ T7338] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 200.438892][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 200.449966][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 200.455127][ T0] NOHZ: local_softirq_pending 08 [ 200.460145][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.472202][ T3855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 200.655937][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 200.672023][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready 01:21:11 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="665307a60a0556270563fb", 0xb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 200.752336][ T8365] ptrace attach of "/root/syz-executor.1"[8364] was attempted by "/root/syz-executor.1"[8365] [ 200.755543][ T7462] device veth0_vlan entered promiscuous mode [ 200.813613][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 200.824618][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 01:21:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x88880, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) io_destroy(0x0) [ 200.956156][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.964606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.994406][ T8373] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 201.098839][ T7462] device veth1_vlan entered promiscuous mode [ 201.122240][ T7536] device veth0_vlan entered promiscuous mode [ 201.135558][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 201.144131][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 201.201377][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 201.212025][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 201.253985][ T7536] device veth1_vlan entered promiscuous mode 01:21:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed7175937004e45118093d5c5da459887c364c93946741d6ebe004902a3", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d27155629e9142628c937571f1", @ANYRESOCT=0x0], 0x0, 0x108}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) [ 201.311357][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 201.321674][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 201.331794][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.348365][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.368222][ T7462] device veth0_macvtap entered promiscuous mode [ 201.405148][ T7462] device veth1_macvtap entered promiscuous mode [ 201.416978][ T8383] ptrace attach of "/root/syz-executor.0"[8381] was attempted by "/root/syz-executor.0"[8383] [ 201.441112][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.451454][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.460664][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 201.491332][ T3278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 201.516246][ T7536] device veth0_macvtap entered promiscuous mode [ 201.554608][ T7536] device veth1_macvtap entered promiscuous mode [ 201.580707][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.592155][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.603175][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.614048][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.624651][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.635560][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.649198][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.660045][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.672117][ T7462] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.686310][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 201.694529][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 201.703984][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.713358][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 201.729858][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.741504][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.752420][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.763588][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.773513][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.783993][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.793933][ T7462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 201.804964][ T7462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.819820][ T7462] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 201.834738][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.849429][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.859961][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.872238][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.882546][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.893925][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.903826][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.914354][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.924238][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 201.934745][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 201.947012][ T7536] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 201.954389][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 201.963609][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 201.981768][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 201.991204][ T2697] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 202.012773][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.023410][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.034008][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.045030][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.055637][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.067697][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.078104][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.088609][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.098572][ T7536] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 202.109389][ T7536] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 202.121341][ T7536] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 202.132506][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 202.142429][ T3853] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 01:21:13 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f00000001c0)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0xc, "b04a83706694a7d154c629f75b71a95a8f3b289271c607adb22d4d414f70cb7b1291b1150d4d3aa20d7beebc689ab001521f48dc57042f1b38e9e8af694c0d43", "d66ee438c05a45ff21d756bd900300000000000000a482ebf7a08c305bee6fd6"}) 01:21:13 executing program 5: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="ce441327e8099a539d7e71f9c04e2899b0ed861686"], 0x0, 0x15}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed717", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217"], 0x0, 0xb6}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:13 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYRES64, @ANYPTR, @ANYRESOCT, @ANYRESDEC, @ANYRES16, @ANYBLOB="838dc3bcb5516d4593d0473bfb5c1c6b60b3256f21ea83ae0e4d6db3fa06669dd1476fc1943cca9dca93b9c2e2fbe96769f85dc9300c15c8a12bc635c902edafeec9deaebef17e9e6052d1ab522f4191091105482288ba054442b513d0463b795a1712a20feaed2a99faf4bee5f366ce845be28e30a799ee664220a90bb2816227c5f0aec448841bd6501f5daf22cac68f09cb8578db", @ANYRES16, @ANYBLOB="5f014162eb1d8ea2ab8587c4bfb7b2d6cc5b573da02d51501a7af668093a863cab3bbfe87f0589c4d0a7f45849ba50b1d7a4f645337785271945fdb2c1dbf7e29ab07109b62d6ab36b3b4ce27a1b729bce4bd161058a9ebc51f9360f420b547d54ce48"], 0x0, 0x138}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/2, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed7175937004e45118093d5c5da459887c364c93946741d6ebe004902a33179f2a6ea15df7ece6203e1a4117046500245f4360139", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f", @ANYRESOCT=0x0], 0x0, 0x10d}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="872d80ddbeebaaf4b52b7ea98b3d46b06cbf0ffa6da5c4b028ec0ef8998ddb1d4dd0f0a06c950b45b7931ce9d92d225f812d000000000000000035a3ae9d9aa6da23baea953d949a27b065adf718d13d7f86945a888d5f1a64f76fadd55e6509071e532009125845e839d50500000000000000503413eb2e4cde1254b55c62d13611207ade1c478e535359774de834cb4c48dde2066448e04300428c85f711161be46ceb45838dca39a0a5b97f", @ANYPTR64], 0x0, 0xb5}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/2, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 202.643243][ T8395] ERROR: Domain ' /sbin/init /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.5 proc:/self/fd/4' not defined. [ 202.739029][ T8416] ptrace attach of "/root/syz-executor.3"[8412] was attempted by "/root/syz-executor.3"[8416] 01:21:13 executing program 3: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf5400000000000007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a56462712cb064ecd5615f3196e3359aceb768637e60bd5d2e4b5992de991371274fdff6e79fc722e25659a7c85615c1b88bc894123cfe2314e887efecdcb7381ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b7a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13000c94df1f2db24c67d4c7ba9ec035883e2791a9e9dff3e8bfc7d1be00f1a0820102b19000000000000000009095601e3a3412086dee84efd375f0645f3301f55d3b9efdfbed9b430bcf0418e100bdff1c8bcfc0c229874bc3d2418bab997c8bef9aa55841caa572ddff9220c67c9e17bee524c3dc747445763ecb0a7c2cd12bc34b0fc0271124cfb5279195f7062351edf77c71294bbfd85878726c49eb89085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f92991a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b134dfc948f6015e0389d7f34cb9c02cf517c8ed7a9b6159c1446ef1c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e078e3a638c4fdb8562eb85173720c1df1147c9f5013c82fc98604bd70cd56609a6b73943748a90002d9cf81bcb1d262845762f6b0a2840f7b25895cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250bbce4f618cad2375a34c7f15c3096f3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="87bfc8952888bb5e12ce5063996a0ae2d30c50c4040c302a26d244b1270ac7d737e0ac6aea2f030bad4d494302efb8106e50ebb5b9e60e342f0e55173aa76c5cfac51e1d31f17bf6dce775c1841dacb974da423ef7b7f6665d52552a4c494baf64c2e94edc326e739e448c546d495e7ba34a36054ac86f964a3390253bcc6f7c9f020e9e3029ecefcce58d107baee5acd342ade81199be2112100a6001", @ANYRES16=r2, @ANYBLOB="00012dbd7000fbdbdf251a000000050092000300000008009a0000"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) 01:21:13 executing program 2: socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f00000012c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) [ 202.784745][ T8423] ptrace attach of "/root/syz-executor.2"[8417] was attempted by "/root/syz-executor.2"[8423] [ 202.798944][ T8424] ptrace attach of "/root/syz-executor.5"[8421] was attempted by "/root/syz-executor.5"[8424] 01:21:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r0, 0x29, 0x15, &(0x7f0000000100), 0x0) 01:21:13 executing program 4: [ 202.945138][ C1] hrtimer: interrupt took 43343 ns 01:21:13 executing program 5: 01:21:13 executing program 5: 01:21:13 executing program 4: 01:21:13 executing program 5: 01:21:16 executing program 5: 01:21:16 executing program 4: 01:21:16 executing program 1: 01:21:16 executing program 0: 01:21:16 executing program 3: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="87bfc8952888bb5e12ce5063996a0ae2d30c50c4040c302a26d244b1270ac7d737e0ac6aea2f030bad4d494302efb8106e50ebb5b9e60e342f0e55173aa76c5cfac51e1d31f17bf6dce775c1841dacb974da423ef7b7f6665d52552a4c494baf64c2e94edc326e739e448c546d495e7ba34a36054ac86f964a3390253bcc6f7c9f020e9e3029ecefcce58d107baee5acd342ade81199be2112100a6001", @ANYRES16=r2, @ANYBLOB="00012dbd7000fbdbdf251a000000050092000300000008009a0000"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) 01:21:16 executing program 2: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="87bfc8952888bb5e12ce5063996a0ae2d30c50c4040c302a26d244b1270ac7d737e0ac6aea2f030bad4d494302efb8106e50ebb5b9e60e342f0e55173aa76c5cfac51e1d31f17bf6dce775c1841dacb974da423ef7b7f6665d52552a4c494baf64c2e94edc326e739e448c546d495e7ba34a36054ac86f964a3390253bcc6f7c9f020e9e3029ecefcce58d107baee5acd342ade81199be2112100a6001", @ANYRES16=r2, @ANYBLOB="00012dbd7000fbdbdf251a000000050092000300000008009a0000"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) 01:21:16 executing program 5: 01:21:16 executing program 4: 01:21:16 executing program 1: 01:21:16 executing program 5: 01:21:16 executing program 0: 01:21:16 executing program 3: 01:21:16 executing program 2: fspick(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000005c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000043fe0000070600000ee60000bf050000000000001f650000000000006507000002000000270700004c0000001f75000000000000bf5400000000000007040000f0fff8ffad430100000000009500000000000000050000000000000095000000000000001c0a7900009d3c2792432a4fa650c512aee994a56462712cb064ecd5615f3196e3359aceb768637e60bd5d2e4b5992de991371274fdff6e79fc722e25659a7c85615c1b88bc894123cfe2314e887efecdcb7381ef4932cb0dcebea6d90e9c1677fbefd35893d883a2c559b7a34db461b1974af360eace66cec40d92706d0bbcc5bf6fec345ae9606c3c1a348f9b395592c1018e5e4b41b13000c94df1f2db24c67d4c7ba9ec035883e2791a9e9dff3e8bfc7d1be00f1a0820102b19000000000000000009095601e3a3412086dee84efd375f0645f3301f55d3b9efdfbed9b430bcf0418e100bdff1c8bcfc0c229874bc3d2418bab997c8bef9aa55841caa572ddff9220c67c9e17bee524c3dc747445763ecb0a7c2cd12bc34b0fc0271124cfb5279195f7062351edf77c71294bbfd85878726c49eb89085967722da6cb884d1afe82f7f722e38397996271700241094d272dd8b754b2dd36d44f92991a7817450bc7921dd372e621dd447b86e7ffd1bdc198deb495cac0995ca3ef6c1affb693ae366b0f11db6ee4830db4713e5ce6cac6a27e29f171b8e9f172c3db24558d77b8bf18be45c50b3fc005fa7b134dfc948f6015e0389d7f34cb9c02cf517c8ed7a9b6159c1446ef1c2ccff2bde95aa860ed9b836d6b8fcab7663d9bd8415e6f90fdb007b8f3e078e3a638c4fdb8562eb85173720c1df1147c9f5013c82fc98604bd70cd56609a6b73943748a90002d9cf81bcb1d262845762f6b0a2840f7b25895cc3ba8bf0b5e0fc018463d03a73fa85429725545128b0e9b550a13d0dd35092250bbce4f618cad2375a34c7f15c3096f3"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="87bfc8952888bb5e12ce5063996a0ae2d30c50c4040c302a26d244b1270ac7d737e0ac6aea2f030bad4d494302efb8106e50ebb5b9e60e342f0e55173aa76c5cfac51e1d31f17bf6dce775c1841dacb974da423ef7b7f6665d52552a4c494baf64c2e94edc326e739e448c546d495e7ba34a36054ac86f964a3390253bcc6f7c9f020e9e3029ecefcce58d107baee5acd342ade81199be2112100a6001", @ANYRES16=r2, @ANYBLOB="00012dbd7000fbdbdf251a000000050092000300000008009a0000"], 0x3}, 0x1, 0x0, 0x0, 0x10}, 0x20004080) 01:21:16 executing program 4: 01:21:16 executing program 1: 01:21:16 executing program 5: 01:21:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="61c2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:16 executing program 3: 01:21:16 executing program 4: 01:21:16 executing program 5: 01:21:16 executing program 1: [ 206.244149][ T8493] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 01:21:16 executing program 2: 01:21:17 executing program 3: 01:21:17 executing program 4: 01:21:17 executing program 1: 01:21:17 executing program 5: 01:21:17 executing program 0: 01:21:17 executing program 4: 01:21:17 executing program 3: 01:21:17 executing program 5: 01:21:17 executing program 2: 01:21:17 executing program 1: 01:21:17 executing program 0: 01:21:17 executing program 4: 01:21:17 executing program 5: 01:21:17 executing program 1: 01:21:17 executing program 2: 01:21:17 executing program 3: 01:21:17 executing program 0: 01:21:17 executing program 4: 01:21:17 executing program 2: 01:21:17 executing program 5: 01:21:17 executing program 3: 01:21:17 executing program 1: 01:21:17 executing program 0: 01:21:17 executing program 4: 01:21:17 executing program 2: 01:21:17 executing program 5: 01:21:17 executing program 3: 01:21:17 executing program 1: 01:21:17 executing program 0: 01:21:17 executing program 4: 01:21:17 executing program 2: 01:21:17 executing program 5: 01:21:17 executing program 1: 01:21:17 executing program 3: 01:21:17 executing program 0: 01:21:17 executing program 5: 01:21:17 executing program 2: 01:21:17 executing program 1: 01:21:17 executing program 4: 01:21:18 executing program 3: 01:21:18 executing program 5: 01:21:18 executing program 0: 01:21:18 executing program 2: 01:21:18 executing program 1: 01:21:18 executing program 4: 01:21:18 executing program 3: 01:21:18 executing program 0: 01:21:18 executing program 5: 01:21:18 executing program 2: 01:21:18 executing program 1: 01:21:18 executing program 4: 01:21:18 executing program 3: 01:21:18 executing program 5: 01:21:18 executing program 0: 01:21:18 executing program 4: 01:21:18 executing program 2: 01:21:18 executing program 1: 01:21:18 executing program 5: 01:21:18 executing program 3: 01:21:18 executing program 0: 01:21:18 executing program 4: 01:21:18 executing program 2: 01:21:18 executing program 5: 01:21:18 executing program 1: 01:21:18 executing program 3: 01:21:18 executing program 0: 01:21:18 executing program 4: 01:21:18 executing program 2: 01:21:18 executing program 1: 01:21:18 executing program 5: 01:21:18 executing program 0: 01:21:18 executing program 4: 01:21:18 executing program 3: 01:21:18 executing program 2: 01:21:19 executing program 5: 01:21:19 executing program 0: 01:21:19 executing program 3: 01:21:19 executing program 4: 01:21:19 executing program 1: 01:21:19 executing program 2: 01:21:19 executing program 3: 01:21:19 executing program 0: 01:21:19 executing program 5: 01:21:19 executing program 4: 01:21:19 executing program 1: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000680)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6900) ftruncate(r0, 0x800) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x2) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8001) 01:21:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socket$netlink(0x10, 0x3, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_DEL(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000002c000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x43) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xc0000001, 0x0, 0x0, 0x0, 0xc294}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f00000001c0)="9534c8c716018d4b5915f8cad7b6848b74ac6f977bb86c91780e85e6bf196b5c71a857075d956fc2b041ee58e130d272cccf12c7a67a55b07037e01c3d2340c99bea83e06717da58f7b3387f6e8eae37fdc2d3dd6c02a183e907ffc11eac392b3a9b5545eb4c49702a33675bbb3e9ecd618ec6a0", 0x74}, {&(0x7f0000000240)="98df7573c29a25fbd755266bfac0f16d0318fe8435655df78c336188bbd0cc2080dc23729829da8023e6d5307a9bb70e2e408158270d33ecaeec7198c6234dc281d4832414e6b02c1d6c98f3372508874500fa2873227f192aa79d15d3d8ee9a8477144e65c7e8865528cc6dd7e9a1d6e9458ba7aca056991479137cd8f4be2584b98a6da7e429e5e7df73e252005967804de217d4cc340654dfa296ecc887ba708db2da020c4d6900166373ab80fbef1b4efc223ab0f63eb19a2c06fb5c4c67ce547432cf78851b425b9998a54ebb4afa1eed9d0420755274", 0xd9}, {&(0x7f0000001440)="86f5abf0410490f6c03e6a9263c135097dbf4ec945dbce624f80642ade4cfe30d9b5bcc48de4ba22c0d345460833b0b276eb9cea32fed1b8d931258c089c887d22a505dcef2915a4eaa22247e21778d6aee2347e121f094b680d9d62333bc691025b47e9b42786eb381f3915b9bb1fcd10f53608fc27ff2647099ee835aa4e57c8edf41be2c33eb9709be4c1dea3369ed19356fc933ec9ae7fc061535e6bd27a6ce50bd700a4800495e23fe410c0bfe82969e07eeadd572eaac5125d0a294154c2e2e932bbbeeed35d0d9955e6ff47c2cab7f8e746545a8d", 0xd8}, {&(0x7f0000000000)="98036eb92d9346f326d1ced96f5efd37500fde3ad3b70eb1ca8bf8fe9a190c5002aafaf0c579b60040f1c764fc62a612eae7a8afdfef8883", 0x38}], 0x5) 01:21:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x314, 0x0, 0x17c, 0x17c, 0x258, 0x5, 0x24c, 0x260, 0x260, 0x24c, 0x260, 0x3, 0x0, {[{{@uncond=[0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x100, 0x168, 0x52020000, {}, [@common=@unspec=@state={{0x24, 'state\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6tnl0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xe4}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x370) 01:21:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000040)='./bus\x00', 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='./file0\x00') 01:21:19 executing program 5: 01:21:19 executing program 4: [ 208.762100][ T27] audit: type=1804 audit(1587518479.417:2): pid=8613 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir809918279/syzkaller.RbA2DV/20/bus" dev="sda1" ino=15805 res=1 01:21:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000003c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x314, 0x0, 0x17c, 0x17c, 0x258, 0x5, 0x24c, 0x260, 0x260, 0x24c, 0x260, 0x3, 0x0, {[{{@uncond=[0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x100, 0x168, 0x52020000, {}, [@common=@unspec=@state={{0x24, 'state\x00'}}, @common=@unspec=@statistic={{0x38, 'statistic\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}, {{@ipv6={@mcast2, @empty, [], [], 'ip6tnl0\x00', 'veth1_to_batadv\x00'}, 0x0, 0xa4, 0xe4}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x370) 01:21:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="baa100b000eef36cba21000f20e06635000001000f22e066b9800000c00f326635001000000f30bad104ecc80080d267d9f866b9800000c00f326635000400000f300f20c06635200000000f22c067f3af", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], 0x0, 0x5211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @ioapic={0xd000}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) 01:21:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="baa100b000eef36cba21000f20e06635000001000f22e066b9800000c00f326635001000000f30bad104ecc80080d267d9f866b9800000c00f326635000400000f300f20c06635200000000f22c067f3af", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], 0x0, 0x5211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0xd4}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:21:19 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x0, 0x12, 0x0, 0x0, "b04a94a7ba544fd74ea7c866c82d3b289271c607adb22d12919ab001520248dc57042f1b38e9e8af696c0d4300000000000000e0ffffffffffffff00", "90030000ddffffbf76a403000000000000000000010000000000e4ffffff00"}) [ 208.965981][ T27] audit: type=1804 audit(1587518479.487:3): pid=8601 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir809918279/syzkaller.RbA2DV/20/bus" dev="sda1" ino=15805 res=1 01:21:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000040)='./bus\x00', 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x43, 0x0, 0x0) rename(&(0x7f0000000140)='./bus\x00', &(0x7f00000001c0)='./file0\x00') [ 209.139598][ T27] audit: type=1800 audit(1587518479.517:4): pid=8601 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=15805 res=0 01:21:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$TUNSETSNDBUF(r1, 0xb701, 0x0) 01:21:20 executing program 2: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc294}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000440)="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", 0x2a6}, {0x0}, {0x0}], 0x3) 01:21:20 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="872d80ddbeebaaf4b52b7ea98b3d46b06cbf0ffa6da5c4b028e80ef8db1d4db9f0a06c970b45b7931ce9d92d225c411e3bde3fbc92c44ef003ca69b0aed7c090a6ab2c8a6619ba90f22a0683ddb37119429b38d50660c3ffdf39be9b58484186f0f922db18d21c332eb89195917343ee80b542e87affa45f84ea55c2d409cd034b4bfc7650cd44dcd27d9636c6f3"], 0x0, 0x8e}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/2, 0x2}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="baa100b000eef36cba21000f20e06635000001000f22e066b9800000c00f326635001000000f30bad104ecc80080d267d9f866b9800000c00f326635000400000f300f20c06635200000000f22c067f3af", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], 0x0, 0x5211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0xd4}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:21:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed7175937004e45118093d5c5da459887c364c93946741d6ebe004902a3", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d27155629e9142628c937571", @ANYRESOCT=0x0], 0x0, 0x107}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:20 executing program 1: pipe(&(0x7f0000000080)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x20, 0x0) socket$inet6(0xa, 0x3, 0x40) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x7, 0xb}, 0xd8) socket(0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(0xffffffffffffffff, 0x28, 0x2, 0x0, 0xfffffffffffffe94) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="80", 0x1, 0xd4, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x8}, 0x294) close(r0) 01:21:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a2", @ANYRESOCT=0x0], 0x0, 0x51}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x1b, 0x5b, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "04a7735f77495b4fb686a76210f603306f3eeaee9410155158e6e831005816f158475562ab2716668fd674f834e062d95492f062"}, 0xac) 01:21:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000016000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="baa100b000eef36cba21000f20e06635000001000f22e066b9800000c00f326635001000000f30bad104ecc80080d267d9f866b9800000c00f326635000400000f300f20c06635200000000f22c067f3af", 0x51}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], 0x0, 0x5211}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000300)={0x0, 0x0, @pic={0x0, 0xd4}}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:21:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d27155629e9142628c93", @ANYRESOCT=0x0], 0x0, 0x63}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:21 executing program 2: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc294}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000440)="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", 0x2a6}, {0x0}, {0x0}], 0x3) 01:21:21 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:21 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000cacbf0b9c4b88449c3a92604259bd23f92f7071a463143fb42c20e017feec42107f2e6ddbe1150296c6a6db4afa7c81b2636b1c5fbc57275c2ec"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141433e000000162079f4b4d2f87e5feca6aab840413f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) 01:21:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc46", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d27155629e9142628c93", @ANYRESOCT=0x0], 0x0, 0xb4}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:21 executing program 5: r0 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_notify(r0, &(0x7f0000000380)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4800, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x40, &(0x7f0000001340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB="2c726f6f746de9073fea6f64653d30d4113b00303030303030303030303030303030303134303030302c", @ANYRESDEC=0x0, @ANYBLOB="2c5f72ec2b086792ed000000007d683972d0b2bfdb1934542c0ffaec7680fc565e3ef22cbbd72b7c083b8a11d1a8fb448cb37f5378e8693ac30a03daa5586ce1f77e95889e930a7551414427e9252d10bf0d4be3b104fd53d73480a2825a41a6f345a5777368ee81329482a766bf8f7f96c436c8074c922452b3b03e4e1a76e3c4707de61d401846c44ea95d031208605214ff99e80459356c1dc8ad6268e3faeb85e14b27e263e5c466ce87fd647590500e9b79d5fd5e2299a2", @ANYRESDEC=0x0, @ANYBLOB=',max_vead=2x00000000000003ff,allow_other,default_permissi', @ANYRESDEC, @ANYBLOB="2c7375626a5f757365723d272e766d6e6574302f7b5b2c736d61636b66736861743d6370757365d591af742a47504c25"]) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) r4 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000ec0)={0x5, 0x70, 0x800000000000013, 0x0, 0xfd, 0x0, 0x0, 0x200000000, 0x10244, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff, 0x1}, 0x4101, 0x0, 0x4, 0x0, 0x1000000000000, 0x200, 0xfffc}, r4, 0xd, r1, 0x734b5c9804b63483) r5 = mq_open(&(0x7f0000000000)='eth0\x00', 0x842, 0x0, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) 01:21:21 executing program 2: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x203, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000140)) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/timer\x00', 0x0, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0xffc}, 0x0, 0x0) 01:21:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d2", @ANYRESOCT=0x0], 0x0, 0x5a}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:22 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x400000000000076, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/keycreate\x00') preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 01:21:23 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 01:21:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x2400400c, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) ftruncate(r2, 0x7e) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) getgid() lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0xffffffffffffff76, 0x0) fstat(0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) stat(0x0, 0x0) gettid() getpgid(0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) sendfile(r1, r2, &(0x7f00000000c0)=0x7, 0x8000fffffff8) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/153, 0x2aa}], 0x1000000000000018, 0x9) 01:21:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x8000}, 0x4) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000ff0ffc)=0x8000000000004, 0x9c) sendto$inet(r1, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) [ 213.200159][ T8786] IPv4: Oversized IP packet from 127.0.0.1 [ 213.206888][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 213.230298][ T8788] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 213.318877][ T8791] IPv4: Oversized IP packet from 127.0.0.1 [ 213.325005][ C0] IPv4: Oversized IP packet from 127.0.0.1 01:21:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d27155629e9142628c93", @ANYRESOCT=0x0], 0x0, 0x63}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed7175937004e", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a970253d2", @ANYRESOCT=0x0], 0x0, 0xe5}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="2a0b340100fd2afb7eab402528195a19cbc302fea6f7ce52112642f477ae2afc4c02a4919b909c80a6cf9500088282e7c51703e5ee745bfbfc954873f1368be66741358fb46adde4573c16896da377dc4680033ac68e06aca581252123510610e86003af40927d0995216d4ffff8c9ddd0145a45799a3b717a29e0ff98dbd56624af5ed8fed7175937004e45118093d5c5da459887c364c93946741d6ebe004902a3", @ANYBLOB="c329eb96bdb0c7956f0798ae665582babdef20dd32fd7d58c131f3f13774a3a547555f997b5c40ecd7c217cfabbba2b0906f796e81a254ee1f966a9702", @ANYRESOCT=0x0], 0x0, 0xfa}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:21:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x1b0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000040), 0x0) 01:21:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rt_sigaction(0x0, 0x0, 0x0, 0x0, 0x0) 01:21:24 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x53) 01:21:25 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x615, 0x0) ftruncate(r0, 0x0) 01:21:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x60, &(0x7f00000002c0)="f71559c80aa4cefd3b79e76a039acbd61c34f13ff7703cc78e407be5f35c0009eb2b5c9a61aabdaecf71e3a142a33caa6d0e35475ace78a33eb2b7fc54c930ef9bd691505f5467b51fe7fb5b2a250df97c682ef2210fed2ff61d959e82a01377"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sync_file_range(r0, 0x0, 0xffff, 0x0) 01:21:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:25 executing program 2: r0 = getuid() r1 = getuid() setreuid(0xee00, r1) setreuid(r1, r0) setreuid(0xee00, r0) r2 = semget$private(0x0, 0x4, 0x0) semop(r2, &(0x7f0000001100)=[{0x0, 0x8001, 0x800}], 0x1) semctl$GETALL(r2, 0x0, 0x6, &(0x7f0000000180)=""/147) semctl$SETALL(r2, 0x0, 0x9, &(0x7f0000000040)=[0x57, 0x4f]) setreuid(r0, 0x0) getuid() 01:21:27 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cgroup\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x3da, 0x0) 01:21:27 executing program 5: shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ff3000/0x1000)=nil) 01:21:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2f}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) 01:21:27 executing program 0: syz_emit_ethernet(0xe, &(0x7f0000000000)={@link_local, @remote, @void, {@generic={0x88ca}}}, 0x0) 01:21:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:27 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1}, "f95cac10afde3dc5"}}}}, 0x0) 01:21:27 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_DUMPABLE(0x3) 01:21:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 01:21:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) 01:21:28 executing program 0: creat(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000480)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000000)='./file0\x00', 0x0, 0x1081046, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2a8486e, &(0x7f00000000c0)={[{@nouser_xattr='nouser_xattr'}, {@data_ordered='data=ordered'}]}) 01:21:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)) 01:21:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x60, &(0x7f00000002c0)="f71559c80aa4cefd3b79e76a039acbd61c34f13ff7703cc78e407be5f35c0009eb2b5c9a61aabdaecf71e3a142a33caa6d0e35475ace78a33eb2b7fc54c930ef9bd691505f5467b51fe7fb5b2a250df97c682ef2210fed2ff61d959e82a01377"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x13, &(0x7f00000002c0)="f71559c80aa4cefd3b79e76a039acbd61c34f1"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$int_in(r0, 0x5421, 0x0) 01:21:28 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000980)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a47000", 0x8, 0x3a, 0x0, @dev, @mcast2, {[], @echo_request}}}}}, 0x0) 01:21:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 218.000297][ T8923] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 218.000297][ T8923] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 218.000297][ T8923] 01:21:28 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000000)={@link_local, @local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x1}}}}}, 0x0) [ 218.059275][ T8923] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 218.091850][ T8923] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr,data=ordered, 01:21:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xb9, &(0x7f00000002c0)="f71559c80aa4cefd3b79e76a039acbd61c34f13ff7703cc78e407be5f35c0009eb2b5c9a61aabdaecf71e3a142a33caa6d0e35475ace78a33eb2b7fc54c930ef9bd691505f5467b51fe7fb5b2a250df97c682ef2210fed2ff61d959e82a01377b51eedaa1a51148ef7222fa7ee7ec1ebb337e141c5d953e89d92c905dc8db4e2e54083dd47e5e5b04d16f43d01d157c08de6aa9e88dedc6f4ce7498b010000001228fe539f954a492489e3f5b47f52f7518b384d514582a666"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 218.184009][ T8948] EXT4-fs (sda1): Mount option "nouser_xattr" will be removed by 3.5 [ 218.184009][ T8948] Contact linux-ext4@vger.kernel.org if you think we should keep it. [ 218.184009][ T8948] 01:21:28 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda0602", 0x11}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 01:21:28 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) read(r0, &(0x7f0000000280)=""/229, 0xe5) [ 218.305613][ T8948] EXT4-fs (sda1): Remounting file system with no journal so ignoring journalled data option [ 218.334892][ T8948] EXT4-fs (sda1): re-mounted. Opts: nouser_xattr,data=ordered, 01:21:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 218.362591][ T8961] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.4'. [ 218.613718][ T8974] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 218.631777][ T8974] FAT-fs (loop0): Filesystem has been set read-only 01:21:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 219.008026][ T8983] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 219.023094][ T8983] FAT-fs (loop0): Filesystem has been set read-only 01:21:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/1, 0x1}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xb9, &(0x7f00000002c0)="f71559c80aa4cefd3b79e76a039acbd61c34f13ff7703cc78e407be5f35c0009eb2b5c9a61aabdaecf71e3a142a33caa6d0e35475ace78a33eb2b7fc54c930ef9bd691505f5467b51fe7fb5b2a250df97c682ef2210fed2ff61d959e82a01377b51eedaa1a51148ef7222fa7ee7ec1ebb337e141c5d953e89d92c905dc8db4e2e54083dd47e5e5b04d16f43d01d157c08de6aa9e88dedc6f4ce7498b010000001228fe539f954a492489e3f5b47f52f7518b384d514582a666"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 01:21:31 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 01:21:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:31 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x600006d4, 0x0}}], 0x210, 0x0, 0x0) 01:21:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'veth1_to_team\x00', {0x2, 0x0, @broadcast}}) r1 = socket$unix(0x1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 220.896727][ T8996] attempt to access beyond end of device [ 220.918573][ T8996] loop0: rw=2049, want=78, limit=75 [ 220.938715][ T8996] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 220.960810][ T8996] attempt to access beyond end of device [ 220.968847][ T8996] loop0: rw=2049, want=79, limit=75 [ 220.975313][ T8996] Buffer I/O error on dev loop0, logical block 78, lost async page write [ 220.985552][ T8996] attempt to access beyond end of device [ 220.991613][ T8996] loop0: rw=2049, want=80, limit=75 [ 220.999645][ T8996] Buffer I/O error on dev loop0, logical block 79, lost async page write [ 221.009872][ T8996] attempt to access beyond end of device [ 221.016764][ T8996] loop0: rw=2049, want=81, limit=75 [ 221.022683][ T8996] Buffer I/O error on dev loop0, logical block 80, lost async page write [ 221.033917][ T9009] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 221.063441][ T9009] FAT-fs (loop0): Filesystem has been set read-only 01:21:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:31 executing program 1: r0 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c27bc33760036e42a7fb4aed12f060000000000000025d86800278dcff47d010000805acf4f8f36460234432479aed75d492b610a9825728b22befafc415bcee00a07dc", 0x4a}], 0x4, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 01:21:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r2, r3, 0x80000) 01:21:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:31 executing program 1: [ 221.284612][ T9023] ptrace attach of "/root/syz-executor.1"[9021] was attempted by "/root/syz-executor.1"[9023] 01:21:32 executing program 2: [ 221.492676][ T9030] attempt to access beyond end of device [ 221.498575][ T9030] loop0: rw=2049, want=78, limit=75 [ 221.505400][ T9030] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 221.513875][ T9030] attempt to access beyond end of device [ 221.520846][ T9030] loop0: rw=2049, want=79, limit=75 [ 221.527088][ T9030] Buffer I/O error on dev loop0, logical block 78, lost async page write [ 221.537086][ T9030] attempt to access beyond end of device [ 221.542735][ T9030] loop0: rw=2049, want=80, limit=75 [ 221.549253][ T9030] Buffer I/O error on dev loop0, logical block 79, lost async page write [ 221.558719][ T9030] attempt to access beyond end of device [ 221.566194][ T9030] loop0: rw=2049, want=81, limit=75 [ 221.571417][ T9030] Buffer I/O error on dev loop0, logical block 80, lost async page write [ 221.597220][ T9043] FAT-fs (loop0): error, fat_free_clusters: deleting FAT entry beyond EOF [ 221.639070][ T9043] FAT-fs (loop0): Filesystem has been set read-only 01:21:34 executing program 5: 01:21:34 executing program 1: 01:21:34 executing program 2: 01:21:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:34 executing program 4: 01:21:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:34 executing program 1: 01:21:34 executing program 5: 01:21:34 executing program 2: 01:21:34 executing program 4: 01:21:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:34 executing program 1: 01:21:34 executing program 2: 01:21:34 executing program 4: 01:21:34 executing program 5: 01:21:34 executing program 1: 01:21:34 executing program 2: 01:21:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:34 executing program 4: 01:21:34 executing program 5: 01:21:34 executing program 1: 01:21:34 executing program 2: 01:21:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:35 executing program 5: 01:21:35 executing program 4: 01:21:35 executing program 1: 01:21:35 executing program 2: 01:21:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:35 executing program 4: 01:21:35 executing program 2: 01:21:35 executing program 1: 01:21:35 executing program 5: 01:21:35 executing program 1: 01:21:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:35 executing program 4: 01:21:35 executing program 2: 01:21:35 executing program 5: 01:21:35 executing program 1: 01:21:35 executing program 1: 01:21:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:36 executing program 4: 01:21:36 executing program 2: 01:21:36 executing program 5: 01:21:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:36 executing program 1: 01:21:36 executing program 5: 01:21:36 executing program 4: 01:21:36 executing program 2: 01:21:36 executing program 5: 01:21:36 executing program 1: 01:21:36 executing program 2: 01:21:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:37 executing program 5: 01:21:37 executing program 4: 01:21:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:37 executing program 1: 01:21:37 executing program 2: 01:21:37 executing program 1: 01:21:37 executing program 5: 01:21:37 executing program 5: 01:21:37 executing program 2: 01:21:37 executing program 4: 01:21:37 executing program 5: 01:21:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:38 executing program 4: 01:21:38 executing program 1: 01:21:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:38 executing program 2: 01:21:38 executing program 5: 01:21:38 executing program 5: 01:21:38 executing program 4: 01:21:38 executing program 2: 01:21:38 executing program 1: 01:21:38 executing program 1: 01:21:38 executing program 5: 01:21:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:39 executing program 4: 01:21:39 executing program 2: 01:21:39 executing program 1: 01:21:39 executing program 5: 01:21:39 executing program 1: 01:21:39 executing program 4: 01:21:39 executing program 2: 01:21:39 executing program 1: 01:21:39 executing program 5: 01:21:39 executing program 4: 01:21:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:40 executing program 4: 01:21:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:40 executing program 2: 01:21:40 executing program 1: 01:21:40 executing program 5: 01:21:40 executing program 5: 01:21:40 executing program 2: 01:21:40 executing program 4: 01:21:40 executing program 1: 01:21:40 executing program 4: 01:21:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:41 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:41 executing program 2: 01:21:41 executing program 5: 01:21:41 executing program 1: 01:21:41 executing program 4: 01:21:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:41 executing program 2: 01:21:41 executing program 5: 01:21:41 executing program 1: 01:21:41 executing program 4: 01:21:41 executing program 4: 01:21:41 executing program 5: 01:21:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:42 executing program 2: 01:21:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:42 executing program 1: 01:21:42 executing program 4: 01:21:42 executing program 5: 01:21:42 executing program 1: 01:21:42 executing program 2: 01:21:42 executing program 5: 01:21:42 executing program 2: 01:21:43 executing program 4: 01:21:43 executing program 2: 01:21:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:44 executing program 1: 01:21:44 executing program 5: 01:21:44 executing program 4: 01:21:44 executing program 2: 01:21:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:44 executing program 5: 01:21:44 executing program 4: 01:21:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000380)=[{}], 0x9b) 01:21:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:44 executing program 5: syz_emit_ethernet(0x86, &(0x7f0000000000)={@local, @random="a87748c4674f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0x0, "63473e660665390401030000000001016a98f31f7fda2f82e73c68537d4c6130", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a73b8268129e5fa4316a5d8c69"}}}}}}}, 0x0) 01:21:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x18, 0x0, 0x0) 01:21:44 executing program 1: openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/timer\x00', 0x2) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x101141, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_SIOCADDDLCI(r4, 0x8980, &(0x7f0000000040)={'syz_tun\x00', 0x8}) r6 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0xa0400) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000540)=""/4096, &(0x7f0000000240)=0x1000) ioctl$EVIOCGPROP(r5, 0xc004743e, &(0x7f0000000440)=""/245) ioctl$PPPIOCSFLAGS1(r3, 0x40047459, &(0x7f0000000000)=0x4040) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000140)="80fd02", 0x3}], 0x1, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2b3) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 01:21:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:44 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:44 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x5}, 0x0, 0xff, 0x2, 0x4, 0x5, 0x8}, 0x0, 0x2, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') r1 = dup(r0) write(0xffffffffffffffff, &(0x7f00000000c0)="240000004e001f00ff07f4f90023", 0xe) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0xe0002011}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000000)={0xe0002011}) r3 = epoll_create(0x6) r4 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)) epoll_wait(r3, &(0x7f0000000100), 0x0, 0x0) r5 = epoll_create(0x6) openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x1, 0x0) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_wait(r6, 0x0, 0x0, 0x205) r7 = dup2(0xffffffffffffffff, r3) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x906e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r7, 0x0) ioctl$RTC_WKALM_RD(r7, 0x80287010, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000040)={'ip6erspan0\x00', {0x2, 0x4e22, @dev}}) open(&(0x7f0000000240)='./file0\x00', 0x20201, 0x6) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r8, &(0x7f00000000c0)='./file0\x00') mkdirat(r8, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3a) r9 = open(&(0x7f0000000300)='.\x00', 0x0, 0xc1) renameat2(r9, &(0x7f0000000180)='./file0\x00', r8, &(0x7f0000000640)='./file0/file0\x00', 0x0) r10 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file0\x00', r10, &(0x7f00000000c0)='./file0\x00') 01:21:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="2d5b837066eacd6a9e2471463c5a6105696f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 01:21:44 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:44 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) socket$netlink(0x10, 0x3, 0x15) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000001c0)={0x0, 0x5, 0x4, 0x1, 0x5, {0x0, 0xea60}, {0x4, 0xc, 0xbc, 0xe1, 0x3, 0x81, "f9e9bcea"}, 0x6, 0x4, @offset=0x3, 0x800, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_FPU(r3, 0x41a0ae8d, &(0x7f00000004c0)={[], 0x34f, 0x0, 0x5, 0x0, 0x4, 0x1000, 0x1, [], 0x7}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000000c0)='dctcp\x00', 0x6) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) setgroups(0x4, &(0x7f0000000400)=[0xffffffffffffffff, 0x0, 0x0, 0x0]) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x80082, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000300)={0x2, 0x7}, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) 01:21:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 234.371428][ T27] audit: type=1804 audit(1587518505.030:5): pid=9439 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/64/bus" dev="sda1" ino=15981 res=1 01:21:45 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:45 executing program 1: socketpair(0xf, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x38, "2f71cb1931981f714210cb78ae3c6fcce736290b0192d614a05f7e21d3b68e0ab26fbe94fd6025f4c7e60786e619be8c012ccba6f6b64c98"}, &(0x7f0000000080)=0x5c) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x4802, 0x41) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x5e, "cb967536612cec148d195acf254990a8ff6337e29638ef1209ca35b19b5a2acf64d645d1f76020c5d683c20f33cc40b49d5afdad3d6eac90862b17df57e3bb85ead191c9a4efd52df621d70e80d3171b124278256d822f4abea5373b7bd2"}, &(0x7f0000000180)=0x66) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r2, 0x0, &(0x7f00000001c0)}, &(0x7f0000000240)=0x10) 01:21:45 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000280)=""/229, 0xe5) 01:21:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:45 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:45 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000280)=""/229, 0xe5) 01:21:45 executing program 1: r0 = socket(0x10, 0x803, 0x0) r1 = socket(0x10, 0x20000000802, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r2, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) write(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000500)=0xfe1e) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="5000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="000000000000fcff27001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000000080008000a007d67ddb8ef0b8dba7b897b993340a06041c072d1bc555b6e22f9e5283c5b77d46c44113eeec41d98945ae1aecc0a0a80209ec0e2403728ccf8145dba4c42c6c092485865f58ece0e48a7ad31e6", @ANYRES32=r5, @ANYBLOB="d61a66771bea23d063f596e91540606928087ae5fe3dd5c7ffdcf29ac4989ce061f0ffacaaf4686414bd"], 0x50}}, 0x0) [ 235.030803][ T27] audit: type=1804 audit(1587518505.690:6): pid=9482 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/64/bus" dev="sda1" ino=15981 res=1 01:21:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="2d5b837066eacd6a9e2471463c5a6105696f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 01:21:45 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:45 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 235.220207][ T9489] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.1'. 01:21:46 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:46 executing program 3: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000280)=""/229, 0xe5) 01:21:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 235.520997][ T27] audit: type=1804 audit(1587518506.180:7): pid=9493 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/65/bus" dev="sda1" ino=16035 res=1 01:21:46 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:46 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) 01:21:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 235.932910][ T9489] netlink: 23 bytes leftover after parsing attributes in process `syz-executor.1'. 01:21:46 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:47 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) 01:21:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="2d5b837066eacd6a9e2471463c5a6105696f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 01:21:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="2d5b837066eacd6a9e2471463c5a6105696f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 01:21:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:47 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) 01:21:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:47 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) [ 237.071525][ T27] audit: type=1804 audit(1587518507.731:8): pid=9567 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/66/bus" dev="sda1" ino=16044 res=1 01:21:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 237.318806][ T27] audit: type=1804 audit(1587518507.981:9): pid=9577 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir809918279/syzkaller.RbA2DV/66/bus" dev="sda1" ino=16046 res=1 01:21:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', 0x0, 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:49 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="2d5b837066eacd6a9e2471463c5a6105696f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 01:21:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980), 0x10a9) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x46000) lseek(r1, 0x4200, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="2d5b837066eacd6a9e2471463c5a6105696f20"], 0x4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 01:21:49 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:21:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', 0x0, 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:50 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:50 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 239.680052][ T27] audit: type=1804 audit(1587518510.341:10): pid=9638 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir809918279/syzkaller.RbA2DV/67/bus" dev="sda1" ino=15965 res=1 [ 239.710907][ T27] audit: type=1804 audit(1587518510.361:11): pid=9643 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/67/bus" dev="sda1" ino=16016 res=1 01:21:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:21:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', 0x0, 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:51 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:21:51 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0x8000000ffc00003, 0x1, &(0x7f0000000000)=[{&(0x7f00000000c0)="0400000900000000666174000404090a0200027400f801", 0x17, 0x1000000000}], 0x80420, &(0x7f00000001c0)=ANY=[@ANYBLOB="747a3dfd595554432c00ea37ed297c7ae57531394721f50fa84d44c54c5d4f5cb9dc02637946fcc3b67f625a81c5aebcb660e0115e3f5e7dcd24b95781179805343a2a5fdb22046c580734ef2397ce20b9d4fb270446e5965e977f1e89ac7ebcbf0f430f6e51ad9986286082a3069f32d67d7155e223577ce2c5ee48688c5003f6b5bfb60064ba5a"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_DESTROY(r2, &(0x7f0000000100), 0x4) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r4, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000000140)={0x7, "cf788d"}, 0x6) faccessat(r3, &(0x7f0000000080)='./file0\x00', 0x182, 0x1000) 01:21:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:21:52 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 241.644192][ T9706] FAT-fs (loop0): bogus number of reserved sectors [ 241.682078][ T9706] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:52 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:52 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:21:52 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:52 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 242.114670][ T9744] FAT-fs (loop0): bogus number of reserved sectors [ 242.153322][ T9744] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:52 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:52 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:21:53 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:53 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 242.771895][ T9773] FAT-fs (loop0): bogus number of reserved sectors 01:21:53 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:53 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180), &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={0x0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:53 executing program 4: r0 = socket(0x10, 0x80000, 0x0) write(r0, &(0x7f0000000000)="240000001e005f031400fffffffffff8070037b2b34486473fd9443adc000208000800ff", 0x24) recvmmsg(r0, &(0x7f0000005180), 0x800000000000048, 0x2266, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x22440, 0x0) sendto$ax25(r1, &(0x7f0000000080)="063cf1fd1af400716cea3329d7bea7ae58037238ad2027089d96f1fbb7083295f27ae05e0af391e6f609ff16f73f", 0x2e, 0x40, &(0x7f00000000c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default]}, 0x48) [ 242.850447][ T9773] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:53 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:21:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:53 executing program 4: r0 = socket$inet(0x2, 0x4, 0xffff) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000080)=0x1000000000002ecb, 0x4) setsockopt$inet_int(r0, 0x0, 0xc, &(0x7f0000000280)=0xfffffffe, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x2b0, 0x4) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r1, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x1, 0x820d, 0x23acfd5a, 0x8001, 0x0}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0x9}, &(0x7f0000000140)=0x8) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e24}, 0x10) recvmsg(r0, &(0x7f0000edffc8)={0x0, 0x51, 0x0, 0x0, 0x0, 0xfffffffffffffcb8}, 0x400020ff) 01:21:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_int(r5, 0x0, 0x31, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fcntl$dupfd(r2, 0x0, r1) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=ANY=[@ANYBLOB="500000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="65350600000000001c0012800b0001006970766c616e00000c00028006000100000000000a000500040000000000000008000a00", @ANYRES32, @ANYBLOB="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"], 0x50}}, 0x0) 01:21:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x0, 0x0, 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:53 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 243.303320][ T9806] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 01:21:54 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 243.394279][ T9812] FAT-fs (loop0): bogus number of reserved sectors [ 243.408550][ T9806] device ipvlan2 entered promiscuous mode [ 243.503280][ T9812] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:54 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x0, 0x0, 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000014}, [@ldst={0x5, 0x3, 0x3, 0x0, 0x1801, 0x10, 0xfffffffffffffff0}]}, &(0x7f0000000200)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) 01:21:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 243.967814][ T9836] FAT-fs (loop0): bogus number of reserved sectors [ 244.044831][ T9836] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:55 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:55 executing program 1: sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000000000000000000001a0000000400cc0400000000000000000400c200"], 0x24}}, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x200140) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000101308006d5ebe5a0000ffff53ef", 0x3a, 0x100000000}, {&(0x7f00000001c0)="fa24a6793cc6a4f20000000000003dea83b3bd4fbf4ff4ef54d1f125e81bb583e0c559cb2cf59326752406ec70bb4372fe7d3bd1e58d6feed42f24ed3e30a25aa9cf4e371410a4975f3d0724f058d50f1ec0c45066a6bb1f5e087da7e0ed2a778f96de5badeaa4eabeb08f51a62bd5a29d6e4fe4aa3439b4f3dbae426816d42f0c76f16db897d8bf6f6882f56d79542ff968ee0400"/162, 0xa2, 0x2}], 0x4801, 0x0) 01:21:55 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:21:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x0, 0x0, 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:55 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) [ 244.821821][ T9870] FAT-fs (loop0): bogus number of reserved sectors 01:21:55 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 244.856258][ T9870] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0x35}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r1, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r2, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}]}, 0x20}}, 0x20000000) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x11}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x11}, 0x10) [ 245.005463][ T9876] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 01:21:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="380000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000003000080740014abe000000200"/32], 0x38}}, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x7d, &(0x7f0000000000)={r5}, 0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000180)={r5, 0xe6, "005204a425d73ad81905a9173ca1c17eb0d8d7fa5ad42210fdde8b6e401fe5d09997f6ad3719db832e5316ffaf13dbbd4b129093ede20dfb6befb04c3ffbd5053452908261a3d808a6b64e0d7028ce89b26c7c6075dccc5661221cc3c055480d1bc096b02c77ec691b440c6f3492da7104d991f92309a9dcee0363cf7f320cf33f5460e855d7b1c75a816ab6a75d0f9d6f8620c230b0b7f4704404d7760fa3c9288d43d8e9167bca977e7d66a7db6c7ab7bb2ed33be6ee14a50c80df89f9a89b8dc575130d02dd96721b552a2cf2a640b73bdb0d75b369c5a9d91eb1ffba2285d84c69008fe9"}, &(0x7f0000000000)=0xee) 01:21:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x0, &(0x7f00000003c0), 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:55 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r1, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:21:56 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 245.395413][ T9905] FAT-fs (loop0): bogus number of reserved sectors [ 245.417722][ T9908] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. [ 245.480425][ T9905] FAT-fs (loop0): Can't find a valid FAT filesystem [ 245.536164][ T9908] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:21:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:56 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r3}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) r4 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='nodev/selinuxusersecurity#\x00', r3) keyctl$set_timeout(0xf, r4, 0xfffffffffffffffb) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x14}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 01:21:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x0, &(0x7f00000003c0), 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x278c, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x3) ioctl$FBIOPAN_DISPLAY(0xffffffffffffffff, 0x541b, &(0x7f0000000380)={0x0, 0x384, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x3}) delete_module(&(0x7f00000002c0)='/dev/btrfs-control\x00', 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x52000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e24, 0x8000, @private1={0xfc, 0x1, [], 0x1}}, @in6={0xa, 0x4e23, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x6}, @in6={0xa, 0x4e21, 0x9, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xb5}], 0x64) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000028591e45000000ff010000000000000000000000000001e0d86659a4e87d507e0000000000000000002000000000000a00000000000000f7b44788fdafbada55892ed4e6b97f25b2ec3c85259389abac2730ac21768e40e3929eb6c71745156f71367852", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000051000000000000000000000000000000000000000000c6173a7c361ea7440000000000000000000000000000f4ffffff000000000000000000000000000000000000000000000000e300000000000000001f0000003f00000000006a6d9900002bb19d7e1f24d2096741577992d461d9c4705841d37d304b5a2633a7a9d0fbe6c63281e7757b382b81535bc95db82e6664ab7567d22c08dbf5430fe91fed5d1f1953e1815313630eb9223275afca804ca91c054c398aac1630d5bcb1d072413b224b43a04f19f3a2f8f29d9ed3c2ac561a5f3bff7f000000000000"], 0xb8}, 0x1, 0xfffff000}, 0x0) [ 245.967101][ T9930] FAT-fs (loop0): bogus number of reserved sectors 01:21:56 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x1000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ce0100001aa0d41f21a318a58dcdbad6e14968d6aea4dadc99c706d41f27ccd86f69c6a56fd3c4a2beadf0a5a3ff5861fd1d6573500a8d768be0fb132b9706b0048a7ae783d801cf64201a1ce5007322519528ab52f9319e85c88213bd6252b295dad4f86f85b0859a2785a225291d1900312da603cafddc3859a65e2162d8b974823768e46b829df44c0e370374f47348b1680db8099f4c4c60f67439", @ANYRES16=0x0, @ANYBLOB="010300000000000000000e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) getpeername$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80000000}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20801}, 0x4004000) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f00000003c0)=""/4096) open(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40010) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sync() [ 246.019533][ T9930] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x0, &(0x7f00000003c0), 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:56 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:56 executing program 4: sendmmsg$alg(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0, 0x0, &(0x7f0000003a80)=[{&(0x7f0000000700)="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", 0xb80}], 0x1}], 0x1, 0x0) r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000001ac0)=[&(0x7f0000000e40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001040)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001280)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a']) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x3ff, 0x8}]}, 0xc, 0x6) 01:21:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 246.398388][ T9957] FAT-fs (loop0): bogus number of reserved sectors [ 246.437286][ T9957] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PIO_FONT(r5, 0x4b61, &(0x7f0000000440)="790da9b98ab5bd2a319b4407319d3aae303d9b4b1f807e7c22053283727162351333d6334618973b2879a11e448cbddce5c30aacd91137355829ae86b2780eeeb3fb3566a87a9e6018705c513dc01450ef148cd380e32da909cfba0b9e742b0037655cbc9920f1fde8b5321a4f17c7bbbe6a5e31e4cbbc81d051429f16066d83434e8fd787b3e2724af16c27c7efa93968b40773b9bb1635da564a0cbdd01e650b71e793d774dace6f") r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x14, r6, 0x1, 0x0, 0x0, {0x2a}}, 0x14}, 0x1, 0x60}, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0xa4, r6, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x6, 0x4, 0x1}}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4}, 0x20004084) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160555]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{0x0}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 246.922481][ T9989] FAT-fs (loop0): bogus number of reserved sectors 01:21:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 247.015491][ T9989] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:58 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x1000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="ce0100001aa0d41f21a318a58dcdbad6e14968d6aea4dadc99c706d41f27ccd86f69c6a56fd3c4a2beadf0a5a3ff5861fd1d6573500a8d768be0fb132b9706b0048a7ae783d801cf64201a1ce5007322519528ab52f9319e85c88213bd6252b295dad4f86f85b0859a2785a225291d1900312da603cafddc3859a65e2162d8b974823768e46b829df44c0e370374f47348b1680db8099f4c4c60f67439", @ANYRES16=0x0, @ANYBLOB="010300000000000000000e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) getpeername$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80000000}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x20801}, 0x4004000) ioctl$EVIOCGID(r5, 0x80084502, &(0x7f00000003c0)=""/4096) open(0x0, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40010) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) sync() 01:21:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{0x0}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000001840)=ANY=[@ANYRESOCT, @ANYRES64, @ANYPTR, @ANYBLOB="07d219d01e35d69ec43746097b288b25f43b7999b264b6350eae5d39b122afe382d6b1833466740dc69869bd3216d66075f876bab64e1a97de7a13db984c0b52640bacf29ac83fa4a23b5232ac2964f206444ef706e6fd3e2872d79eb4d2e17022ddbe725ef1b31a07e5f06fd51215984528ae6a3ac77117f7acbdf9c23a7bab6115b5b962832951e96491404126620ce6fd418057f6d85aed3e5de3010eb32bb8750f080000002744634fd5027171774f66fe70f2a0e7a10cf8a44916dcb5144aeb09612cabf42b01c92ff33b24b53939d495c5011f5e9bd6f370f8d779df87", @ANYBLOB="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"], 0x792) truncate(&(0x7f00000000c0)='./bus\x00', 0x6) sendfile(r1, r1, &(0x7f0000000080), 0x8080fffffffe) 01:21:58 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:58 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) [ 247.589106][T10033] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 247.598598][T10033] FAT-fs (loop4): Filesystem has been set read-only [ 247.606978][T10033] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17) [ 247.618287][T10036] FAT-fs (loop0): bogus number of reserved sectors 01:21:58 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000440)='-vboxnet0\x00]\xea\xb0c\xb9\xee\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U,\xee\x06\x92\x1d\xbd\a\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x1d3\x15\b\xcb\xf7\xef\x00'/203, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r2, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14, r4, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r4, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x3}}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x48000) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0xdb1) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdea) close(r0) 01:21:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 247.663641][T10036] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{0x0}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 247.906630][T10058] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 247.963338][T10061] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 01:21:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 248.151962][T10072] FAT-fs (loop0): bogus number of reserved sectors [ 248.167886][T10072] FAT-fs (loop0): Can't find a valid FAT filesystem 01:21:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:59 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:59 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:21:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:21:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:21:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x44042, 0x0) ftruncate(r1, 0x2008002) sendfile(r0, r1, 0x0, 0x200fff) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r4, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x1c, r2, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000800) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x14, r6, 0x405, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r6, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x301}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="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"/279], 0x44}, 0x1, 0x0, 0x0, 0x10006095}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x60, r2, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x28}}]}, 0x60}, 0x1, 0x0, 0x0, 0x24000885}, 0xc4) [ 248.854648][T10105] FAT-fs (loop0): bogus number of reserved sectors [ 248.865621][T10105] FAT-fs (loop0): Can't find a valid FAT filesystem [ 248.931142][ T27] audit: type=1800 audit(1587518519.592:12): pid=10111 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16141 res=0 01:21:59 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) [ 249.070842][T10123] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 01:21:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:21:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 249.251505][ T27] audit: type=1800 audit(1587518519.912:13): pid=10123 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="bus" dev="sda1" ino=16141 res=0 [ 249.717732][T10136] FAT-fs (loop0): bogus number of reserved sectors [ 249.799770][T10136] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:00 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x808c0, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000140)=0x4) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x5c, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) dup(0xffffffffffffffff) mount(0x0, 0x0, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x40a02, 0x0) 01:22:00 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:00 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:00 executing program 1: clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RATTACH(r1, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x80, 0x2, 0x2}}, 0x14) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x170, r4, 0x1}, 0x3f0}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x1c95f82e}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000012}, 0x4000884) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x420) 01:22:00 executing program 1: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) socket(0x26, 0x5, 0x40) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x0, &(0x7f0000000100)}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003700)={0x77359400}) sendmsg(0xffffffffffffffff, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$netlink(0x10, 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x5}) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r2, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfecb, 0x20c49a, 0x0, 0x27) [ 250.204930][T10155] FAT-fs (loop0): bogus number of reserved sectors [ 250.240977][T10155] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:01 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:01 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x77, 0x40001) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) socket(0x10, 0x0, 0x0) r1 = socket(0x11, 0x800000003, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x7d, &(0x7f0000000000)={r6}, 0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={r6, @in={{0x2, 0x4e24, @multicast2}}, 0xfbff, 0x5}, 0x90) [ 250.634494][T10192] FAT-fs (loop0): bogus number of reserved sectors 01:22:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGPKT(r5, 0x80045438, &(0x7f0000000000)) ioctl$UI_DEV_CREATE(r0, 0x5501) 01:22:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 250.676691][T10192] FAT-fs (loop0): Can't find a valid FAT filesystem [ 250.821364][T10208] input: syz1 as /devices/virtual/input/input7 [ 250.827997][T10208] input: failed to attach handler leds to device input7, error: -6 [ 250.921987][T10217] input: syz1 as /devices/virtual/input/input8 [ 250.963859][T10217] input: failed to attach handler leds to device input8, error: -6 01:22:01 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:01 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46802) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) r2 = open(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x12, r2, 0x0) ftruncate(0xffffffffffffffff, 0x48280) r3 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x7d, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000200)={r6, @in6={{0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}}, 0xfff, 0x7}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={r7, 0x214b2372}, 0x8) write$binfmt_elf64(r3, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x8, 0x1, 0xfd, 0x80, 0x3, 0x3, 0x10001, 0x39e, 0x40, 0xad, 0x80000000, 0x72, 0x38, 0x2, 0xffff, 0x2, 0x1f}, [{0x5, 0x15, 0x1, 0xffffffffffff6b77, 0xcc05, 0x8, 0xfffffffffffffff7, 0x8000}], "2061eac80320a603127e4bf3a2f7d6f2d25c07d5875461bf6e7454d3c1f4ddcca0e3d9ec9fe3e5e1a128e772008ed1a10085a93c6bf1c3c8e57cbc19697023f21610f4e0967411e743b0be2f57e6ebacc66ea9a0ce8996e06b1078a352b00bd9c629bee3891c76a4908ac71d9d29d34c83d682418b47d5819f7e6c439b51d937a9ec76d179e3c396b60ac287c7d2da72daec15ca4888b4c555aff88c70a5e7fd045d95670b76c90d0af3e099c335b239d511013db655dd8c0fd61a", [[], [], [], [], [], []]}, 0x733) open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) 01:22:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendfile(r2, r0, 0x0, 0x7fffffff) sendfile(r2, r0, 0x0, 0x200) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 251.144269][T10230] FAT-fs (loop0): bogus number of reserved sectors [ 251.176417][T10230] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:01 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:02 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:02 executing program 1: ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000002c0)={0x7, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}}) write$tun(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x366a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x1000, @remote}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 01:22:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174", 0xb}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:02 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 251.790134][T10269] FAT-fs (loop0): bogus number of reserved sectors 01:22:02 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xe) ioctl$TIOCSETD(r0, 0x541b, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x14400, 0x0) 01:22:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 251.860031][T10269] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 252.299122][T10298] FAT-fs (loop0): invalid media value (0x00) [ 252.318104][T10298] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000140)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000029000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a0900000065002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0xfffffffffffffeb4}], 0xb3e, 0x0, 0x0, 0xfffffe41) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc62]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:22:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:03 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x82, 0x24, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x6, 0x100}, 0x26, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x6, 0x3, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0xfffffffe, 0x4, 0xfffffffc}, 0x40) close(0xffffffffffffffff) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000040)) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0xff00) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f0000000280)=0xc9de) getresuid(&(0x7f0000000100), &(0x7f0000000200), 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) r3 = socket(0xa, 0x0, 0x6) connect$bt_rfcomm(r3, &(0x7f0000000000), 0xa) setuid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, 0x0) 01:22:03 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:03 executing program 4: r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, &(0x7f0000000000)={0x1, 0x10000, 0xfffeffff, 0xffff8001, 0x20, 0x0, 0x5}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r3, &(0x7f0000001a00)=ANY=[@ANYBLOB='#!'], 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r4 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r4, 0x0) fstatfs(r4, &(0x7f00000002c0)=""/235) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 252.850850][T10331] FAT-fs (loop0): invalid media value (0x00) [ 252.864935][T10331] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @rand_addr=0xdd}}, 0x24) r1 = socket(0x1e, 0x1, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) syz_mount_image$btrfs(&(0x7f0000000500)='btrfs\x00', &(0x7f0000000540)='./file0\x00', 0xcf16, 0x5, &(0x7f0000000740)=[{&(0x7f0000000580)="0a95c5132e2958996a9669e1c041a7af44db9570e7d10add4f2b98d6d630c093b49480bdadb9463ee7213ac4315cb15bd11e43275f7a59f26b17490b836de6447e91e4a1faad1a618cea500beec802031a0192dceaf0b7071b8625a9c08709701d9d1bdcd13cd6e88d8917a101", 0x6d, 0x100000001}, {&(0x7f0000000600)="05909c0e27ad2d8f682584a41b0fecce87ad8294e75166d1174674b79edd07724bd0f04b919e5735253071a32939", 0x2e}, {&(0x7f0000000640)="75a28d4719703bef1d22f77011dd69651f33c1225c1d1c72aa87b7b05e3d72575b7b8c627509d7ea8ea53a5a", 0x2c, 0x8}, {&(0x7f0000000680)="fe771c8657feffbbe845a960f1d680ebc32929641158ca4ba3ec860d590bad168f526f6d0fbcb9de339007f45922959df35dac195a7117f7bc7cd41a19a174be4eb1e3c40f595043200ec8b3e0a520ac7a25b88f315fd53af8925e4821becb1cadf9c5d13029aa7e179246f29533635e0c4fafc5b65bd31803cf7b9b5c94d8ca391feb9a4df050f095c750bf7f7606bab0b0bafd0e225ec27537f9efa1525585db57ef2c38e8e534d67366a059de46d6a017247f31b7db66d639d4690c34", 0xbe, 0x4419}, {&(0x7f0000000840)="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", 0xfc, 0xfff}], 0x100000, &(0x7f0000000940)={[{@autodefrag='autodefrag'}, {@degraded='degraded'}, {@ssd='ssd'}, {@user_subvol_rm='user_subvol_rm_allowed'}], [{@pcr={'pcr', 0x3d, 0x28}}, {@pcr={'pcr', 0x3d, 0x9}}, {@obj_user={'obj_user'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}) recvmmsg(r1, &(0x7f0000005c40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/145, 0x91}], 0x1, &(0x7f0000000280)=""/189, 0xbd}}], 0x1, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa2}}], 0x400000000000953, 0x42, 0x0) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000180)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @empty}}, 0x24) socket$inet_sctp(0x2, 0x0, 0x84) sendmmsg(r2, &(0x7f0000005c00), 0x40000000000037b, 0x0) 01:22:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002", 0x11}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:22:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 253.310813][T10363] FAT-fs (loop0): invalid media value (0x00) [ 253.345386][T10363] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:04 executing program 4: r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, &(0x7f0000000000)={0x1, 0x10000, 0xfffeffff, 0xffff8001, 0x20, 0x0, 0x5}) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) write$binfmt_script(r3, &(0x7f0000001a00)=ANY=[@ANYBLOB='#!'], 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r3) r4 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r4, 0x0) fstatfs(r4, &(0x7f00000002c0)=""/235) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 01:22:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:22:04 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="4800000010000507000000001000000000000040", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0020000000000000751dc23d8e008672391e51823799a0837eb904c9cedb383db4eff9d3f961ea48af33fb086dd809e74b05008b925b759fb97b84434f357bf55290ae2254db822b9f4b0a0256facb44521fa875669dd65b11c470252c5c3d9f4636bd897ff950e796e68a63ff88ba4600f241c913de3520493f7aa263989ac3f7d250dba5e5bc918809c9ee4a16e2703708f0dd2edb378300000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080601007166710048000229c6090046d0ed64f3c3545aaf6e000085a4e4ebb5ef670000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a010c3"], 0x74}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r5, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$NET_DM_CMD_STOP(r5, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x850) connect$can_bcm(r2, &(0x7f0000000080)={0x1d, r3}, 0x10) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xb) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@newtfilter={0x24, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x4}}}, 0x24}}, 0x0) 01:22:04 executing program 5: mknod(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 254.032507][T10405] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. [ 254.066502][T10411] FAT-fs (loop0): invalid media value (0x00) [ 254.080447][T10411] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:04 executing program 2 (fault-call:5 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:04 executing program 1: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xa1cc0a, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x90) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$security_ima(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@v1={0x2, "124d59b1"}, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_MAP_DUMB(r2, 0xc01064b3, &(0x7f0000000140)) creat(&(0x7f0000000040)='./file0/file0\x00', 0x150) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000100)={0x9, 0x5}) [ 254.134140][T10415] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.4'. 01:22:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x1}}, 0x0) fchmod(r0, 0xb1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x44001, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000080)={0x1, 0x4, 0xa8, 0x1}) [ 254.333442][T10425] FAULT_INJECTION: forcing a failure. [ 254.333442][T10425] name failslab, interval 1, probability 0, space 0, times 1 [ 254.399423][T10425] CPU: 1 PID: 10425 Comm: syz-executor.2 Not tainted 5.7.0-rc2-syzkaller #0 [ 254.408129][T10425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.418193][T10425] Call Trace: [ 254.421636][T10425] dump_stack+0x188/0x20d [ 254.426022][T10425] should_fail.cold+0x5/0xa [ 254.430542][T10425] ? fault_create_debugfs_attr+0x140/0x140 [ 254.436405][T10425] should_failslab+0x5/0xf [ 254.440863][T10425] __kmalloc+0x2d9/0x7a0 [ 254.445170][T10425] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 254.451224][T10425] ? tomoyo_realpath_from_path+0xc2/0x620 [ 254.456979][T10425] ? lock_release+0x800/0x800 [ 254.461655][T10425] ? __lock_acquire+0xcbb/0x4c50 [ 254.466606][T10425] tomoyo_realpath_from_path+0xc2/0x620 [ 254.472154][T10425] ? tomoyo_profile+0x42/0x50 [ 254.476838][T10425] tomoyo_path_number_perm+0x1c2/0x4d0 [ 254.482296][T10425] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 254.487948][T10425] ? tomoyo_execute_permission+0x470/0x470 [ 254.493789][T10425] ? __fget_files+0x30d/0x500 [ 254.498488][T10425] ? __fget_files+0x32f/0x500 [ 254.503172][T10425] ? ksys_dup3+0x3c0/0x3c0 [ 254.507628][T10425] ? __sb_end_write+0x101/0x1d0 [ 254.512482][T10425] ? vfs_write+0x161/0x5d0 [ 254.516963][T10425] security_file_ioctl+0x6c/0xb0 [ 254.521935][T10425] ksys_ioctl+0x50/0x180 [ 254.526198][T10425] __x64_sys_ioctl+0x6f/0xb0 [ 254.530804][T10425] ? lockdep_hardirqs_on+0x463/0x620 [ 254.536126][T10425] do_syscall_64+0xf6/0x7d0 [ 254.540719][T10425] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 254.546625][T10425] RIP: 0033:0x45c829 [ 254.550530][T10425] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.570143][T10425] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 254.578660][T10425] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 254.586643][T10425] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 254.594622][T10425] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 254.602595][T10425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 254.610583][T10425] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 [ 254.664253][T10434] FAT-fs (loop0): invalid media value (0x00) [ 254.701996][T10434] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:05 executing program 5: mknod(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 254.782243][T10425] ERROR: Out of memory at tomoyo_realpath_from_path. 01:22:05 executing program 2 (fault-call:5 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:05 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) r1 = dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000140)={0x5, 0x0, 0x4, 0x5, 0x3000000, 0x2000000}) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) sendmsg$OSF_MSG_ADD(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000b6}, 0xc, &(0x7f0000000280)={&(0x7f0000001200)={0x12b4, 0x0, 0x5, 0x7b3f9193a0618e42, 0x0, 0x0, {0x7, 0x0, 0x3}, [{{0x254, 0x1, {{0x3, 0xffff}, 0x81, 0x0, 0x3, 0x81, 0x4, 'syz1\x00', "1f4b96bd6b3a3740f8396c3f52facd5ae7c3eb9680785e12290a276c6ec03534", "e90ff50db60af59309055cd2bdc7b4db93ffd5230a30898b8917cb49be236dc4", [{0x4, 0x100, {0x3, 0xffffffff}}, {0xb1ff, 0x4, {0x3, 0x3}}, {0xfffe, 0x6, {0x1, 0x4}}, {0x1e, 0x0, {0x2, 0x1f}}, {0xc8cc, 0x9, {0x1, 0x80000000}}, {0x4, 0xf001, {0x2, 0x1}}, {0x1, 0x8001, {0x2, 0x800}}, {0x1ff, 0x3ff, {0x2, 0xff}}, {0x0, 0x5, {0x0, 0x6}}, {0x8, 0x1, {0x2, 0x3}}, {0x401, 0x7fff, {0x0, 0x7fff}}, {0x1ff, 0xfff, {0x2, 0x7}}, {0x0, 0x3, {0x1, 0x20}}, {0x0, 0x101, {0x1, 0x6}}, {0xfff, 0x1, {0x0, 0x144}}, {0x2f1, 0x6, {0x1, 0xb2a2}}, {0xc079, 0x0, {0x3, 0xc5}}, {0x2, 0x8, {0x0, 0x5}}, {0x6, 0x3, {0x2, 0x7ff}}, {0x4, 0x2, {0x1}}, {0x1000, 0x8, {0x2}}, {0x3, 0x0, {0x3, 0x4}}, {0xb8, 0x800, {0x0, 0xec}}, {0x5, 0x2, {0x0, 0x40}}, {0x1ff, 0xfd81, {0x2}}, {0xfffd, 0xb36, {0x1, 0x40}}, {0x7f, 0x401, {0x0, 0x6}}, {0x4, 0x4, {0x2, 0x1}}, {0x560a, 0x8001, {0x2, 0x2181}}, {0x9, 0x8, {0x1, 0xb325}}, {0x200, 0x3, {0x0, 0xfff}}, {0x7, 0x0, {0x3, 0x7ff}}, {0x1, 0x0, {0x1, 0x1}}, {0x101, 0xfffb, {0x2, 0x6000000}}, {0x3b7d, 0x5, {0x2, 0x7fc0}}, {0x3, 0x400, {0x2, 0xea}}, {0xfff9, 0x6303, {0x1, 0x3}}, {0x3f, 0x52, {0x3}}, {0x9, 0x858}, {0x5, 0x1, {0x2, 0x8001}}]}}}, {{0x254, 0x1, {{0x1, 0x4}, 0x5, 0x81, 0x8, 0x200, 0x1c, 'syz1\x00', "bdcf5d15ed857d379cb38f843632e6f04743fbab2e2de3b417a8c1594dac9bce", "10f099884295c260fe00bd10d62383e3e7ea29b589ef04e4cf1b880602452c44", [{0x9, 0x3ff, {0x3, 0x2}}, {0x20, 0x9d7, {0x2, 0x1}}, {0x7f, 0x1, {0x3, 0x5}}, {0x13, 0xfffe, {0x1, 0x2}}, {0x4, 0x7, {0x1, 0x5}}, {0x5, 0x8, {0x1, 0x7ff}}, {0x7, 0x9, {0x3, 0x8000}}, {0x6, 0xca9f, {0x2, 0x9}}, {0x5, 0x8, {0x3, 0xffffffff}}, {0x0, 0x4, {0x1, 0x7f}}, {0x6, 0x1000, {0x3, 0x7}}, {0x0, 0x6, {0x1, 0x1}}, {0x2, 0x1, {0x1, 0x9}}, {0x3, 0x3, {0x2, 0xffffffc0}}, {0x101, 0x7f, {0x1, 0x3}}, {0xfac3, 0x9, {0x2, 0x7bad}}, {0x7cd0, 0xf0, {0x0, 0x2}}, {0x9b5a, 0x5, {0x2, 0x3}}, {0x0, 0x8, {0x1, 0x1ff}}, {0x6, 0x0, {0x0, 0x400}}, {0x9, 0x9, {0x3, 0x200}}, {0x1, 0x8, {0x1, 0x76ca}}, {0x40, 0x20, {0x3, 0xead}}, {0xff, 0xf0d, {0x0, 0x6}}, {0x0, 0x23, {0x0, 0x86c}}, {0xb0c, 0xb02d, {0x1, 0x1}}, {0x40, 0x2, {0x1, 0x9}}, {0x8, 0x7ff, {0x3, 0x1000}}, {0x6d6, 0x1, {0x1, 0xffff7018}}, {0x3f, 0x401, {0x0, 0x1}}, {0x7, 0xfffa, {0x2, 0x10000}}, {0xfff, 0x2, {0x0, 0x4}}, {0x8000, 0x7fff, {0x1, 0x5}}, {0x6, 0x6, {0x2, 0x71e}}, {0xe029, 0x7, {0x2, 0xf387}}, {0x9, 0x31ea, {0x1, 0x40000000}}, {0xfff, 0x0, {0x0, 0xff}}, {0x3, 0x9, {0x1, 0x6}}, {0x7f, 0x7, {0x1, 0x8}}, {0xabfd, 0xffff, {0x3, 0x3}}]}}}, {{0x254, 0x1, {{0x0, 0xffff}, 0x9, 0x2, 0x7, 0x7f, 0x0, 'syz1\x00', "9f37354979be18719e334e9c5a7e20a3b3d6e17f9258176a05dde280f395ba3d", "76065a5558a505d5d06317c6d58f94e6aecc11b6420c01d421a534c19d26f657", [{0x8000, 0x8, {0x3, 0x401}}, {0x3, 0x9, {0x3, 0x4}}, {0x0, 0x200, {0x0, 0x97}}, {0x1, 0xd8, {0x1, 0x6ff}}, {0x81, 0x8, {0x2, 0x8}}, {0x5da, 0x6, {0x1, 0x7}}, {0x8, 0x3, {0x0, 0x8}}, {0x5, 0x2, {0x0, 0x7fffffff}}, {0x200, 0x3, {0x3, 0x2}}, {0x7, 0x8, {0x3, 0x4}}, {0x6, 0x800, {0x0, 0x81}}, {0x4, 0xd97c, {0x0, 0x1}}, {0x7, 0x8, {0x0, 0x9}}, {0x0, 0x0, {0x1}}, {0x3, 0x8, {0x2, 0x80000000}}, {0x400, 0x2, {0x2, 0xfffffffb}}, {0x5, 0xa99, {0x2, 0x6}}, {0x1, 0x4, {0x1, 0xfffffffd}}, {0x1, 0x0, {0x1, 0xffffffff}}, {0xfffa, 0x8, {0x2}}, {0x0, 0x2ca0, {0x2, 0xfffffff9}}, {0x8, 0xfffa, {0x2, 0x9}}, {0x7, 0x8001, {0x1, 0x6}}, {0x0, 0x9, {0x1, 0x80}}, {0x20, 0x0, {0x1, 0xd67a}}, {0xff, 0xc9, {0x3, 0x80000001}}, {0x7, 0xfffc, {0x3, 0x1}}, {0x7e98, 0x1, {0x2, 0x101}}, {0x4, 0x81, {0x0, 0x80000001}}, {0x486a, 0x6, {0x2, 0x1}}, {0x7fff, 0x5, {0x2, 0x7}}, {0x2, 0x4, {0x2, 0x8001}}, {0x3, 0x68, {0x3, 0x6}}, {0x0, 0x2, {0x2, 0x4}}, {0x40, 0x101, {0x3, 0x4}}, {0x4, 0x7f, {0x3, 0x200}}, {0x5, 0x3ff, {0x3, 0x1}}, {0x9, 0x3f, {0x0, 0x1}}, {0xc0, 0x1f9, {0x1, 0x4}}, {0x9, 0x8, {0x2, 0x182}}]}}}, {{0x254, 0x1, {{0x2, 0x6}, 0xff, 0x5, 0xff00, 0x800, 0x14, 'syz1\x00', "9135e82816ee848f1b81628d53b79d67aa7bb9a2e97f4d1144966a7ed7ab05c7", "c9066b5acc05eee0c6078b69f9f90d5e648b8197c21a43d6e4bda7071a66e41a", [{0x0, 0x401, {0x1, 0x2}}, {0x9, 0xff, {0x0, 0x1}}, {0x7ff, 0xff}, {0x3, 0x4, {0x1, 0x9}}, {0x6, 0x45d, {0x2, 0x3}}, {0x101, 0x4, {0x3, 0xfff}}, {0x4, 0x9, {0x1, 0x3f}}, {0x80, 0x1, {0x1, 0x1ff}}, {0x9, 0x6, {0x3, 0x8}}, {0x3, 0x0, {0x1, 0x3}}, {0x20, 0x5, {0x3, 0x1}}, {0x5, 0x7, {0x3, 0x800}}, {0x1, 0x2, {0x2, 0x1}}, {0x7, 0x1, {0x2, 0x1e4}}, {0x0, 0x8, {0x2, 0x400}}, {0x5, 0xea, {0x0, 0x346}}, {0x0, 0x6, {0x1, 0x2f48}}, {0x5, 0x6, {0x0, 0xe}}, {0xbfc4, 0x80, {0x0, 0x1}}, {0x8, 0x7, {0x2, 0x2}}, {0xf8, 0xcf, {0x3, 0xea000000}}, {0x7f, 0x2, {0x1, 0xdc3}}, {0x1f, 0x8, {0x0, 0x6}}, {0x1, 0x5, {0x2, 0x6}}, {0xfe, 0x1f, {0x1, 0x5}}, {0x1, 0x3, {0x3, 0x35}}, {0x3, 0x0, {0x1, 0xf27}}, {0x1, 0x4, {0x0, 0x4}}, {0x2, 0x5, {0x3, 0x3}}, {0x100, 0x2, {0x1, 0x7}}, {0xfff7, 0x6, {0x0, 0xf74}}, {0x931b, 0x3, {0x1, 0x4}}, {0x1, 0x3, {0x1, 0xfffffffe}}, {0xa86a, 0x1, {0x2, 0x11a}}, {0x73, 0xc57, {0x0, 0xffff}}, {0x1, 0x6, {0x0, 0x26d}}, {0x8001, 0x4, {0x2, 0x1ff}}, {0x1, 0x7, {0x1, 0x5}}, {0x5c57, 0x9, {0x1, 0x80}}, {0x6, 0x800, {0x0, 0x4}}]}}}, {{0x254, 0x1, {{0x1, 0x12000}, 0x36, 0x3, 0xff, 0x3, 0x6, 'syz0\x00', "29439b67f59eadb13ca2555262224f2169fcafa84b39e34282c44fa238691819", "a92740aef7eb2df51ab3490220b45cf79dc622f6a0f60e7f2ccc1a5fb78d29f2", [{0x0, 0x5, {0x2, 0x8001}}, {0x3, 0x7, {0x3, 0x1b}}, {0xff, 0x14, {0x2, 0x6}}, {0xf22, 0x7, {0x0, 0x2}}, {0x81, 0x7, {0x1, 0x5}}, {0x1, 0xdefb, {0x1, 0x200}}, {0xfffd, 0x8, {0x4, 0x3ff}}, {0x101, 0x8, {0x2, 0x31}}, {0xfff, 0x8, {0x3, 0x80000000}}, {0x7ff, 0x1, {0x2, 0x1}}, {0x9, 0x3361, {0x2, 0x8}}, {0x9, 0x1, {0x2}}, {0x0, 0x111f, {0x1, 0x3}}, {0x2, 0x1b6e, {0x1}}, {0xffff, 0x4, {0x2, 0x2}}, {0x0, 0xfffc, {0x1, 0x400}}, {0x8, 0x0, {0x2, 0x6}}, {0xc, 0x1, {0x0, 0x1}}, {0x64, 0xfff, {0x3}}, {0x8, 0x8, {0x3, 0xfffffffd}}, {0x4, 0x8001, {0x0, 0xffffffff}}, {0x1ff, 0x50a, {0x2, 0x8}}, {0x6, 0x3, {0x2, 0x462b}}, {0x3, 0x6, {0x2, 0x5}}, {0xbc0, 0xffff, {0x0, 0xffffffff}}, {0xa70f, 0x8, {0x1, 0xade}}, {0x2, 0x288b, {0x3}}, {0x0, 0x81, {0x0, 0x2}}, {0x9, 0x8, {0x2, 0x8}}, {0x2, 0x80, {0x2, 0x2}}, {0xf27, 0x0, {0x3, 0x8001}}, {0xd07b, 0x0, {0x1, 0x7f}}, {0x51cc, 0x800, {0x2, 0x8}}, {0x7d88, 0x7, {0x2, 0x3}}, {0x26, 0xfffd, {0x2, 0x1}}, {0x8, 0x6, {0x1, 0x8}}, {0x81, 0xfb, {0x0, 0xffff}}, {0x0, 0x8, {0x0, 0x80}}, {0x7, 0x7, {0x1, 0x6}}, {0x401, 0x1c6, {0x1, 0x28}}]}}}, {{0x254, 0x1, {{0x1, 0x1}, 0x40, 0xfd, 0x8, 0x5, 0x14, 'syz1\x00', "46e1057f01fdbacd6fff1b39e11bb22731fe33f4015e03c0b33a64453c2b9882", "8cda4f1b0bdf8a275706be640f383b8b6e2fa393a086d76131e254c771abfcec", [{0x2, 0x3f, {0x2, 0x7}}, {0x6, 0xfff7, {0x3, 0x808}}, {0x8, 0x100, {0x1, 0x2}}, {0x7ff, 0x0, {0x3, 0x81}}, {0x8, 0x3, {0x2, 0x1}}, {0x7, 0x4, {0x0, 0x4}}, {0x3, 0x7f, {0x2, 0x7fffffff}}, {0x8, 0x3, {0x0, 0xffffffff}}, {0x230, 0x20, {0x3, 0xffffffff}}, {0xffff, 0xd72, {0x2, 0xffff}}, {0x3, 0x20, {0x1, 0x7fffffff}}, {0x7, 0x7, {0x1, 0x1}}, {0x5, 0x8001, {0x3, 0x5}}, {0x2, 0x1, {0x3, 0x1000}}, {0x4, 0x4, {0x0, 0x7}}, {0x7, 0x2, {0x3, 0x4}}, {0x2, 0xff, {0x3, 0x20}}, {0x1, 0x5, {0x0, 0x8}}, {0xfc00, 0x3, {0x3}}, {0x200, 0x9, {0x1, 0x8}}, {0x2, 0x4, {0x1, 0x4}}, {0xff, 0xa0, {0x3, 0x20}}, {0x1000, 0x0, {0x0, 0x400}}, {0x9, 0x2, {0x1, 0xfffffff7}}, {0x1, 0x3ff, {0x2, 0xffffff00}}, {0x8, 0xfef, {0x2, 0x6}}, {0x8, 0x4, {0x1, 0x10000}}, {0x1, 0x8, {0x2, 0x8}}, {0x7, 0x401, {0x2, 0x5}}, {0x9, 0xfffc, {0x3, 0x1ff}}, {0x4, 0x0, {0x0, 0x59e5}}, {0x2, 0x8, {0x0, 0xfffffffc}}, {0x8, 0x2, {0x0, 0x800}}, {0x101, 0x6, {0x0, 0x2}}, {0x190c, 0x7, {0x3, 0x2}}, {0x5, 0xff, {0x2}}, {0x0, 0x0, {0x3, 0xffff8000}}, {0x3, 0x7, {0x1, 0x87}}, {0x1, 0x5, {0x2, 0xfffffffe}}, {0x7, 0x7f, {0x0, 0x400}}]}}}, {{0x254, 0x1, {{0x2, 0x80000000}, 0x7f, 0xff, 0x80, 0x29, 0x3, 'syz1\x00', "534381898c92a0a14e9fe08c6bb719dbc3ed759ce035767c5fa8297c231514f1", "a12b4a3c457c2614f3737f0353235ddad0bddf9c2b595b0606b3a2f4b3ac3801", [{0x7ff, 0x3, {0x2, 0x3}}, {0x80, 0x8, {0x3, 0x6}}, {0x2d92, 0x4, {0x2, 0x6}}, {0x8, 0x7, {0x0, 0x75}}, {0x7, 0x3, {0x0, 0x8}}, {0x5, 0x1d, {0x3, 0x7}}, {0x0, 0xb3, {0x0, 0x1f}}, {0x7, 0x5, {0x3, 0x5}}, {0x8, 0x2, {0x1, 0xffffffff}}, {0x4, 0x0, {0x3, 0x4}}, {0x1, 0x9, {0x1, 0x7}}, {0x2, 0x6, {0x2, 0xfe}}, {0x8001, 0x8, {0x3, 0x7f}}, {0x7, 0x591, {0x1, 0x27cb}}, {0x5, 0x0, {0x3, 0x7f}}, {0x987c, 0x6, {0x2, 0x2925}}, {0x80, 0x8001, {0x0, 0x8}}, {0x5, 0x100, {0x3, 0x8}}, {0x0, 0xf591, {0x2, 0x7}}, {0x7, 0x3, {0x1, 0x26a}}, {0x6, 0x7, {0x0, 0x8001}}, {0x8000, 0x1, {0x0, 0x6000}}, {0x0, 0x0, {0x0, 0x1}}, {0x1f, 0x5, {0x1, 0x200}}, {0x8, 0x7, {0x0, 0x5}}, {0x5, 0x2, {0x0, 0xffffffe0}}, {0xfbff, 0x7ff, {0x3, 0x7f}}, {0x39db, 0x2, {0x1, 0x3f}}, {0x100, 0x4, {0x2, 0x5}}, {0xb00, 0x100, {0x2, 0x7ff}}, {0x2, 0x8, {0x1, 0x1f}}, {0x1000, 0xee0b, {0x3, 0x5}}, {0x1, 0x9, {0x3, 0xdd}}, {0xfff8, 0x7, {0x3, 0x90}}, {0x7, 0x8, {0x3, 0x8}}, {0x2, 0x7f, {0x2, 0x5}}, {0x85a, 0x5, {0x1, 0x401}}, {0x100, 0x3, {0x3, 0x1}}, {0xc1c, 0x1, {0x1, 0x1}}, {0x7, 0x40, {0x3, 0x5}}]}}}, {{0x254, 0x1, {{0x1, 0x1215}, 0x23, 0x20, 0x101, 0x400, 0x8, 'syz1\x00', "7a0c3070afb4f0aeaeff9d3c46157b4c9557215ab35f05e577712e997b087ea5", "19d6373893fd8e93237899f4170fdd1fe547c751fd33e74f9235e49cdf779a0a", [{0x7a, 0xc8e, {0x0, 0x6}}, {0x2, 0xa4, {0x2, 0xb1}}, {0x5, 0x5, {0x2, 0x101}}, {0x9, 0x4, {0x3, 0x9}}, {0x0, 0x100, {0x3, 0xb98}}, {0x0, 0x1, {0x0, 0x1ff}}, {0x100, 0x67, {0x1, 0x5}}, {0xad, 0x7fff, {0x1, 0x6}}, {0x0, 0x40, {0x3, 0x3}}, {0x7, 0x877, {0x1, 0xff}}, {0x1, 0x3, {0x3, 0x1ff}}, {0x401, 0x167, {0x3, 0x1ff}}, {0x1, 0x9db6, {0x3, 0xfffffff9}}, {0xffff, 0xfffc, {0x1, 0x1}}, {0x5, 0x7f, {0x3, 0x40cce0e3}}, {0x7, 0x8, {0x0, 0x9}}, {0x101, 0xc600, {0x2, 0x6e18}}, {0x6, 0x1000, {0x517081a39054e8bc, 0x9}}, {0x1, 0x7fff, {0x2, 0x5}}, {0x7ff, 0x5, {0x0, 0x32}}, {0x8, 0xff80, {0x0, 0x4}}, {0x0, 0x3, {0x3, 0x7f}}, {0x8, 0x5, {0x2, 0x3f}}, {0x7ff, 0x8b0, {0x2, 0x8000000}}, {0x3, 0xb578, {0x3, 0x5}}, {0x2, 0x1ff, {0x3, 0x6}}, {0x4, 0x341, {0x1, 0xc8}}, {0xffff, 0x7, {0x1, 0x1}}, {0x7, 0x6, {0x2, 0x7}}, {0x2b, 0x5, {0x0, 0x4}}, {0xace8, 0xffff, {0x1, 0x80}}, {0x71, 0x6, {0x2, 0xc8}}, {0x9, 0x4, {0x2, 0x1ff}}, {0x7, 0x9, {0x1, 0x4}}, {0x401, 0x1, {0x3, 0x61a}}, {0x9, 0x100, {0x3, 0xfffffffe}}, {0xc948, 0x8, {0x2, 0x7}}, {0x3, 0x80, {0x1, 0x20d}}, {0x66c, 0x401, {0x1, 0xc0a}}, {0x2, 0xfffd, {0x1}}]}}}]}, 0x12b4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) sendto$inet(r2, &(0x7f0000000380)='\x00', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) shutdown(r2, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6, 0x0, 0x10001, 0x0, 0x0, 0x46}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) recvmmsg(r2, &(0x7f00000011c0)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000fc0)=""/158, 0x9e}], 0x1}}], 0x1, 0x10002, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100)={0x0, 0x0, 0x4}, 0xe) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x9c) [ 255.132500][T10450] FAULT_INJECTION: forcing a failure. [ 255.132500][T10450] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 255.145844][T10450] CPU: 1 PID: 10450 Comm: syz-executor.2 Not tainted 5.7.0-rc2-syzkaller #0 [ 255.154523][T10450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.164583][T10450] Call Trace: [ 255.167886][T10450] dump_stack+0x188/0x20d [ 255.172321][T10450] should_fail.cold+0x5/0xa [ 255.176844][T10450] ? fault_create_debugfs_attr+0x140/0x140 [ 255.182669][T10450] ? print_usage_bug+0x240/0x240 [ 255.187654][T10450] __alloc_pages_nodemask+0x17a/0x810 [ 255.193033][T10450] ? __alloc_pages_slowpath.constprop.0+0x2660/0x2660 [ 255.199803][T10450] ? mark_held_locks+0xe0/0xe0 [ 255.204568][T10450] ? print_usage_bug+0x240/0x240 [ 255.209514][T10450] cache_grow_begin+0x8c/0xc10 [ 255.214281][T10450] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 255.219741][T10450] __kmalloc+0x6dc/0x7a0 [ 255.223987][T10450] ? tomoyo_realpath_from_path+0xc2/0x620 [ 255.229721][T10450] ? lock_release+0x800/0x800 [ 255.234400][T10450] ? __lock_acquire+0xcbb/0x4c50 [ 255.239343][T10450] tomoyo_realpath_from_path+0xc2/0x620 [ 255.244884][T10450] ? tomoyo_profile+0x42/0x50 [ 255.249581][T10450] tomoyo_path_number_perm+0x1c2/0x4d0 [ 255.255040][T10450] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 255.260677][T10450] ? tomoyo_execute_permission+0x470/0x470 [ 255.266497][T10450] ? __fget_files+0x30d/0x500 [ 255.271203][T10450] ? __fget_files+0x32f/0x500 [ 255.275888][T10450] ? ksys_dup3+0x3c0/0x3c0 [ 255.280303][T10450] ? __sb_end_write+0x101/0x1d0 [ 255.285162][T10450] ? vfs_write+0x161/0x5d0 [ 255.289588][T10450] security_file_ioctl+0x6c/0xb0 [ 255.294531][T10450] ksys_ioctl+0x50/0x180 [ 255.298782][T10450] __x64_sys_ioctl+0x6f/0xb0 [ 255.303373][T10450] ? lockdep_hardirqs_on+0x463/0x620 [ 255.308665][T10450] do_syscall_64+0xf6/0x7d0 [ 255.313177][T10450] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 255.319073][T10450] RIP: 0033:0x45c829 [ 255.322974][T10450] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.342583][T10450] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 255.351002][T10450] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 255.358974][T10450] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 255.366944][T10450] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 255.374910][T10450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 255.382882][T10450] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 [ 255.439166][T10456] FAT-fs (loop0): invalid media value (0x00) [ 255.477210][T10456] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:06 executing program 5: mknod(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:06 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0x9f54, 0x5, 0x4, 0x1, 0x10000, {0x0, 0xea60}, {0x3, 0x0, 0x7, 0x4, 0x1, 0x1f, "e0b74686"}, 0x4, 0x3, @fd=r2, 0x7, 0x0, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x408) sendmsg$IPSET_CMD_RENAME(r3, &(0x7f0000000600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000005c0)={&(0x7f0000000100)={0x5c, 0x5, 0x6, 0x201, 0x0, 0x0, {0xa, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4044094}, 0x4000000) 01:22:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x40000, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000240)=0x20) socket$netlink(0x10, 0x3, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r3, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x80, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x5c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x2, 0x1, 0x7, 0x8, 0x2, 0x7, 0xffff7fff, 0xa}}, {0x18, 0x2, [0x8000, 0x200, 0x563e, 0xffff, 0x9, 0xffff, 0xffff, 0xfff7, 0x81, 0x8]}}, {{0x1c, 0x1, {0x38, 0x2, 0x9, 0xdbf4, 0x0, 0x4, 0x81, 0x2}}, {0x8, 0x2, [0xfff, 0x3a]}}]}]}, 0x80}, 0x1, 0x3e1e000000000000}, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x7f, 0x400000) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000080)=0x1, &(0x7f00000000c0)=0x1) 01:22:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:06 executing program 2 (fault-call:5 fault-nth:2): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 255.901001][T10480] Cannot find add_set index 0 as target 01:22:06 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 255.943196][T10484] FAT-fs (loop0): invalid media value (0x00) [ 256.008201][T10484] FAT-fs (loop0): Can't find a valid FAT filesystem [ 256.019221][T10483] FAULT_INJECTION: forcing a failure. [ 256.019221][T10483] name failslab, interval 1, probability 0, space 0, times 0 [ 256.072422][T10483] CPU: 0 PID: 10483 Comm: syz-executor.2 Not tainted 5.7.0-rc2-syzkaller #0 [ 256.081224][T10483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.091381][T10483] Call Trace: [ 256.094689][T10483] dump_stack+0x188/0x20d [ 256.099038][T10483] should_fail.cold+0x5/0xa [ 256.103559][T10483] ? fault_create_debugfs_attr+0x140/0x140 [ 256.109386][T10483] should_failslab+0x5/0xf [ 256.113810][T10483] __kmalloc+0x2d9/0x7a0 [ 256.118063][T10483] ? tomoyo_encode2.part.0+0xec/0x3b0 [ 256.123438][T10483] ? __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 256.129261][T10483] tomoyo_encode2.part.0+0xec/0x3b0 [ 256.134468][T10483] ? lock_release+0x800/0x800 [ 256.139156][T10483] tomoyo_encode+0x28/0x50 [ 256.143575][T10483] tomoyo_realpath_from_path+0x184/0x620 [ 256.149205][T10483] tomoyo_path_number_perm+0x1c2/0x4d0 [ 256.154642][T10483] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 256.160271][T10483] ? tomoyo_execute_permission+0x470/0x470 [ 256.166093][T10483] ? __fget_files+0x30d/0x500 [ 256.170771][T10483] ? __fget_files+0x32f/0x500 [ 256.175429][T10483] ? ksys_dup3+0x3c0/0x3c0 [ 256.179833][T10483] ? __sb_end_write+0x101/0x1d0 [ 256.184682][T10483] ? vfs_write+0x161/0x5d0 [ 256.189092][T10483] security_file_ioctl+0x6c/0xb0 [ 256.194041][T10483] ksys_ioctl+0x50/0x180 [ 256.198266][T10483] __x64_sys_ioctl+0x6f/0xb0 [ 256.202846][T10483] ? lockdep_hardirqs_on+0x463/0x620 [ 256.208124][T10483] do_syscall_64+0xf6/0x7d0 [ 256.212609][T10483] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 256.218484][T10483] RIP: 0033:0x45c829 [ 256.222380][T10483] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.241981][T10483] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.250398][T10483] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 256.258358][T10483] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 01:22:06 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:06 executing program 4: r0 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) r2 = dup3(r0, r1, 0x80000) ioctl$TIOCSBRK(r2, 0x5427) socket(0x10, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {0x8, 0x1}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 256.266320][T10483] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 256.274274][T10483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 256.282339][T10483] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 [ 256.308519][T10483] ERROR: Out of memory at tomoyo_realpath_from_path. 01:22:07 executing program 2 (fault-call:5 fault-nth:3): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e0, 0x148, 0xf8, 0x0, 0x0, 0xf8, 0x210, 0x1c0, 0x1c0, 0x210, 0x1c0, 0x3, 0x0, {[{{@ipv6={@remote, @mcast2, [], [], 'ipvlan0\x00', 'vxcan1\x00'}, 0x0, 0xe0, 0x148, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}, {0x0, 0x0, 0x9000000}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x340) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) r2 = socket(0x10, 0x3, 0x0) r3 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f00000001c0)={{0x2, 0x0, @identifier="99e165ebc4b0ab3fdeb70216882a6f4c"}}) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = gettid() sendmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {r6, 0x0, r5}}}], 0x20}, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x2, &(0x7f0000000180)=[r5, r7]) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000040)={{0x9, 0xff}, {0x81, 0x1f}, 0x3, 0x2, 0x1}) [ 256.487028][T10512] FAULT_INJECTION: forcing a failure. [ 256.487028][T10512] name failslab, interval 1, probability 0, space 0, times 0 [ 256.530426][T10512] CPU: 1 PID: 10512 Comm: syz-executor.2 Not tainted 5.7.0-rc2-syzkaller #0 [ 256.539131][T10512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.549285][T10512] Call Trace: [ 256.552594][T10512] dump_stack+0x188/0x20d [ 256.556946][T10512] should_fail.cold+0x5/0xa [ 256.561492][T10512] ? fault_create_debugfs_attr+0x140/0x140 [ 256.567324][T10512] should_failslab+0x5/0xf [ 256.571751][T10512] kmem_cache_alloc+0x29b/0x740 [ 256.576612][T10512] ? mark_lock+0x12b/0xf10 [ 256.581127][T10512] ? vcpu_enter_guest+0x1637/0x59d0 [ 256.586403][T10512] mmu_topup_memory_caches+0x92/0x460 [ 256.591856][T10512] kvm_mmu_load+0x1e/0x1290 [ 256.596371][T10512] ? vmx_load_mmu_pgd+0x810/0x810 [ 256.601404][T10512] ? mark_held_locks+0x9f/0xe0 [ 256.606268][T10512] vcpu_enter_guest+0x3513/0x59d0 [ 256.611299][T10512] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 256.616631][T10512] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 256.623054][T10512] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16e0 [ 256.628797][T10512] ? lock_release+0x800/0x800 [ 256.633499][T10512] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 256.639054][T10512] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 256.645044][T10512] ? lockdep_hardirqs_on+0x463/0x620 [ 256.650388][T10512] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 256.656121][T10512] ? kvm_arch_vcpu_ioctl_run+0x27b/0x16e0 [ 256.661854][T10512] kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 256.667467][T10512] kvm_vcpu_ioctl+0x493/0xe60 [ 256.672159][T10512] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 256.678701][T10512] ? ioctl_file_clone+0x180/0x180 [ 256.683743][T10512] ? __fget_files+0x32f/0x500 [ 256.688446][T10512] ? ksys_dup3+0x3c0/0x3c0 [ 256.692865][T10512] ? __sb_end_write+0x101/0x1d0 [ 256.697720][T10512] ? vfs_write+0x161/0x5d0 [ 256.702154][T10512] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 256.708578][T10512] ksys_ioctl+0x11a/0x180 [ 256.712923][T10512] __x64_sys_ioctl+0x6f/0xb0 [ 256.717529][T10512] ? lockdep_hardirqs_on+0x463/0x620 [ 256.722825][T10512] do_syscall_64+0xf6/0x7d0 [ 256.727342][T10512] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 256.733235][T10512] RIP: 0033:0x45c829 [ 256.737134][T10512] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.756741][T10512] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 256.765165][T10512] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 256.773141][T10512] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 256.781116][T10512] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 256.789093][T10512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 256.797071][T10512] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 [ 256.837677][T10518] FAT-fs (loop0): invalid media value (0x00) [ 256.859674][T10518] FAT-fs (loop0): Can't find a valid FAT filesystem 01:22:08 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:08 executing program 4: open(0x0, 0x0, 0x0) syz_mount_image$minix(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f00000007c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x71, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000000c0)="4a8685ec38c455d4aee313a4221c161d4b293f3a80388bf1a76475b9c609572378a6a8062eac54ba71f136a3cd63da535a2a53710963ab4944bfe7628e7cf90cffa5c805ea5b9e82df07ba450146f1abef72bc0e979b4c6f5357285e0dd52edb7dd5d48e6fa26a16f6d6e826aa30f506041e4f875a", 0x75}, {&(0x7f0000000140)="4f946c8421d6e0b6a3e267bfab8d0d0b13e73d6639b8959d8d26a73a71f424ffc2b278467fdccbc317f320be4620f83f17e7a68126e1496c36fbd5217265c4bedbee9f5dbcd90278b3c14f9414658339a3d0ad48be43a58e7cf29f3f79010245fbb2c39929eb92f4ca829b0ada1ee2f40e18ac1d411a2a6e4b76118a63070821a21f9cea24391c378be0762b89e9a49e51b1db1749f02c08268f2e92862fc3cd50e11ac48a988297093769c4d3b2b4ea42820539767d2a36b34f8392de0df1e9baca990ae3ac36e455b1177afbbc22fca31a230ffdcf8540dbd43d0590cd367027ef", 0xe2}, {&(0x7f00000004c0)="93ce75d3b558a036bcf6378a4065d31733301e4a27324759994a8d28da904e87fa7ca88b01a0182b9558a740660a03944d258a988511f5fbd928c2bce9c4a0cf35680a90d6f5a350b19690a5dcfa042b4c7d4cd81fdd7841917f377a2dd090942950404632c813a137060317d93d65753ce7c92a2020f580d112bff5f5f1d612c5e7a9815b703aec57671f88779e5af2447cec28d9822e6b8c033eec898a50929a4d9e179d9f407b1af6dbabc6d88777fff8092a4af702281c12730833a29feffe771a25bc", 0xc5}, {&(0x7f0000000340)="b99b589ca7fc7b0819a504c7010e1723e0345a45", 0x14}, {&(0x7f0000000380)="8b71c1fc7a093b3b49cad0d569c273e72d332c", 0x13}], 0x5}}], 0x1, 0x20000800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000280)=0x7ff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) sendfile(r0, r0, &(0x7f0000000480), 0xa198) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000002c0)) 01:22:08 executing program 2 (fault-call:5 fault-nth:4): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7", 0x15}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 257.706845][T10545] FAULT_INJECTION: forcing a failure. [ 257.706845][T10545] name failslab, interval 1, probability 0, space 0, times 0 [ 257.740023][T10543] FAT-fs (loop0): invalid media value (0x00) [ 257.754569][T10543] FAT-fs (loop0): Can't find a valid FAT filesystem [ 257.796761][T10545] CPU: 0 PID: 10545 Comm: syz-executor.2 Not tainted 5.7.0-rc2-syzkaller #0 [ 257.805459][T10545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.815519][T10545] Call Trace: [ 257.818826][T10545] dump_stack+0x188/0x20d [ 257.823174][T10545] should_fail.cold+0x5/0xa [ 257.827691][T10545] ? fault_create_debugfs_attr+0x140/0x140 [ 257.833510][T10545] should_failslab+0x5/0xf [ 257.837932][T10545] kmem_cache_alloc+0x29b/0x740 [ 257.842802][T10545] ? mark_lock+0x12b/0xf10 [ 257.847233][T10545] ? vcpu_enter_guest+0x1637/0x59d0 [ 257.852446][T10545] mmu_topup_memory_caches+0x92/0x460 [ 257.857830][T10545] kvm_mmu_load+0x1e/0x1290 [ 257.862341][T10545] ? vmx_load_mmu_pgd+0x810/0x810 [ 257.867379][T10545] ? mark_held_locks+0x9f/0xe0 [ 257.872163][T10545] vcpu_enter_guest+0x3513/0x59d0 [ 257.877190][T10545] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 257.882402][T10545] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 257.888822][T10545] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16e0 [ 257.894553][T10545] ? lock_release+0x800/0x800 [ 257.899250][T10545] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 257.904813][T10545] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 257.910805][T10545] ? lockdep_hardirqs_on+0x463/0x620 [ 257.916109][T10545] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 257.921840][T10545] ? kvm_arch_vcpu_ioctl_run+0x27b/0x16e0 [ 257.927575][T10545] kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 257.933143][T10545] kvm_vcpu_ioctl+0x493/0xe60 [ 257.937832][T10545] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 257.944254][T10545] ? ioctl_file_clone+0x180/0x180 [ 257.949293][T10545] ? __fget_files+0x32f/0x500 [ 257.953983][T10545] ? ksys_dup3+0x3c0/0x3c0 [ 257.958403][T10545] ? __sb_end_write+0x101/0x1d0 [ 257.963259][T10545] ? vfs_write+0x161/0x5d0 [ 257.967691][T10545] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 257.974113][T10545] ksys_ioctl+0x11a/0x180 [ 257.978453][T10545] __x64_sys_ioctl+0x6f/0xb0 [ 257.983050][T10545] ? lockdep_hardirqs_on+0x463/0x620 [ 257.988348][T10545] do_syscall_64+0xf6/0x7d0 [ 257.992878][T10545] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 257.998777][T10545] RIP: 0033:0x45c829 [ 258.002677][T10545] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.022284][T10545] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 258.030703][T10545] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 258.038681][T10545] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 01:22:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 258.046770][T10545] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 258.054749][T10545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000006 [ 258.062730][T10545] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 01:22:08 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:08 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:09 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:09 executing program 4: open(0x0, 0x0, 0x0) syz_mount_image$minix(0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[{0x0}], 0x0, 0x0) bind$rxrpc(0xffffffffffffffff, &(0x7f00000007c0)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x24) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x71, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x80000000}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000000c0)="4a8685ec38c455d4aee313a4221c161d4b293f3a80388bf1a76475b9c609572378a6a8062eac54ba71f136a3cd63da535a2a53710963ab4944bfe7628e7cf90cffa5c805ea5b9e82df07ba450146f1abef72bc0e979b4c6f5357285e0dd52edb7dd5d48e6fa26a16f6d6e826aa30f506041e4f875a", 0x75}, {&(0x7f0000000140)="4f946c8421d6e0b6a3e267bfab8d0d0b13e73d6639b8959d8d26a73a71f424ffc2b278467fdccbc317f320be4620f83f17e7a68126e1496c36fbd5217265c4bedbee9f5dbcd90278b3c14f9414658339a3d0ad48be43a58e7cf29f3f79010245fbb2c39929eb92f4ca829b0ada1ee2f40e18ac1d411a2a6e4b76118a63070821a21f9cea24391c378be0762b89e9a49e51b1db1749f02c08268f2e92862fc3cd50e11ac48a988297093769c4d3b2b4ea42820539767d2a36b34f8392de0df1e9baca990ae3ac36e455b1177afbbc22fca31a230ffdcf8540dbd43d0590cd367027ef", 0xe2}, {&(0x7f00000004c0)="93ce75d3b558a036bcf6378a4065d31733301e4a27324759994a8d28da904e87fa7ca88b01a0182b9558a740660a03944d258a988511f5fbd928c2bce9c4a0cf35680a90d6f5a350b19690a5dcfa042b4c7d4cd81fdd7841917f377a2dd090942950404632c813a137060317d93d65753ce7c92a2020f580d112bff5f5f1d612c5e7a9815b703aec57671f88779e5af2447cec28d9822e6b8c033eec898a50929a4d9e179d9f407b1af6dbabc6d88777fff8092a4af702281c12730833a29feffe771a25bc", 0xc5}, {&(0x7f0000000340)="b99b589ca7fc7b0819a504c7010e1723e0345a45", 0x14}, {&(0x7f0000000380)="8b71c1fc7a093b3b49cad0d569c273e72d332c", 0x13}], 0x5}}], 0x1, 0x20000800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000280)=0x7ff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) sendfile(r0, r0, &(0x7f0000000480), 0xa198) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000002c0)) 01:22:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:09 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:09 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:09 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:09 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x6a000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x9}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x81}, 0x24000004) recvmmsg(r0, &(0x7f0000006300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r3, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r7, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, 0x0, 0x300, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x4c, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}, {0x8, 0x1, r2}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r2}, {0x8, 0x1, r6}, {0x8, 0x1, r7}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4000}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40001}, 0x40080) 01:22:09 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 259.323596][T10612] IPVS: ftp: loaded support on port[0] = 21 01:22:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={'bridge0\x00', {0x2, 0x4e22, @local}}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_PROBE_HOST(r4, 0x5385, &(0x7f0000000180)={0xce, ""/206}) 01:22:10 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:10 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x7d, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={r6, 0x7, 0x1, [0xe09]}, &(0x7f0000000040)=0xa) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000000c0)={r7, 0x8, 0x30}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:10 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getpeername$tipc(r4, &(0x7f0000000040)=@name, &(0x7f00000000c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_GET_CLOCK(r4, 0x8030ae7c, &(0x7f0000000000)) [ 260.098635][T10617] IPVS: ftp: loaded support on port[0] = 21 01:22:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:11 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x505040, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12, 0x0, 0x0, 0x0, [], 0x0, 0xffffffffffffffff}) ioctl$KVM_RUN(r2, 0xae80, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') prctl$PR_SET_UNALIGN(0x6, 0x3) 01:22:15 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:15 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r3 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r3, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001400)=ANY=[@ANYBLOB="e80000001200180425bd7000fedbdf256d6f7275733132383000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000003cf177ec000000000000000000000000000000000000000000000000000000000000000000000000000000000000002400000060000000000000000000000800010008000000", @ANYRESOCT=r3, @ANYBLOB="f3285fd67e2171c72f33525ea780d46f0d7696ba61f38ccf465c242512def8864aca9c2297f9ba7261990d6f68069836662698150b0c7502b2ad69d7bdccd93afea27fe17b8f74eebb435d834a58c37bfaff66cdc99100a91b892cf1d816a6697bf1c46c8a4bf17113172b94a4c66f8806419567dc6aa937f211b0db967d863157560d637e96584ad66dc5790b2001713a5901daddd689"], 0x3}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) r7 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0x6, 0x141600) sendto$rxrpc(r7, &(0x7f00000003c0)="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", 0x1000, 0x40000, &(0x7f00000013c0)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x1e, @private1, 0x7}}, 0x24) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$VIDIOC_S_PRIORITY(r6, 0x40045644, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = fcntl$dupfd(r8, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_S_PARM(r9, 0xc0cc5616, &(0x7f0000000280)={0x6, @raw_data="7dde6edbc9e111b0e76b941c86b3f27f54491e2b8cd291943b82b6851931ab265165a2e7365c30fbff399d6d131197105e93bcae58e41ae8911f84d2c381dd6dfa4c0461e0af24f6cc5fe7ca61fdc0696e69d470ca0526900a8f728b2db950de1d75380e795606af495f8a739448977c878b8b5c49e3b67eeeb984cb9efa3c329e452c892079c2ee6acec4b2b9d4fe7b05328a6531ba8672ae37c72fce7e6408c770b47d8f80c14debb89b71b6b713ff31982e29fd2f820b4f6060f3c9dade3e1cbd280ab077f66c"}) 01:22:15 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:15 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:15 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r1, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) sendto$inet(r1, &(0x7f0000000000)="4b3f8823c720f6e93afe6930693ae935389d62c247f02c3ef69fc37f53325773e58c31b67e242faa67a217e54d63", 0x2e, 0x80, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) 01:22:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x111202, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r3, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) setsockopt$XDP_RX_RING(r3, 0x11b, 0x2, &(0x7f00000000c0)=0x40c, 0x4) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 01:22:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT(r4, 0x401870cb, &(0x7f0000000000)={0x0, 0x8, 0x1, 0x1000}) bind$pptp(r4, &(0x7f0000000040)={0x18, 0x2, {0x0, @empty}}, 0x1e) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:17 executing program 4: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="2400000002010100004007000000008099154348180002ef060001000800020004000180034d80e250baa22015b164f96a3d9bf0c17beec1058475035d61e6c96fd1220deab92562e9d14541a602db266569060000009ea319a6c98b7adaa2000000000000005f0a034b8dffe7958cd16c1a3b617305c34d53b4dd93524047fe20140a08577426ada4e239924dd4f3756713481b97ec4610f1ff80464143ffe82063d56a9b861580e069868625b28ec70090e1357b2d2b34d21760668254267bb620a16b745dc639828af5e8aaded46b18c058a360fbef36aa3352b73dd9559fa2b1beba51090ad4a94000c007da3cecbcf69a3b967e080000000000000035f83fff6c04f163dda6cfe32d5218492fea4d07aa154c4042081a3cf0832f84e91e6a4c088e5839630230e5fac04b7a5856aabe691c129b79a8256073ea1b787ccb30b4bd2040f3140a4358d8187863d79cecc25428bf3384bb51853bb67594bd1a0a8615ceb0a09b74911a795db077fa7f6fddc92a4932e92396123815243cfca1e7088a8039a1252510a286bb3695db8f6ad8be497d6a8a87018e292ab1679e0408876e044233df4414786bcdcb000000007208802dfb5396d2cf4268c74987b080b3c3be4d7a996efdf6778009be0713f432322081803b930a2d2d2b88dbef869da30131eeda5d42145c74001bd5e2252aca42e76333884c1a0be31227cf29b0575882fe6f907fdc2d68309b59e8d74981def5271c582a49ebc86b7791507e01d2d839e3fca4089e5fbdb5db010000806943a39ba3bffe914ee83364b7024107d1b10ea474874096975a2b993ac2e877e90b4d046037974926626845b100000000000000007200000000000000f7d2b3b023c91cb6b63a1ab83dad410d0932c81c7049d61c01cdd8fc96c0833134e6588f65fc8f9a8a79e7d14e13f6114c5d273b952c11fadc815058b788bcb62ef3bab43c31fabf724b299b45f3e777c7cf512fda2365483dd613c5527b409ee362a3bc757e68c7aad74c3aafb75a44b9b0daabee1ffdffff0000c9da00000000"], 0x24}}, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="24000000100a07051dfffd946ff20c0020200a0014000140021d8568031baba20400ff7e", 0x24}], 0x14}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r3, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) ioctl$SIOCRSSL2CALL(r3, 0x89e2, &(0x7f0000000000)=@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}) 01:22:17 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000001400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="f6ffffffffffffff2800120009000100766574680000000022d7709161ade786180002001400010000000f00", @ANYRES32=0x0, @ANYBLOB="0400b20008000000d4515ee94a53a34ce6025f2ae3080454b66806fd745f4f731d08934291e8006fc7"], 0x48}}, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00ff0c1a198a0a00"], 0x48}}, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @hsr={{0x8, 0x1, 'hsr\x00'}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE1={0x8, 0x1, r3}, @IFLA_HSR_SLAVE2={0x8, 0x2, r6}, @IFLA_HSR_MULTICAST_SPEC={0x5}]}}}]}, 0x48}}, 0x0) 01:22:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:17 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:17 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) [ 266.534876][T10773] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.562015][T10773] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 01:22:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x4c, 0x30, 0x727, 0x0, 0x0, {}, [{0x38, 0x1, [@m_ct={0x34, 0x1, 0x0, 0x0, {{0x7, 0x1, 'ct\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}, @TCA_CT_ACTION={0x6, 0x3, 0x78}]}, {0x4}}}]}]}, 0x4c}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) [ 267.362761][T10787] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:18 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) r5 = socket(0x10, 0x800000000080002, 0x10) r6 = syz_genetlink_get_family_id$smc(&(0x7f0000000100)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01000000000000000000020000001400020076657468315f746f5f626174616476000900030073797a3000000000090001000000000000000000"], 0x40}}, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r6, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8040}, 0x4) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:22:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(0x0, 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 267.416789][T10787] device veth3 entered promiscuous mode 01:22:18 executing program 4: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') r2 = dup3(r0, r1, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0xff9c, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={r6}, &(0x7f0000000040)=0x8) [ 267.609550][T10793] device veth5 entered promiscuous mode [ 267.727419][T10787] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(0x0, 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 267.830240][T10787] device veth7 entered promiscuous mode 01:22:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000140)) r2 = socket(0x23, 0x0, 0x0) write(r2, &(0x7f0000000100)="240000001e005f0014f9f407faac470002000000030000000000080008000100000000ff", 0x24) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x54, 0x9}, {0x1, 0x845c}]}, 0x14, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000000)) 01:22:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000380)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xb80, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r1, 0x0, 0x7fffffff) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r4) setsockopt$TIPC_IMPORTANCE(r4, 0x10f, 0x7f, &(0x7f00000000c0)=0x6, 0x4) socket$netlink(0x10, 0x3, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r5, r0, 0x0, 0xffffff38) 01:22:19 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000140)='reiserfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1108400, 0x0) 01:22:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(0x0, 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 268.343190][ T27] audit: type=1804 audit(1587518539.014:15): pid=10851 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/105/file0" dev="sda1" ino=16246 res=1 [ 268.423802][ T27] audit: type=1800 audit(1587518539.014:14): pid=10856 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16246 res=0 [ 268.487636][ T27] audit: type=1804 audit(1587518539.024:16): pid=10851 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/105/file0" dev="sda1" ino=16246 res=1 [ 268.662732][ T27] audit: type=1804 audit(1587518539.134:17): pid=10856 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir989356770/syzkaller.x4pvpW/105/file0" dev="sda1" ino=16246 res=1 01:22:19 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x3, 0x0, 0x0, 0x0, 0x40000008, 0x10}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000140)={0x6}) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x1) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) setsockopt$inet_tcp_int(r4, 0x6, 0x9, &(0x7f0000000100)=0x3, 0x4) r6 = accept$inet(r5, &(0x7f0000000000)={0x2, 0x0, @private}, &(0x7f0000000040)=0x10) ioctl$sock_inet_SIOCDELRT(r6, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @multicast1}, 0x100, 0x0, 0x0, 0x0, 0x7, &(0x7f00000000c0)='ip6gre0\x00', 0xfffffffffffffffb, 0x8, 0xff}) 01:22:19 executing program 4: clock_gettime(0x0, &(0x7f0000001300)={0x0, 0x0}) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000001380)={0x8, 0x6, 0x4, 0x200000, 0x3, {r0, r1/1000+10000}, {0x0, 0x8, 0x6, 0x40, 0x81, 0x3, "8938beef"}, 0x1, 0x4, @planes=&(0x7f0000001340)={0x101, 0x0, @userptr=0x6, 0x4}, 0x1, 0x0, 0xffffffffffffffff}) sendmsg$inet6(r2, &(0x7f0000001780)={&(0x7f0000001400)={0xa, 0x4e20, 0x6, @mcast2, 0x1}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000001440)="5c37bd9043af561f7abdb27615f8a98f8678fa77323322b15e06e1a6bd4c3a139a5d54058a346d79431fc3f9a5687aba3bd9e61d105ef5c7f9c403f7821da4ee345416017fbed507a8727d602cabf5ab1a6aef7d271b7f18c8cb057823e176aef115123c32ce8bd8fd26cccb01d4dba7a72be42d0a0b3de9a98996a264ba5f6e727e46053a211c38a8a125edbcb99f9b17335f001c87e82cdeac124a175780ad5b4c2316b675b02c2c7d6f893fec0311b67f3ec8c5ce01470c467779608fb1b0f6bfd97c49869436a92a599d565f3a2efa98ac13ccf1c08b99e263ccacdf345099fefdf1ebcacba991aa4e1769adba094940016c5a66b7cf2c", 0xf9}, {&(0x7f0000001540)="37052d84725d2dc44b26d68d87de47cde11fbb0c2b215707d6f56d5877af49f468bf85af92b1f4ad7555faac10e6613ff28c12cb0750f47e0dc75fa6fe6f1bdfdfae0dbdc0047f1f15f963ea7324ceb8b011c7decaee6572e96473e9fccba461d3730073e408531c09a3bff45f68468474a06552bf326aaceb7e892d92d93f41456a2bdfa891bbd6995364871e", 0x8d}], 0x2, &(0x7f0000001640)=[@tclass={{0x14, 0x29, 0x43, 0x8}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x3a, 0x3, [], [@ra={0x5, 0x2, 0x8}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @jumbo={0xc2, 0x4, 0x20}]}}}, @tclass={{0x14, 0x29, 0x43, 0xc58}}, @rthdr={{0x48, 0x29, 0x39, {0x84, 0x6, 0x2, 0xd8, 0x0, [@local, @private2={0xfc, 0x2, [], 0x1}, @loopback]}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x3a, 0xc, 0x2, 0x0, 0x0, [@loopback, @dev={0xfe, 0x80, [], 0x3b}, @mcast2, @ipv4={[], [], @empty}, @loopback, @loopback]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}], 0x140}, 0x24040880) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f00000017c0)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x42, 0x14d, 0x1ff, 0x0, 0xc81, 0x4, "51091bd0d8f3f31d27ac74c511327d48694bc3c7a631e76cd971af541dc7768cbad08031e00ca61a2f4262e1fe8dc3c90b2315877ea8214083eea7af42b95a7d0387"}}, 0x15a) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001940)='/dev/bsg\x00', 0x200000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f00000019c0)={0x0, 0x0}) sendmsg$AUDIT_SET(r3, &(0x7f0000001ac0)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a40)={0x34, 0x3e9, 0x8, 0x70bd29, 0x25dfdbfc, {0x9, 0x0, 0x1, r4, 0x7ff, 0x7ff, 0x3, 0x0, 0x5}, ["", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x20000001}, 0x8855) sendmsg$AUDIT_DEL_RULE(r3, &(0x7f0000001fc0)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000001f80)={&(0x7f0000001b40)={0x440, 0x3f4, 0x10, 0x70bd2b, 0x25dfdbfd, {0x4, 0x2, 0x2c, [0x80000001, 0x0, 0x8000, 0x100, 0x80, 0x9, 0x2, 0x1ff, 0x1, 0x95d3, 0x6, 0x401, 0x4000000, 0x2, 0x3f, 0x9, 0x4, 0x1, 0x5, 0x7fff, 0x4, 0x8, 0x7f, 0x9, 0x4, 0x200, 0x7f, 0x3, 0x8, 0x7ff, 0x8, 0x4, 0xe587, 0x700c, 0x47, 0xffffffc1, 0x80000001, 0x3, 0x3, 0x40, 0x3, 0xec, 0xbc00000, 0x184, 0x3850, 0x9, 0xffffffff, 0x0, 0x1, 0x1, 0x4, 0x5, 0x71, 0x6, 0x6, 0x4, 0x0, 0x0, 0x1b, 0x4, 0x80000000, 0x0, 0x80000000, 0x8], [0x8001, 0x10000, 0x0, 0x2, 0x5, 0x1, 0x2, 0x1, 0x3, 0xddd, 0x4, 0xc891d61, 0x7fff, 0x7, 0x1, 0x1000, 0x5, 0x5, 0x8, 0x2, 0x3, 0x9, 0xfffffff7, 0x40, 0x6, 0x7a, 0x8, 0x2, 0x9, 0x7, 0x0, 0x0, 0x5, 0x3709, 0x6, 0x0, 0x5, 0x6, 0x7, 0x80000001, 0x3, 0x9, 0x8, 0x2, 0x0, 0x6, 0xa0000000, 0xd0b, 0x1, 0xfe, 0x5, 0x2, 0x20, 0x79f4, 0x5, 0x7fffffff, 0x9, 0x1, 0xfff, 0x7, 0x10000, 0x9, 0x8001, 0x7], [0x2, 0x20, 0x24, 0x38f7, 0x0, 0x12b4, 0x9, 0xffffffff, 0x5fcc, 0x0, 0x3ff, 0x80000000, 0x9, 0xc5, 0x68c, 0x7, 0x7, 0x7fff, 0x7ff, 0x5, 0x5, 0xffff, 0x23, 0xffffffff, 0x1, 0xffff, 0x3, 0x619, 0x6, 0x1, 0xffffffc0, 0x101, 0xffffffff, 0x52, 0x7, 0x20, 0x5, 0x3, 0x8001, 0x0, 0x6, 0x6, 0x1000, 0xffffffc1, 0x857, 0x1000, 0x375, 0x3, 0x7ff, 0x7f, 0x6, 0xff, 0x7fff, 0x6, 0x3, 0x1000, 0x0, 0x5, 0x401, 0x9, 0x93f, 0x9, 0x3, 0x7], [0x5, 0x4, 0x8, 0x0, 0x80000001, 0xfff, 0x7, 0x60, 0x7, 0x7, 0x6f, 0x6cbe, 0x1, 0x9, 0x9, 0x6, 0x6ff, 0xff, 0x5, 0x10000, 0x1ff, 0x81, 0xffffff35, 0x3, 0x1a65, 0x80000000, 0x7, 0x0, 0x9, 0x6, 0x8d6, 0x9, 0x1, 0x6, 0x0, 0x6, 0x40, 0x9, 0x2, 0x3, 0x5, 0x366, 0x1f, 0x0, 0xc535, 0x8001, 0x20, 0xac, 0x1ff, 0x7fffffff, 0x3, 0x1, 0x6, 0x100, 0x4, 0x5, 0x559, 0x4, 0xffffffff, 0x2, 0x0, 0xfffff000, 0x1, 0xfffffffd], 0x1f, [' \x01\x00', '/dev/bsg\x00', '\x00', ' \x01\x00', '+^\x00', ' \x01\x00', '%selinux\x00']}, ["", "", "", "", "", ""]}, 0x440}}, 0x4040000) sendmsg$NFQNL_MSG_VERDICT_BATCH(r3, &(0x7f00000020c0)={&(0x7f0000002000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002080)={&(0x7f0000002040)={0x28, 0x3, 0x3, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0x0, 0xffffffe0}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x10000}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x800) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002680)='/proc/locks\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_CM_ID_GET(r5, &(0x7f0000002780)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000002740)={&(0x7f0000002700)={0x28, 0x140b, 0x2, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x5}, @RDMA_NLDEV_ATTR_RES_CM_IDN={0x8, 0x3f, 0x1ff}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000) connect$pptp(r2, &(0x7f00000027c0)={0x18, 0x2, {0x1, @empty}}, 0x1e) r6 = openat$cgroup_ro(r2, &(0x7f0000002800)='memory.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000028c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000002880)={0xffffffffffffffff}, 0x113, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000002900)={0x12, 0x10, 0xfa00, {&(0x7f0000002840), r7, r2}}, 0x18) ioctl$sock_bt_hci(r3, 0x0, &(0x7f0000002940)="aab912cd14b528296b903d7f385816ea43d4b8deffcbca64970f94c2cb3e58c7bb70d806abf0aff842e0") ioctl$FICLONE(r2, 0x40049409, r5) syz_open_dev$sndmidi(&(0x7f0000002980)='/dev/snd/midiC#D#\x00', 0xa3, 0x200100) r8 = syz_genetlink_get_family_id$wireguard(&(0x7f0000002a00)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000002bc0)={&(0x7f00000029c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002b80)={&(0x7f0000002ac0)={0x8c, r8, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b='\xb0\x80s\xe8\xd4N\x91\xe3\xda\x92,\"C\x82D\xbb\x88\\i\xe2i\xc8\xe9\xd85\xb1\x14):M\xdcn'}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c='\xa0\xcb\x87\x9aG\xf5\xbcdL\x0ei?\xa6\xd01\xc7J\x15S\xb6\xe9\x01\xb9\xff/Q\x8cx\x04/\xb5B'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}, @WGDEVICE_A_PEERS={0x10, 0x8, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x3}]}]}]}, 0x8c}}, 0x8010) 01:22:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x1a2}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000003180)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 01:22:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:19 executing program 4: unshare(0x40000000) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r0, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x8, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x30, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x5, 0x0) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) ioctl$SIOCPNGETOBJECT(r2, 0x89e0, &(0x7f0000000000)=0x800) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'lo\x00', {0x2, 0x0, @broadcast}}) 01:22:19 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 269.160743][T10904] IPVS: ftp: loaded support on port[0] = 21 01:22:20 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, 0x0, &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:20 executing program 2: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) sendmsg$kcm(r0, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000000000)="a8fa56435f338c4b5cd7a83bb6cb75500df8505bfdf3c2665725946e64bb53145011f9b156ebdf601261c96acc16edfa581e1466a2fc430f62d498e6628e4e66fc68b86a1c2281906f7779bf51af69b9df02c2ac35c6b377de4968e9e9428ad60dc98f5dd6cf340d", 0x68}, {&(0x7f00000000c0)="98d968d49aaf33a5efe1ee2ed9ecd9183986bb0c2a26f64007a7dab0382a2a11c901db757959fa784da42bbc8d5cad66bccef76831c8bc9921c75b41f2c912539a47461b7e35a78fc122cd392346af64d81bada7d0c4d375d2ad25516ab71477849bed2865e87323203ff989f85b704119b285911e1c555f3f", 0x79}, {&(0x7f0000000180)="0e652c3ce72be9ee80bdc9ef445c10da157848a982cd8f8cbfa081593fd2aa411e9c371a349d5b66678df0b4de35ff2b83844b4f38a6fb52feebe32a3c6aecf1aa655fec0da400559bea725109889ed57e9d0b496c3f3fd00ae23d93915b0f536e0e933c3dec1f02036fc59eef1cec246726d8ac5dc001658387e695b92123218b33b1bf2eb78d9ce58b8cd47b2087941e2fdb33c69077167812a6fabe59e9fde555062f5cf4087b31de968c1d0d5453ac9dfcd27880a19c317d6a28e05d1278c3d0f0ac46f58081b145ca03dc9a9b41b1df40155aadaaaf66c0d2570c45b4a95b", 0xe1}, {&(0x7f0000000280)="3c4f21bc20e0bba03ea37f87400a6d704f114bc0fa50076d265f0891d2389b5490ea4a0328f902f4d9502dc3a658ed5f24edb781694b838bbb6c64a1c7d02f67f8b4", 0x42}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="5835a28b0e0a92d0b1770c27bf376490a51e67cfa93112166dde6b31e7d800bf3cb2930be3633ddf666747c15bdc43a5eafa24c7cd1d130ba02848efafea2f28d715386754088d1298b896a9301ed13d458cad11", 0x54}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="d26f0053e507655aa4b53c8be3e30c86391ce0843b5a816162482b266af7206dd2f1361669551b27852cab32b71e39ca7e4196ed190fbeb8475e27b68041114de3bab2cee25c94135180d30439dc700eccb18d608c2e9ae178f32fdc0fe278237719618dbadc38145d3e366171a27989d3aeb46f42ab30e4bf872caa819444e53b9182ecc7de5a972d8ca883a295d361a687f60e2ea3bb573c26b723dec06a87eec70e787e2359ba044a9f7aa99c80c72e735b0073ac8dc40207edec8fb0352a599c333bc642caa8b7a5135892ebc3185b688da29e48f7cfc9546cecc289bb809cf6791c51c0d50947003a79059c48676ee89179a22ec97b8f94604156030f3ac5445b4bfaa9284b93bffe49cbc1bf372779fe144beeb4534469434b528bff1c7cad07d990e6d003a5fab2eb3ad574dfd2452931439b917a835259894a251247e1c5267239522bd245b2fce62cabd7f73553d7db155ca3f1f70703bbe2720b89004a4d9eca076bc8f7adc8a8cc35916315e90d0b99eaa8ef0ce8169ad7599e933f8cf60f817974f48aa6376ded272b45ed688571c00d0b0c43d45b655aa3d8bc1a2e70f4af1358aa1406039814da00c8304118b30b0ea621c30ad6fe386a359cd361acfb7dc0e0b4b3cc568be7bb614f8abb053b15cc44755ba5b4160125b65b0c914149db9292a745580323364c1357d0e7cc7129746344067d5d62aa4db57caf3c189e850c00577df1f5bc008ed93a2ee6dc743dc15c4e9e93fcd44f584a74237597d72f8ec4993572f5f214c81d21fc9f8a25397fa4f139a32402fe57871d625bcdb2db7c2befc0638cc4035198a8b22e1e939c4e4c899c987e7b52787daa6736a6bde27bb648a73393e69eeff944a5e1cf89f94b68cd1023d4339feda263554c007660b5112e1cb71bceb910231dd4d6790f1e3f31bc52b25cb8afff740e009f3767cd55215c8d17d89442cbb1a46da88efc234af5d09e43e2137b8cfd77e192ced2904322045ffa6c47a1b2f3084a87d1eea7aea59f3ce077d71f2ca19de00ca8cc1a70637102042857acd4875de302a070ec97eacecdfc7be2e3a0d4021edf604a94822e688fa5f806fe2a14e4ef0b3d8b4a12d1035f6bdd856d36b832d66222a2b6086914f4b2eb8fbf1271a5ddb0183620275e8eeda25eb87bd049b91876bcdbe60e88ebf1741c2a9e46bff505f3d470e0a4f8ba8321a4e2c8138c5eed0e79193cc499df499ae1493d11afa424654af1ac97cefab1ea7fe5729d0b76f1adba5f6fc94f0ec8c20e0e0813cc75a97f7d4312f2309580764166f3cb5805e3fb48b3624a11776e4f99886487f6aa62d87b4cc37147186490d2bb074d54b2eebb4659038f12ec7d67ecaf490cf01360ef9d68bc39332eec759443a140453394409752681ca23046734d64ff4b718e05657d68da257ca6465d6983fb8491a28b53f750844541ffd5d1958fbce369054336936b593ba3f27265a4307034c7e7459c06ba4c2ac684cfb5f6c540ce8542eddb9d376ffa7dc4baa9c8edb4766e7d371efaf3c8b2cea3e6f1c595058e271aa1e4e7e64f49538f694fd6c77754c36f311e925a7de1fb76ab79dda570a14dbb44c982b7da99133872456f31a28786d31abb3d797f7131046ca7dd94ae8fbf07167bd2f3df14ba89b1ecc40d668f312fd0773159c03de2f1f80c3a44b88b740b34018ee401aed3ad0fedcaeb00e1315de009965ec77ab9ef4bf77670aa0191fa93bd4440a56c5d2210529a8b9dec7046606166fe1dce674fe608434d54c55d1a090e50b59299d8f5e3a22cfd63745a722e3ccc4bbefb8209be1ef2ab4fac28fe4a1a501b9a7915e043b8e5101cba5a4b97120924af7b3f03ecdfad45e2633c126f168bad68f2ca0364468d16f1e16b654e96a8b7a7d26c80c8e30175c13cd35180d78ee68bb3819ca062d3a836da9046f9012f7b697db2e3346155d5f18b38b37a6faadd6d4fe45be189fe4adb29d3241d666c39bf44ad07ea5ed42e44142d648432f15da0ddff1ea6cb5f5864f749d77ed356b90268ffacfdce17625325853723a5e712fdb8f766129def025744ea6119ae1bcba99b8d1c48f13608fdb08655c32afb42f696756adacbdde90eb57783a74e1db409f57a25e41f60a29f6a6119c5dea478f14e63e8c5276e3719acca401552c1b300a41146447c2b91855a1ebc4aaa8990bc0514e69990d9faf9a45e17b9917454abac6593472f682f1d0ccebb3a357bc55de2aa2c7881224e852896d1530669f3c90b221076b2ab8d61627071cbccff83dd2479b2de3266fcf953de5ea57828122bcdb2566e36f2908c9fe0d47d8d6c89b70d6f2449d891c509b9737d4f8029f60734d3b411d84f3f19606bc100ba9edb343d0967b1b34b89a4b29165827e26ba0f6f81e6106b6065e68c11eabc65b9a60256f769fbd3958eb71795b755b6ff65f4f92ea3dff04260a4a5ff2e2a9c66f664bcd30062b822d9908384a01100a37bb3279ae211b75f8b78cdbd8eff7a42fcc8c47f2c12a82cc732d1993290f73765b5d43f5cf5006b26c38eb7ff42a437c361d35221330f672c72b7b8fec6e008500a76f45fde100184fb8b9ff2d5fdd11ac008ce76e5e1ba051b8d532e1ca1349994c4319034bcce7613e342a0dfa3bcfc8da20105b3a3b00f01bbd59eae9717bd7e602d37d1d1deb6a922512979f593c28b41adf50e53470e4ae7eb78e786b11b05f6105c03f71e742945cbe294db2e92e8d23738fb9eee402085c6ba57a87245aea0bed24ab2280dc67704113d1165b16d900b2249e314964077d20aebece12323b53a2bca51a9871aefca0f26ff936cb4d954102dde3b1d8978ca1d9597d5253a11c4bd5f37e666edbde708d2025d4359b34641ad710fc382c2a43b6156334564c8707dfa290b7fecb808bdd7780a351dad3a52f9e503c36badefd1ad5e6fe05eeff09b126a1764ddf90c7b28c123fee67fe1ce2bbbf90f39730e4640f3b2da103b2eb39546845a6f7ca7180cc11926e7f8adf7b7a2f4e823de2458f3a157bca09ee84582de34356920781f483727d4c29246c7c8abcbd75b073a0bbaee4a3e6ef1d5f4247683651b18a226ae624c0efeaf2289dd2645a49cbf161ee9fecef89e0be2aeeba62c50a391f69186562b506a28539c04b1af2160a5d6aa896523917e20e779593b73a035214c50985875983093d983045c16b2408d6d1a9050f69ba0888e65e87c1d547ef539cad733720a6344787570aac18b197f236a87f8bd6db2da9a56ac0dd7f65093ac61a01bfc369c5c316c518fb8c297816f5d73d6ddff2e4c501a433c45a7696adc1a6d1355d39d31ef52533544a8e861991e7ccc3cd7268161f2858a4672dcf6010ec182ef7a9f8f67405bc10db62b09ae38104326cffa2754a2f723c9b776dbdd66fc2a65b890f2c01c55e90ba7ec211e3e005187324bb7f225d8c92fc763fafa0f098c080a473d67bbd6df7c9ef26e46bfc7e3fbe1d32f405646ac9d5987df60f6c2a6fa5c9a9f1196519cb52d0c782fa5289e14aab09760246de3675844b2cf50a01d27afd22b15f6cda04abe87209933d649747a8e40efdd7a23d140f70b7002f5bee3df6dd7c08904d7bc3ed944af91734a7921ab2116c32898b887031e90607becaa2afebefde43ac1a3176e239e984d813e20ebd688fcbdfa16d2b16191965d064292d8835c7df87e5acf1f338871b1433990e561ef4f8a3a9b3166d06a6c20da0f958b6cc20e64944ec93481316364f4c85442100c626a6741fa6e33c685b01a79447c34794e87fae6346566ac8bc56c0bc3a7808ed2876d4ee8a0f99d47ff23506eb12c851ee0d2d9683a71413a02bb66184675f0fc025b3aec1a9a875381e009e2d98027f8f93a94c038ab37539819639bfa83e5937586d11f4d859878dc5073d63df75f28cf39bbc2607ebd893eea5b96a1a8203a6c500565d62a4647952357722ab1cacc04c0c76eff0e295a00c3b681ea5085ac30302760cfd0d536e89f9ae349febe1a74d7ba182dd9c91ac59f7d284ae538561fae61d838ba7336f1c21a6eb3c55a8d59d4ac57601f7b21e653a1e31a67e945f916d2d8c459fe5fa5244d9cd45ed65ff94bc5b5b0893af165de47c27026c26f1b3c8b9e5ce1e2d17e602a64b0747c5df12229d87cde913a5c8e19a791cc4fbd8acda2509f42811a9f1a3fa8f597d3e107cb15364a3a171a133cfa76f0131f0ba82745b55e3c8002bdf23506a8aeb64cbd0f1265f5c9d29797a8b0040a2e231f1bc2f20b9c1612347dfdd1f38eba9f3a7c802dbe416cc398ca6482be8e301c38f2fe001ebc5a8ec61546f5a2d40864f71ae9eff8d41dea0e2a91042ba26a081078a11a4f4d6005eb00fb205121fce6d748e65e34d8ff75fed4fd4a4b7baa222cfedc30fecbfc2a6938ed4f505460db06f66a6ce9f9d2ee4a80653da8afa3a2d5b02a14a462d02170e0c9320ebadbf0ee1cb654ab1c73eb71aa1f46f8beea21fff8b1d3c8d441e9b6dd0f0845816d0afc30bf54f9c1fb792f53bd81163a38713a5708f5db390d74ee409f21f22bee4a473be49cc18327b3335dd8aa250ae4e65d1ca3fd7b06b4a638f423d185e2b32283a0f7f0793790a0e4f685477816b41020b3ff0a8198bc4f83b210ed2c39847daa1a02f6587149a1d8a089c179741c8d27a7cb69ceb7deb3c3bb1ad234ea134efc0bcb673a90fe9591827c5f3c18c505665354d50a925b706cef3474deabca62014a0d6252fb85b39d0463961ad4068f5b5d1905acb97178514f48d48742dbd2f265b99f917d888668549483f0f8749b4857fccf4314401a836dd8d8675a7970a796789814b38c2a2234964b1d5f4087201f4416247cf2a9d410450290f67c0596d7b3ca00a29d5cae565b37532bb9c32aaa92988db335326bf26d2b34db95c6ca0f036055fab52f5b41e2823b5a1533435d0dbd601a82875958ab757e83e044e0a9e159ae0441a50b163ce641aca4223ec02b964d5b19621e4521eaf8ed92120243ddd7865f29f6ab11ccb87ef988410777bc52969af26340f2e031b61148fe95f3bd01b408cff9c700b690c348091ff7235081c67710005384b78207eace11c37565b9cad364f208149f397e0ccee97ec33d18fe680eb9319bd65725d574410cdc8bd846197d0942b5d10762b85e14c4f165d75cec0c4f9bae493658f95c6cb53146f4a360fe4e451571037bd16289e848b0c7e675b8782b1d54e76c194517d0077e79ef24f1f17ed15b907e3a19a9037207b295fccc06949ba5ab8bb406c0ba94177c915fa17fb2d12f16dad87e6a76f524a8c2261c250f2574f13c174a0350fab2b9dad406f331789ea33369a5e03d927caa2df0eef8831a1f8267afb6a153fd14245748d548b6dcc63725315ecd690b38b81094d418374a32bfe36d43cf7cec147dd6bd4d25c1189d053b9bf7a51a39f0380868af08edead13c72766a8dbfee13cab85617f4f7d9cb3098bcfbefc5c27fe6528722e7a51802cc72028a790380ba958a4709e65aba5c50cb41639be8d746598f25cd41c55c8806f176075b1f9058a0675a819dd1180e864f1dffc2bf09065087ffd16b3d798950af453463d4f6aa02c36b28567c8eb46fbb72a8a175ea0c2b33609d4340c7a5e3d25a0d0c0ebc11992f1e82345b281f95a4004f4e17b7645a90d27925ec8ba9967154482500ef8d395b4f513e5aa67091507d9e6b239511d735cc7eda04777a2e9ab06e3cb7f05d7c4dcb4c9c4ede5273ad2173e04ce695a1d88d7b403b2407fa13baf728dc6d6b8eb3c5c3305a", 0x1000}, {&(0x7f0000003380)="19f8a1862d8aa974985844a77d6c8e1b891ce0d84efc939f3d4a0eba1f2ad013e81799a94deb856125d1b8363918c3c31e2bcefd32a29a06467c7ecef971d081c5fb4391f1bfd3502f7cab4ad83aec1361133ff88ea6d9fa625f1e94417bec4c4efb95fe7e6f111e17775ad42189", 0x6e}, {&(0x7f0000003400)="1e2ec33825c3d124ebf2d97fddb3075c7e2eb327110ea96bd12559f153e5d9452fb4b57d00c25344b06ae0f911ce079b316ed2fd73946d853b6e1ee3a55f778f016d04805dab07ba8f21be3b5e8e2568d3dd316db1b674ae13c77c5baf8eddab96946f72a10e01fb27bdfdab5f07f969b3", 0x71}], 0xa, &(0x7f0000003540)=[{0xf8, 0x110, 0x840647d, "2d75636227007a0c2e116a3be2d391256e1d01152eb4cfebd355ce0b0a8564fcf181e04483489e4c761f1c0fc1842ffd1d6bcaa6c08f2b4292d53ead38c29eb8eca66210dda9fb1a6f12ff50e8f57cf938096b5aaa9a1b95b5192c30b3ee08cbc07e053daa0d7da26c63754028af59b95a327fdee16211670c7e13b75fc2b98955ed9239c9752f6c51adedba34d16c0df385b80c165947d397f182a9250ae7f73133e2a698f175b77f144ea3b11ba8cb9c8cc35a527811f22f3c8218c07da28c8d625514fbc706d93f37f22baf948ec42d0e87ae33078cfa5f38c4ae3e6a9d37b1"}], 0xf8}, 0x8000) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000007300)=""/4096) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000003780)={0x0, 0x3f, 0x7fffffff, 0xffffffffffffffff, 0x0, &(0x7f0000003740)={0x990967, 0x4, [], @ptr=0x2}}) sendmsg$NFT_MSG_GETSETELEM(r8, &(0x7f00000072c0)={&(0x7f00000037c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000007280)={&(0x7f0000003800)={0x3a60, 0xd, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x242c, 0x3, 0x0, 0x1, [{0x11a4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz2\x00'}, @NFTA_SET_ELEM_USERDATA={0x101, 0x6, 0x1, 0x0, "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"}, @NFTA_SET_ELEM_KEY={0x107c, 0x1, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x48, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffff4}]}, @NFTA_DATA_VERDICT={0x28, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}]}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0xfdc}]}, {0x50, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x1f}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_FLAGS={0x8}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x100000001}, @NFTA_SET_ELEM_TIMEOUT={0xc}, @NFTA_SET_ELEM_FLAGS={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}]}, {0x1224, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xffffffffffffffff}, @NFTA_SET_ELEM_USERDATA={0x5d, 0x6, 0x1, 0x0, "76ea58ddc79f5e82ace2b57899b13e7e6ad7478efebbfe49f4fef34eb35775383a481208f550a7b076eba039d79839a56334ef4a8059ae48b87fd68d41084615b2478103fe3c02fa6cdb88e53de518b9d80c726545eef9a70b"}, @NFTA_SET_ELEM_DATA={0x1190, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x98, 0x1, "64881fc43ee15a083d5b03b1d19ff7f2847105a96accbda1739f853cfba346df1e8ee0adcd9c7c454cb4dab2121c38966133321e61984eb76a9b3c60c92b2fcdd9d33863d75fddf4ee2ab342b37066f6ef0812266e6f0ed950f5bceb2dd987431dc4768bc372824b65c198e7c6975278efaf902d4d36c26d0076525928ffc71355db46e92825fc8f606581321707a537aedf6705"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}, @NFTA_DATA_VALUE={0xed, 0x1, "1e369d44aee6587b93748042214c5ab37561005151525a549649293144232f0cbea3c02ba7d614c8ac6dc2322ba4dd0bddad9888dec80718c20b2c58fc2a7952ba513f940f46be80a56c8f941cf324ca5d96b82a1c2e213f674cf921806e1e4c6980acf8c69999ba2dd58a5453326ceb1115b4d807c7d38a07b7df3e3d3a4044fd8380e97f90f73ab2ecfcee18e07f9335a3681de6a0ed447ffd239b21544b690f747d21daafe24d79a1805e1cdb883c3578b6de21108a3611ba50a1a1ae990beacd914a7a8d24ccb21f3f45e2c6a63379ebda0cf85194989564295e446487777762b9e11360054359"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x6}]}]}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x15d0, 0x3, 0x0, 0x1, [{0x39c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x1a4, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4f, 0x1, "3200b99513c5b0a60e746baaffe29b2259d3ca0bda8c241711dbdf7fbe3922a928196896d11e528e12d9db9fa536d6979c945b699cf742a2f622f2bb63168296bcd0d3db8c0035b3918e7f"}, @NFTA_DATA_VALUE={0x28, 0x1, "9e35f4bf1c174acc85715deffb40e7dd31f12bf58d72f8ab132c989f2c45da5688e5f5c9"}, @NFTA_DATA_VALUE={0x16, 0x1, "cfc7c9da6ed9d422306b20e13cc998c6b5e9"}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}, @NFTA_DATA_VALUE={0x92, 0x1, "2d54090905c320a13b6b7ac7468a8febee6f5d76d5fe03e7a02d12148ebd83bac43e68ba4dbe018ee5b813d655b39cdccbf2aeb1ed47c953f0404bd7916eac6b7f158eb21691e6e4561ce197e57978bddd9d8ed71d0e35976d159967870382bd19ab67bb920ef9dec6c818ecd93ba50be8a77a67d676632d3bf9e897549e7f10193e28bea0bddee09b195a8dd1cf"}, @NFTA_DATA_VALUE={0x5b, 0x1, "d5edb07776e0e3f61c3ec2a5824d20da6bb72c572075b6f6b2dbd9cecff6f4d575f090485565407b11a8a16aad9f0013850806f3a2fb342bd6b809a37dd9dd633451ec0d8be5058f7f778c22811b1902e91ae1b0108d71"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_KEY={0x1d8, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xe2, 0x1, "1d343bad34b2edb957562cbab9690f44207637e5eba04308e210cc96aba8f34bb90581cad3e872f047f665f63e9a8d29012c6e3d16f067a786a1edac450ee2dcaff8aaff06eb3f70cf8c9d2917cd92c1aaf46cf6e9a1f8cc6dd4261c1cf5106d8238931283a7ab2fd851aa3302498d54df494da9b637058573b4e4a391742bf276313dc21c834a605b7a367ca786d7bb0f9d168582e8a078f97a02d0d35ab1c5d407bfa18028c782dcd63eb3528b3f36d4be34e107bccd7f219300caf107c6842b615cdbbc69f150c8a081ca1d6d6d771c5a9067da8d56c8197b1bd92446"}, @NFTA_DATA_VALUE={0x61, 0x1, "407a147672bf9dede4502edc27823adba3a518d7ead6c5a6e2e6c41e005000e67f74ca1b4e0ec5a09c7c798c648f922ba9749acbea488222472b62ba584c0fd711317a9991c806967085df7597cbd54893ae574cc46a27d1171fd757c2"}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VERDICT={0x10, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VERDICT={0x20, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}]}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_EXPR={0x4}]}, {0x1230, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0x10cc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc1, 0x1, "d840f2fbb22489122f8cde91ba20b35d660768c363e359263f04af05165604cbbadaa18119b61568d759fb743ea1bfdfdd3791036fc06b4c5f6f1463c43425f86644df5df0c6f243a2021cc7579cbad1db2aceb57569a0913f9e0ef602bdf59d0c30fcd94875ad50f24f76c543608d911056b254eb0edecde2b51322568b6ff40f58f7caafc85936df4bd8e1a491a83d4fb1619e95bf76ee3a642be3df0a27c9e5ec14a559cca1272fab45437315b92bfe08df9a67468e129ec7a0714b"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_DATA={0x148, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xd5, 0x1, "9f979e028940702b0c2d1b5fec7bd0b88068adbc7c4a516418f13259f77f9308b9e44c97c19f500326a95bffe3e816ed5b9498e28f664938be11a66891568a1986f313a612fab4c5cc141770fac0a2df7e3daedc8b44dff3de35bb8dfd5205cbe03747f7d9b6c1dc164912f5bf20309265ad774972ad3f2c4b37b9795cbaf336714b4c1e9bb790a1f740b9a30571782def27311941ad0814403f5dac6db7c2c81db9d548a8d02ecf39f8953b8597ac2eb1da2365628dc86fbdde163686d7bf36c23b9510acc89637a96bb422cfc36ff7ba"}, @NFTA_DATA_VALUE={0x6c, 0x1, "bb7341d978cf46c2e36631333f64f59365aa57d6e1a7eda63b1fd19dc555764e461c165abe5448e79475f75f441a3db9631fe74f8ce2d5b8764267ba3806a9a4e152fb510865d4cd7ef75c2e4bfc708f11f0806b4a0b2ce80752bc608a2eef871858be8a15f68026"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0xffffffffffffffe1}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}]}]}, 0x3a60}, 0x1, 0x0, 0x0, 0x4}, 0x18) ioctl$KVM_RUN(r5, 0xae80, 0x0) 01:22:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 269.959059][T10937] IPVS: ftp: loaded support on port[0] = 21 01:22:20 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:20 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:21 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r3, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x7d, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={r6, 0xaa02, 0x0, 0x8001, 0xeb5, 0x2}, &(0x7f0000000040)=0x14) [ 270.508181][ T258] tipc: TX() has been purged, node left! 01:22:22 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:24 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r3, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r6, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x1c, r4, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000800) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r4, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond_slave_1\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}]}, 0x44}, 0x1, 0x0, 0x0, 0x10006095}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r4, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'dummy0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x23, 0x7, 'system_u:object_r:initctl_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}]}, 0x78}, 0x1, 0x0, 0x0, 0x404c000}, 0xc0080) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x533801, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x170, r9, 0x1}, 0x3f0}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r9, 0x300, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x4}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x200400d1}, 0x80) 01:22:24 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:24 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:24 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:24 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:24 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:25 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:25 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:25 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:25 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x20, 0x140f, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_CHARDEV_TYPE={0x8, 0x45, 'mad\x00'}]}, 0x20}}, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @ipv4={[], [], @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x38}}}, 0x1c) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x300, 0x0, 0xb3550aa4ba878254}, 0x9c) 01:22:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:26 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0xfffffffffffffffe) socketpair(0x1e, 0x4, 0x2, &(0x7f0000000440)={0x0, 0x0}) sendmsg(0xffffffffffffffff, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x6, 0x6cc6c1) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) fcntl$dupfd(r0, 0x0, r4) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0xd9) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000001c0)={0xfffffffb, 0x2, 0x6}) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) sendmsg(r3, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4000010) pwritev(0xffffffffffffffff, &(0x7f0000000800)=[{&(0x7f0000000240)="3cbbb7b0cd878bfe1608248cd0db9c90d35b1e056bcf754f7beb6dd9f81ee146f6241c84cab7169b752e4d2155e84041d66cb07e2344b2394a3f95c204da0a2044e0938cfc3b22860550dc603a24725a2ec5473fde15b043704f0937e89b1fddb2737aed2758aaa5", 0x68}, {&(0x7f0000000380)="807f76769fa0314c658cefb9a7d9d428d798c20a1887312ac77b00a25ca738ff906b3a1c99b73feda65bb2b93fda46310f008f0ab397c65a0808f1fc432f9cca796ca817c9e48a553f5779afcd8ef5eb0acfef90063af8ec5eae996bf1e0a005a9050b150b6eba051f7bb69bc95961ab8b450321e2d2a7a15a10467907f149b24505e1a4717f910a9305a2016c273852273406833f596d85694ab8e9af94abecdd70038675f1d5be643fe25f40f02a5b70", 0xb1}, {&(0x7f00000002c0)="16cf2d868659f44d1122c1fc64027d38c0cd32a8e73bf654cd5c26b9afd6c4a18c570a558c0ad167b857b06a18b6987dc1259788f0662eafd7baef42263ae2f4caebb28b767d54547c7e1b3d06b6b36be172b243d0e75903642166311ad027a7e08016d55d25548bb1fcefc243d72161ed10e9331f0b4ada4034f59244", 0x7d}, {&(0x7f00000009c0)="7e575550485cb8e3598b0dee761b7f9429f9189bab6e9b466676282b70dbb413f58d1d3dff2e5d88fd0ab7d85189097b41cefc6f9c1e2ad00ee960e4f081fa48e75f39e19c9a86f51ed08745e837b4302e12b2e739b989ea2f94297beae38b81ff2973f3be6ab20b343945904b034bfe5cc5cdc77c61da2794c0450698c5754c3f03c6c980939ec600cea315352782f7223ca533a706c3b8de87450b7479d1ae217d71457d1918a5ffc1e849525a36bf8926b059c8e7a15a71059e3700ea9de438277966c0be95778fad3e2b32530f6287995112", 0xd4}, {&(0x7f00000004c0)="cb615943770dfab23b88e05e9f8c653f47e5cdfd40d8128a50609fdb93ac2746efb88f2b66a29d209370c2191a4c2d2f22e4136350b3e4df6adf366a7fa5632f2a361719aea0d9c4ec8fbab4bfb5799d81ff24f9349cd04993de8804d3f88f3c7fb29ae8e065a4fca585f488745da62cc0c43d6e903936e007461de3bf68c545", 0x8b}, {&(0x7f0000000540)="eb502a9b0c5a0ad7cd744a2b3bbbd193489ade9ca29eb01dd52057c30e3a4c8dce92ad5358ee2373b84598d26fd65d7ea19d7535a0ccee17e9c33a6b1073685dd675a09a68997a1d6d68c5db4fd5f2ebd5ceaff1612f9eaa28c7c15f6bc563adb670cb2ba155e74507557d6d6d1bcd5d84dcc2d37c44c262e80000", 0x7b}, {&(0x7f00000005c0)="98878df8d52a60159624", 0xa}, {&(0x7f0000000740)="0911d0b70b2417db8841ea29c01a27d847871895e90b9e927e69e0810d0813d813b883adbb7018eea22b61b188193801d64831b47714f2ac6655492f5a6c110d14a46c4ff5ab2a4459d976f7d66b599e7931d426e4000000010000000128e38d47cee1d14fe99c9862cc99ce220704c48b7f36308f88ec4abea47abdf02c138aeea032f08e1302dcd31d628b7cd11456610864fb1daaad4a0d377bf02d4f17a5d6ae86", 0xa3}, {&(0x7f00000008c0)="fbcdceb392e100bfefa77d4fb40f1450241969d0c3f0de3db35a92578c756084ac0eaab9a3b877e656635bab81a2822994cd777d59a30a73560f2a1366a511ca7818cb7e51ff74815eefc884e55539d3906c509d89e32fc705fff8e582f6e2f904178b83347d7f1954af2904e7a5495fb549033656af386e23d12fb0d7bb31ce8d1951c7b2c87dea951a14e0be1ba318aba28987d92eeff554a0bccaf5dd594ce2855f7eafff1e3b624d941289", 0xad}], 0x9, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000040)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x1fe, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12, 0x40, 0x0, 0x0, [], 0x1, 0x6}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:26 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_RUN(r8, 0xae80, 0x0) 01:22:26 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:26 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:27 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:27 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:27 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:27 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:28 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, 0x0) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:28 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080), 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0xfffffffffffffe3a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:28 executing program 4: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000080)=0x1) close(r2) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000001805000000000000000000001c140000fe0000010000517d077e1ae5063ca8f23d00000000001e823b4bdb84d37fee86a9932876c3fd5996fea183dbc951b37c47870e78bc7377904dfc9f163b6a87412af61ca6b363b4953361a756fedab5e8e7cc4876c760ee0cfe625a6b"], 0x1}, 0x1, 0x0, 0x0, 0x840}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r6 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f00000be000/0x1000)=nil, 0x1000, 0x5, 0x11, r6, 0x0) r7 = memfd_create(&(0x7f00000000c0)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r7, 0x0) splice(r0, 0x0, r7, 0x0, 0x4ffde, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r8) setsockopt$TIPC_CONN_TIMEOUT(r8, 0x10f, 0x82, &(0x7f0000000040)=0x3, 0x4) 01:22:29 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8, 0xff, 0x7, 0x20, 0x0, 0x80000001, 0x10, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x1ff, 0x7ff}, 0x43, 0x7fff, 0x5, 0x4, 0x7, 0x8, 0x2}, 0xffffffffffffffff, 0x7, r2, 0x9) read$FUSE(r0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') dup2(0xffffffffffffffff, r3) io_setup(0x4, &(0x7f00000004c0)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x340c0, 0x0) io_submit(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x5, r4, &(0x7f0000000200)="23d239c9b38a1e304ba1ea253696aec8fc802a24b5f36d15f4e7862121dc3a7f184f8434225f234c4114fe8cd15328f3d7ea1b6e7aa8a383197f7a766c50387561480c90cb210272ef3efa66674d7511548f9ded2f824ccd101503bba00c1a7b55ac4abd09212ddd27ec55de43ebe022ed7450cd7412139b6da9f93f22a4e2306de17dc4f85dde874ab240a9cb0cd982d4b09c7d875288c9fa4fb3a46433f94fab", 0xa1, 0x4, 0x0, 0x0, r5}]) 01:22:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 278.532346][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 01:22:29 executing program 4: syz_open_dev$sndpcmp(0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x1, @loopback}], 0x1c) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000180)) getpid() r2 = semget$private(0x0, 0x8, 0x0) semop(r2, &(0x7f0000000100)=[{0x0, 0x7b4}], 0x1) semop(r2, &(0x7f0000000040)=[{}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000280)=""/225) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 01:22:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:29 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x8, 0xff, 0x7, 0x20, 0x0, 0x80000001, 0x10, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x1ff, 0x7ff}, 0x43, 0x7fff, 0x5, 0x4, 0x7, 0x8, 0x2}, 0xffffffffffffffff, 0x7, r2, 0x9) read$FUSE(r0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') dup2(0xffffffffffffffff, r3) io_setup(0x4, &(0x7f00000004c0)) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x340c0, 0x0) io_submit(0x0, 0x1, &(0x7f00000000c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x5, r4, &(0x7f0000000200)="23d239c9b38a1e304ba1ea253696aec8fc802a24b5f36d15f4e7862121dc3a7f184f8434225f234c4114fe8cd15328f3d7ea1b6e7aa8a383197f7a766c50387561480c90cb210272ef3efa66674d7511548f9ded2f824ccd101503bba00c1a7b55ac4abd09212ddd27ec55de43ebe022ed7450cd7412139b6da9f93f22a4e2306de17dc4f85dde874ab240a9cb0cd982d4b09c7d875288c9fa4fb3a46433f94fab", 0xa1, 0x4, 0x0, 0x0, r5}]) 01:22:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:30 executing program 4: syz_open_dev$sndpcmp(0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x1, @loopback}], 0x1c) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000180)) getpid() r2 = semget$private(0x0, 0x8, 0x0) semop(r2, &(0x7f0000000100)=[{0x0, 0x7b4}], 0x1) semop(r2, &(0x7f0000000040)=[{}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000280)=""/225) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 01:22:30 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:30 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:30 executing program 1: syz_open_dev$sndpcmp(0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x1, @loopback}], 0x1c) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000180)) getpid() r2 = semget$private(0x0, 0x8, 0x0) semop(r2, &(0x7f0000000100)=[{0x0, 0x7b4}], 0x1) semop(r2, &(0x7f0000000040)=[{}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000280)=""/225) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 01:22:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x0, &(0x7f0000000540)) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:31 executing program 4: syz_open_dev$sndpcmp(0x0, 0x8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x1, @loopback}], 0x1c) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000180)) getpid() r2 = semget$private(0x0, 0x8, 0x0) semop(r2, &(0x7f0000000100)=[{0x0, 0x7b4}], 0x1) semop(r2, &(0x7f0000000040)=[{}], 0x1) semctl$IPC_RMID(r2, 0x0, 0x0) semctl$GETALL(r2, 0x0, 0xd, &(0x7f0000000280)=""/225) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 01:22:31 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:31 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:31 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) read(r0, &(0x7f0000000280)=""/229, 0xe5) 01:22:31 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0, 0x0, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:32 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:32 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0), 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000080)=""/120) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x1, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="00001000"]}, 0x7c) 01:22:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) close(r0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_NOTIFY_POLL(r2, &(0x7f0000000040)={0x18}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 01:22:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[0x0]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:32 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:33 executing program 1: r0 = shmget(0x0, 0x1000, 0x400, &(0x7f0000ffa000/0x1000)=nil) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CLAIM_PORT(r2, 0x80045518, &(0x7f0000000000)=0x401) shmget(0x3, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) shmctl$IPC_RMID(r0, 0x0) syz_open_dev$audion(0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) shmctl$IPC_RMID(0x0, 0xffffffffffffffff) 01:22:33 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:33 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580), 0x0, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000280)=""/229, 0xe5) 01:22:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:33 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x10002, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f00000012c0)='\f&', 0x2, 0x801, 0x0, 0x0) 01:22:33 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r1, 0x8030560a, &(0x7f0000000080)={0x84, 0x1, &(0x7f0000000040)="6b5eeb2d5a81cc344b317b5191e128cad083c74cb42b84246f", {0x7, 0x8, 0x20303159, 0x5, 0x4, 0x2, 0x9, 0x400}}) connect$nfc_raw(r1, &(0x7f00000000c0)={0x27, 0x0, 0x2, 0x7}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x7) 01:22:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:33 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:34 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000005540)=[{{0x0, 0x28000000, &(0x7f0000000240)=[{&(0x7f0000001340)=""/4067, 0x20002323}], 0x1, 0x0, 0x983a0000, 0x103}}], 0x10002, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x1, 0x4) sendto$inet(r0, &(0x7f00000012c0)='\f&', 0x2, 0x801, 0x0, 0x0) 01:22:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(0xffffffffffffffff, 0x40086424, &(0x7f0000000400)={0x0, 0x2}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x170, r4, 0x1}, 0x3f0}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r4, 0x10, 0x70bd28, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x7fffffff, @media='udp\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000001}, 0x4000000) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r5) read$alg(r5, &(0x7f0000000180)=""/186, 0xba) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) ioctl$RTC_VL_READ(r7, 0x80047013, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_QUERYBUF(r7, 0xc0585609, &(0x7f0000000000)={0x89, 0x6, 0x4, 0x400000, 0x1, {}, {0x4, 0x0, 0x6c, 0x80, 0xa, 0x5, "795ebb25"}, 0x7fffffff, 0x3, @planes=&(0x7f00000003c0)={0x8, 0x100, @userptr=0x401, 0x81}, 0x200004, 0x0, 0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_LM(r8, 0x6, 0x3, &(0x7f00000000c0)=0x8, 0x4) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:34 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x10002, 0x1, 0xf000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:34 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000280)=""/229, 0xe5) 01:22:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:34 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:35 executing program 1: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3", 0x4a, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:35 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:35 executing program 4: syz_emit_ethernet(0x76, &(0x7f0000000000)=ANY=[@ANYBLOB="0500ffffffffbbbbbbbbbbbb86dd60a4f00800403a00fe8000100000000000000d08000000aaff00000000000000010402907800000000608e5a156f8caf962d3dbff03f0e93980000000000000000000000000000ffffac141400fc00000000000000000000000000000029000000"], 0x0) 01:22:35 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:35 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="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"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d431d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907e77c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd270d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a20400000070feb55b3999b45b8b80a8438df19e183d8546f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c792122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfdd7e3e4d4e00441d9bdbacfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f364989e6952b181169e0b52f18b4ee013640d018b42ef6b0000003d1a9cb1fb4b0542358cd1530dc7aa4d35884ec59352ebec52572d81facf18da5b3766372a788d0cee235ae2ca856105ebaee86418a71decf3f5939adf585232f47d60658b3ac8ca0000000000000000"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) 01:22:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x163280, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)={0xb, {'syz0\x00', 'syz0\x00', 'syz0\x00', 0x1000, 0x7ff, 0x2, 0x5c, 0x8, 0x1, "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"}}, 0x1118) 01:22:35 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:35 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a3", 0x6f, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 285.153831][T11510] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000080)='+', 0x1}], 0x1}, 0xc100) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="a9772d9bea4824cc3854a62ffb84c4fb114d80fe4602d727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab00308727b8fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093dada728e14eefe2a74a8ee36177dcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8edaf3264d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716207ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff142dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b9d21f3b09000c5326592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7fcdf99182ab7aa2f8d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463a", 0x553}], 0x1) 01:22:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000380)="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", 0x1000) socketpair(0x2b, 0x80005, 0x7f, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r5, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) accept4$netrom(r5, &(0x7f0000000000)={{0x3, @default}, [@remote, @remote, @rose, @bcast, @null, @bcast, @rose, @rose]}, &(0x7f00000000c0)=0x48, 0x0) 01:22:36 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:36 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000280)=""/229, 0xe5) 01:22:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) [ 285.418621][T11521] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:36 executing program 4: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7fe1, 0xfff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x1, 0x796, 0x3ff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) shutdown(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) sendfile(r0, r3, 0x0, 0x80001d00c0d0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 01:22:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x42200, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000040)={0x2, 0x0, 0x2, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:22:36 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:37 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSBRKP(r4, 0x5425, 0x7) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x7d, &(0x7f0000000000)={r6}, 0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000240)=ANY=[@ANYRES32=r6, @ANYBLOB="19000000aafb40da260cbbee10c46041ad13f264d211c0f88916a1ddf4dae88848381490c0566f93cec3363e520c82af8d79bfd3be1c67ecc7fb78851551f9fc123cf90104dc"], &(0x7f0000000200)=0x21) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000000c0)=0x14) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$UHID_DESTROY(r8, &(0x7f0000000100), 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="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"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) [ 286.546111][T11609] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xa) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) exit_group(0x82ec) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x12, 0x0, 0xfd}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r4, 0x40505412, &(0x7f0000000000)={0x1, 0xbc, 0x73, 0x0, 0x5}) 01:22:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, 0x0, 0x0) 01:22:37 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:37 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="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"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a9ec8a3a63673a36d66b103e1fdbb4678731c44d5772a8b52f88132613f2ab9faa48e75b0508e2367018dc4479c6757b0a5622107e780a52d431d5dbb22107ce4584d22a35c2ff5c7069779f3a8e888a8ac94312cdb43f7907e77c5c2c9146439e6910c437a8213e177dfca08fb12f6c6a8343821e53d1f0ef24575797141dd16b8065042500017c0bab7265ba185fa61404145c500be7e57f2af455765c675c710da30fb915abbfcb8fe5e5a54f998aeb8ecb869537d7ddb529a8d66a4905586c9dd270d81d4841e2c90bd8fa2bf3802bf963edaae01ebd125510bbe75beac077af773d5d2a34b256e8369f68b0fcab87c7ee033997f53b635b59ac5aa1456d0b35e1dd734149dbcf541d744962b2bd0ece4c267760c3a6d4bce9b03000000cfa703a1a48b59700f8c902e46ae26e6e31185a19c07959edcb6bfc88c9e6bc124147521f6eb327231e35785951377c40b713a4f6854b02c428bef068f9494aa8fc9f99ddff40ef4fdc9360eb1bc2a25ac491f2bc9c7a20400000070feb55b3999b45b8b80a8438df19e183d8546f35d351a1676982ce0f2eb2c454b9df04b976179611f1be4deac0dd4c792122f3d33e52bcce38808809820094c31af5cca2d79bf783bb87588d8c21bad663bbde2644cab2b605d0ca91b5c2417ab7c7bba5173b0bfdd7e3e4d4e00441d9bdbacfd1d87ce6d257c0526fc051adaf783cb44e5f09899886b26ca746f8d2b392e0871bca6f1cb40c5ac1bf5ca80b934424deddfb547d8f9a38a25aa39752cac866986bb0faaf07ffeecd27bd736fa1a058ee5b17adbde605eb5f364989e6952b181169e0b52f18b4ee013640d018b42ef6b0000003d1a9cb1fb4b0542358cd1530dc7aa4d35884ec59352ebec52572d81facf18da5b3766372a788d0cee235ae2ca856105ebaee86418a71decf3f5939adf585232f47d60658b3ac8ca0000000000000000"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) [ 287.723158][T11642] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:38 executing program 4: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7fe1, 0xfff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x1, 0x796, 0x3ff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) shutdown(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) sendfile(r0, r3, 0x0, 0x80001d00c0d0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 01:22:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x101, 0xc900) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x206, 0x77}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) creat(&(0x7f0000000680)='./bus\x00', 0x0) 01:22:38 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 287.868691][ T27] audit: type=1800 audit(1587518558.546:18): pid=11577 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="file0" dev="sda1" ino=15859 res=0 01:22:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, 0x0, 0x0) 01:22:38 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="000000000000000008000a000f000000fad9f8c015c475c8080866213586066288d16c3a5dc2b2b2a7f54d8d984831cfec3d25f3437f94652a9431a5b19a6796a594a302e7875b3f14f42d02dfe65cf7c94e3b13cbada0e4aaa38c3fab445ce07ab06f374e56d474d14f48ca5764ad7b3ef5277520a8234da76c5bf47e707be23a04f0b3330513182bef6f497ab565e27e58127384c600000000000000bd5924932ebd158edaf639c838a0cd104b2610596bb71ee65a021da793f1fb22dff2dd034a236d441eaef1b02ee00bc9eb5bc51ec30bb91ca55faec9ffaaf9e978b60099532f323f9bfe1c0f44e18c95e83b5dad3b0ee0059f4b5ba65a3513fb9159800015cbe195dbd262f5345a4cda00"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) 01:22:38 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_SET_FPEMU(0xa, 0x1) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:38 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb5874427", 0x90, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) read(r0, 0x0, 0x0) [ 288.239390][T11681] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(0x0, 0x0) 01:22:39 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb5874427", 0x90, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 288.692973][T11725] attempt to access beyond end of device [ 288.727084][T11725] loop0: rw=2049, want=78, limit=75 [ 288.732326][T11725] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 288.817142][T11725] attempt to access beyond end of device [ 288.823281][T11725] loop0: rw=2049, want=79, limit=75 [ 288.830469][T11725] Buffer I/O error on dev loop0, logical block 78, lost async page write [ 288.842047][T11725] attempt to access beyond end of device [ 288.849951][T11725] loop0: rw=2049, want=80, limit=75 [ 288.855533][T11725] Buffer I/O error on dev loop0, logical block 79, lost async page write [ 288.865607][T11725] attempt to access beyond end of device [ 288.872430][T11725] loop0: rw=2049, want=81, limit=75 [ 288.878737][T11725] Buffer I/O error on dev loop0, logical block 80, lost async page write [ 288.888416][T11725] attempt to access beyond end of device [ 288.894299][T11725] loop0: rw=2049, want=130, limit=75 [ 288.901351][T11725] Buffer I/O error on dev loop0, logical block 129, lost async page write [ 288.911105][T11725] attempt to access beyond end of device [ 288.918387][T11725] loop0: rw=2049, want=131, limit=75 [ 288.923881][T11725] Buffer I/O error on dev loop0, logical block 130, lost async page write [ 288.934416][T11725] attempt to access beyond end of device [ 288.941215][T11725] loop0: rw=2049, want=132, limit=75 [ 288.949460][T11725] Buffer I/O error on dev loop0, logical block 131, lost async page write [ 288.960131][T11725] attempt to access beyond end of device [ 288.966012][T11725] loop0: rw=2049, want=133, limit=75 [ 288.972993][T11725] Buffer I/O error on dev loop0, logical block 132, lost async page write [ 288.982647][T11725] attempt to access beyond end of device [ 288.989557][T11725] loop0: rw=2049, want=142, limit=75 [ 288.995095][T11725] Buffer I/O error on dev loop0, logical block 141, lost async page write [ 289.008227][T11725] attempt to access beyond end of device [ 289.014114][T11725] loop0: rw=2049, want=143, limit=75 [ 289.021207][T11725] Buffer I/O error on dev loop0, logical block 142, lost async page write [ 289.031514][T11725] attempt to access beyond end of device [ 289.039344][T11725] loop0: rw=2049, want=144, limit=75 [ 289.045969][T11725] attempt to access beyond end of device [ 289.052822][T11725] loop0: rw=2049, want=145, limit=75 [ 289.061263][T11725] attempt to access beyond end of device [ 289.068999][T11725] loop0: rw=2049, want=257, limit=75 01:22:40 executing program 4: getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x7fe1, 0xfff}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x1, 0x796, 0x3ff}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, 0x0) ftruncate(r3, 0x200004) shutdown(0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) sendfile(r0, r3, 0x0, 0x80001d00c0d0) write$sndseq(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 01:22:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) 01:22:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a000f000000fad9f8c015c475c8080866213586066288d16c3a5dc2b2b2a7f54d8d984831cfec3d25f3437f94652a9431a5b19a6796a594a302e7875b3f14f42d02dfe65cf7c94e3b13cbada0e4aaa38c3fab445ce07ab06f374e56d474d14f48ca5764ad7b3ef5277520a8234da76c5bf47e707be23a04f0b3330513182bef6f497ab565e27e58127384c600000000000000bd5924932ebd158edaf639c838a0cd104b2610596bb71ee65a021da793f1fb22dff2dd034a236d441eaef1b02ee00bc9eb5bc51ec30bb91ca55faec9ffaaf9e978b60099532f323f9bfe1c0f44e18c95e83b5dad3b0ee0059f4b5ba65a3513fb9159800015cbe195dbd262f5345a4cda00"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x50}}, 0x0) 01:22:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb5874427", 0x90, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(0x0, 0x0) 01:22:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 289.451148][T11748] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:40 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffb000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 289.708887][T11749] attempt to access beyond end of device [ 289.733996][T11749] loop0: rw=2049, want=78, limit=75 [ 289.749225][T11749] attempt to access beyond end of device [ 289.803703][T11749] loop0: rw=2049, want=79, limit=75 [ 289.822991][T11749] attempt to access beyond end of device [ 289.880360][T11749] loop0: rw=2049, want=80, limit=75 01:22:40 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) [ 289.911183][T11749] attempt to access beyond end of device [ 289.938476][T11749] loop0: rw=2049, want=81, limit=75 01:22:40 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddf", 0x8b, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 289.967132][T11749] attempt to access beyond end of device 01:22:40 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 290.011136][T11749] loop0: rw=2049, want=130, limit=75 [ 290.018233][T11749] attempt to access beyond end of device [ 290.030888][T11749] loop0: rw=2049, want=131, limit=75 [ 290.050725][T11749] attempt to access beyond end of device 01:22:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x749c03, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000180)=0x5, 0x4) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000000)={0x10201, 0x1, 0xf000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r3, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = getpid() ptrace(0x10, r6) ptrace$getsig(0x2, r6, 0x0, 0x0) rt_sigqueueinfo(r6, 0x17, &(0x7f00000000c0)={0x41, 0x7fff, 0x401}) [ 290.061986][T11749] loop0: rw=2049, want=132, limit=75 [ 290.127217][T11749] attempt to access beyond end of device [ 290.167000][T11749] loop0: rw=2049, want=133, limit=75 [ 290.226171][T11749] attempt to access beyond end of device [ 290.264875][T11749] loop0: rw=2049, want=142, limit=75 [ 290.277143][T11749] attempt to access beyond end of device [ 290.283731][T11749] loop0: rw=2049, want=143, limit=75 [ 290.289991][T11749] attempt to access beyond end of device [ 290.296643][T11749] loop0: rw=2049, want=144, limit=75 [ 290.302892][T11749] attempt to access beyond end of device [ 290.310140][T11749] loop0: rw=2049, want=145, limit=75 [ 290.316768][T11749] attempt to access beyond end of device [ 290.323460][T11749] loop0: rw=2049, want=257, limit=75 01:22:42 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="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"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) 01:22:42 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="000000000000000008000a000f000000fad9f8c015c475c8080866213586066288d16c3a5dc2b2b2a7f54d8d984831cfec3d25f3437f94652a9431a5b19a6796a594a302e7875b3f14f42d02dfe65cf7c94e3b13cbada0e4aaa38c3fab445ce07ab06f374e56d474d14f48ca5764ad7b3ef5277520a8234da76c5bf47e707be23a04f0b3330513182bef6f497ab565e27e58127384c600000000000000bd5924932ebd158edaf639c838a0cd104b2610596bb71ee65a021da793f1fb22dff2dd034a236d441eaef1b02ee00bc9eb5bc51ec30bb91ca55faec9ffaaf9e978b60099532f323f9bfe1c0f44e18c95e83b5dad3b0ee0059f4b5ba65a3513fb9159800015cbe195dbd262f5345a4cda00"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x50}}, 0x0) 01:22:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000440)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x9729, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x280001c, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000140)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) creat(0x0, 0x0) 01:22:42 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) 01:22:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x3, 0xb4, 0x80, 0x0, 0x0, 0xc18, 0x8, 0x12, 0x0, 0x2f}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:42 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 291.927216][T11821] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 291.933782][T11815] attempt to access beyond end of device [ 291.951759][T11815] loop0: rw=2049, want=78, limit=75 [ 291.957439][T11815] attempt to access beyond end of device [ 291.965507][T11815] loop0: rw=2049, want=79, limit=75 [ 291.971593][T11815] attempt to access beyond end of device [ 291.977852][T11815] loop0: rw=2049, want=80, limit=75 [ 291.983768][T11815] attempt to access beyond end of device [ 291.991301][T11815] loop0: rw=2049, want=81, limit=75 [ 291.997807][T11815] attempt to access beyond end of device [ 292.003640][T11815] loop0: rw=2049, want=130, limit=75 [ 292.010211][T11815] attempt to access beyond end of device [ 292.016174][T11815] loop0: rw=2049, want=131, limit=75 [ 292.030303][T11815] attempt to access beyond end of device [ 292.036123][T11815] loop0: rw=2049, want=132, limit=75 01:22:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x10001, 0x0, 0x2000, 0x2000, &(0x7f0000001000/0x2000)=nil}) 01:22:42 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6", 0x92, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:42 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) [ 292.085269][T11830] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 292.105214][T11815] attempt to access beyond end of device [ 292.147736][T11815] loop0: rw=2049, want=133, limit=75 [ 292.180627][T11815] attempt to access beyond end of device [ 292.192630][T11815] loop0: rw=2049, want=142, limit=75 01:22:42 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x50}}, 0x0) [ 292.231867][T11815] attempt to access beyond end of device [ 292.248610][T11815] loop0: rw=2049, want=143, limit=75 [ 292.262433][T11815] attempt to access beyond end of device [ 292.274551][T11815] loop0: rw=2049, want=144, limit=75 [ 292.299978][T11815] attempt to access beyond end of device [ 292.321824][T11815] loop0: rw=2049, want=145, limit=75 01:22:43 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="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"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) 01:22:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 292.371885][T11815] attempt to access beyond end of device [ 292.401938][T11815] loop0: rw=2049, want=257, limit=75 [ 292.452223][T11867] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 01:22:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8}]}, 0x50}}, 0x0) 01:22:43 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda4", 0x82, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:43 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c8", 0x93, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) getsockname$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000040)=0x10) [ 292.684182][T11882] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 01:22:43 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r6}]}, 0x50}}, 0x0) [ 292.782554][T11897] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:43 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c8", 0x93, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:43 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r3, @ANYBLOB="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"/286], 0x28}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x50}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=@bridge_setlink={0x140, 0x13, 0x300, 0x70bd2b, 0x25dfdbfd, {0x7, 0x0, 0x0, 0x0, 0x2000, 0x14508}, [@IFLA_AF_SPEC={0xa4, 0x1a, 0x0, 0x1, [@AF_INET={0x30, 0x2, 0x0, 0x1, {0x2c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x4}, {0x8, 0x12, 0x0, 0x0, 0x4}, {0x8, 0xd}, {0x8, 0x5}, {0x8, 0x1c, 0x0, 0x0, 0x8000}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x28, 0x2, 0x0, 0x1, {0x24, 0x1, 0x0, 0x1, [{0x8, 0x1f, 0x0, 0x0, 0xf0}, {0x8, 0x7, 0x0, 0x0, 0x6}, {0x8, 0x19, 0x0, 0x0, 0x2}, {0x8, 0x2, 0x0, 0x0, 0x8}]}}, @AF_INET6={0x44, 0xa, 0x0, 0x1, [@IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xda}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x80}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x9}, @IFLA_INET6_TOKEN={0x14, 0x7, @private1}]}]}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x40}, @IFLA_PHYS_SWITCH_ID={0x1c, 0x24, "1f55a0c9145a93da2b6a7e4991fe53dbca67fa7e541e9d89"}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_IFALIAS={0x14, 0x14, 'veth0_to_bond\x00'}, @IFLA_PHYS_SWITCH_ID={0x17, 0x24, "e2c19ebba2c848c7de823e0cb1447ccc4ef7a8"}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x9}, @IFLA_GROUP={0x8, 0x1b, 0x9c26}, @IFLA_ADDRESS={0xa, 0x1, @remote}, @IFLA_LINK={0x8, 0x5, r7}]}, 0x140}}, 0x0) 01:22:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0xf000, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:22:43 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c8", 0x93, 0x1}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:43 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:43 executing program 1: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="4800000010000507000000000000000000000400", @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="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"], 0x48}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8}]}, 0x50}}, 0x0) [ 293.239939][T11939] ================================================================== [ 293.248428][T11939] BUG: KASAN: slab-out-of-bounds in gfn_to_pfn+0x4a6/0x4c0 [ 293.255634][T11939] Read of size 8 at addr ffff8880909b7468 by task syz-executor.2/11939 [ 293.263870][T11939] [ 293.266222][T11939] CPU: 1 PID: 11939 Comm: syz-executor.2 Not tainted 5.7.0-rc2-syzkaller #0 [ 293.274893][T11939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.284958][T11939] Call Trace: [ 293.288397][T11939] dump_stack+0x188/0x20d [ 293.292748][T11939] print_address_description.constprop.0.cold+0xd3/0x315 [ 293.299778][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 293.304288][T11939] __kasan_report.cold+0x35/0x4d [ 293.309240][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 293.313751][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 293.318253][T11939] kasan_report+0x33/0x50 [ 293.322589][T11939] gfn_to_pfn+0x4a6/0x4c0 [ 293.326932][T11939] reexecute_instruction+0x1fa/0x430 [ 293.332230][T11939] x86_emulate_instruction+0x880/0x1c50 [ 293.337924][T11939] ? mmio_info_in_cache+0x135/0x520 [ 293.343121][T11939] kvm_mmu_page_fault+0x308/0x15d0 [ 293.348238][T11939] ? perf_trace_lock+0x4c0/0x4c0 [ 293.353191][T11939] ? find_held_lock+0x2d/0x110 [ 293.357967][T11939] ? kvm_nx_lpage_recovery_worker+0x790/0x790 [ 293.364049][T11939] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 293.369609][T11939] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 293.375600][T11939] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 293.381159][T11939] ? handle_ept_violation+0x206/0x550 [ 293.386543][T11939] ? vmx_inject_irq+0x5b0/0x5b0 [ 293.391404][T11939] vmx_handle_exit+0x2b8/0x1700 [ 293.396274][T11939] vcpu_enter_guest+0xfea/0x59d0 [ 293.401214][T11939] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 293.406437][T11939] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 293.412854][T11939] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16e0 [ 293.418588][T11939] ? lock_release+0x800/0x800 [ 293.423369][T11939] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 293.428933][T11939] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 293.434923][T11939] ? kvm_check_async_pf_completion+0x2a4/0x400 [ 293.441169][T11939] ? lockdep_hardirqs_on+0x463/0x620 [ 293.446471][T11939] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 293.452197][T11939] kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 293.457776][T11939] kvm_vcpu_ioctl+0x493/0xe60 [ 293.462470][T11939] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 293.468893][T11939] ? ioctl_file_clone+0x180/0x180 [ 293.473947][T11939] ? __fget_files+0x32f/0x500 [ 293.478638][T11939] ? ksys_dup3+0x3c0/0x3c0 [ 293.483115][T11939] ? __x64_sys_futex+0x380/0x4f0 [ 293.488071][T11939] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 293.494492][T11939] ksys_ioctl+0x11a/0x180 [ 293.498830][T11939] __x64_sys_ioctl+0x6f/0xb0 [ 293.503430][T11939] ? lockdep_hardirqs_on+0x463/0x620 [ 293.508723][T11939] do_syscall_64+0xf6/0x7d0 [ 293.513242][T11939] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 293.519137][T11939] RIP: 0033:0x45c829 [ 293.523037][T11939] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.542752][T11939] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.551171][T11939] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 293.559151][T11939] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 293.567135][T11939] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 293.575116][T11939] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 293.583092][T11939] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 [ 293.591088][T11939] [ 293.593416][T11939] Allocated by task 11939: [ 293.597840][T11939] save_stack+0x1b/0x40 [ 293.602011][T11939] __kasan_kmalloc.constprop.0+0xbf/0xd0 [ 293.607700][T11939] kvmalloc_node+0x61/0xf0 [ 293.612123][T11939] kvm_set_memslot+0x115/0x1530 [ 293.616982][T11939] __kvm_set_memory_region+0xcf7/0x1320 [ 293.622535][T11939] kvm_set_memory_region+0x29/0x50 [ 293.627653][T11939] kvm_vm_ioctl+0x678/0x23e0 [ 293.632300][T11939] ksys_ioctl+0x11a/0x180 [ 293.636629][T11939] __x64_sys_ioctl+0x6f/0xb0 [ 293.641223][T11939] do_syscall_64+0xf6/0x7d0 [ 293.645731][T11939] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 293.651614][T11939] [ 293.653942][T11939] Freed by task 4115: [ 293.657926][T11939] save_stack+0x1b/0x40 [ 293.662081][T11939] __kasan_slab_free+0xf7/0x140 [ 293.666933][T11939] kfree+0x109/0x2b0 [ 293.670829][T11939] rcu_core+0x59f/0x1370 [ 293.675133][T11939] __do_softirq+0x26c/0x9f7 [ 293.679627][T11939] [ 293.681962][T11939] The buggy address belongs to the object at ffff8880909b7000 [ 293.681962][T11939] which belongs to the cache kmalloc-2k of size 2048 [ 293.696017][T11939] The buggy address is located 1128 bytes inside of [ 293.696017][T11939] 2048-byte region [ffff8880909b7000, ffff8880909b7800) [ 293.709610][T11939] The buggy address belongs to the page: [ 293.715252][T11939] page:ffffea0002426dc0 refcount:1 mapcount:0 mapping:000000000fa41c08 index:0x0 [ 293.724360][T11939] flags: 0xfffe0000000200(slab) [ 293.729227][T11939] raw: 00fffe0000000200 ffffea000250f248 ffffea00029b6688 ffff8880aa000e00 [ 293.737821][T11939] raw: 0000000000000000 ffff8880909b7000 0000000100000001 0000000000000000 [ 293.746400][T11939] page dumped because: kasan: bad access detected [ 293.752919][T11939] [ 293.755249][T11939] Memory state around the buggy address: [ 293.760883][T11939] ffff8880909b7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 293.768947][T11939] ffff8880909b7380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 293.777014][T11939] >ffff8880909b7400: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 293.785076][T11939] ^ [ 293.792532][T11939] ffff8880909b7480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 293.800608][T11939] ffff8880909b7500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 293.808667][T11939] ================================================================== [ 293.816724][T11939] Disabling lock debugging due to kernel taint 01:22:44 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 293.843791][T11937] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 01:22:44 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xe8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r2, @ANYBLOB="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"/286], 0x28}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xe, &(0x7f0000000000)={&(0x7f0000000240)=@newlink={0x50, 0x10, 0x581, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @vlan={{0x9, 0x1, 'vlan\x00'}, {0x18, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0xc, 0xd}}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}}, 0x0) 01:22:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000380)="1b300487f8c4f9d84b9cd73de2e84b5e4feae1ae3ed66689e4310617c19131b71851e0d7acb1b3400d8902f684b30a4ac5212742fb7917d248ea1d5ba2959fb11a2cc579599b0c49e5258460cff1cf945fe448ce5cf836c8a230fc63bd2f8932cae7b99a6b5f7451eda2661efa647d8759b40b47568305ab8e1f176c7cbf72c78f4cfee73943e85c18eed859696b6f4563cc019b396c2fac3ecf04af114c691b1bfde53c3dcfdc17468cf594ef7d0641f957f2822acf7aeb7cb7315d6a0545cd14dd1777b0526e37d1ac0d11f794fbfbbe8aaf7ec9003b82dc732f7437203d7af83806d17d41fc984d7436c5aba68339f62b98afcd2a19d68fe36ff3c9de5a898c7dea93108c150cfddeb0df5f44d2439bb87fa287953daff3c40a8e761d02448d1d8dfc89c07cac291a49cf49cb2ab903e9abdf6e0a51f2c4359593d361eb6487b4fa620da610ee389c361ea973d00018495c12e5186e129b467c13c186ea5174e6cc0b9ed4716fe5a7ceb814131d03c86bdd0f3abfdd6067627d2a666bbbbb7fe9f64b2067fec1fb51cc76d40424ce2c02baa31c0455dd4ff93a8a9f1d5d01aa9b06f99c4687a6527b15278067df8a69be873610e5c4f34c3a283fba8f8d99110e2ea605d1c135be6e0ac92941716da6fcd30bf2d2f66383b098fcbfeb0fb7a145deaf4fc883dfe57671e3213b97a2c792a00a1fd8f33ac8023ee61c2f7f207303211879eb438db8c885c0f3c33e4227e5e3473a5c2d06c55a7e1fcd6d743f4779b4c769de17884145413db3a8489b37dac9028b92bda9d3ee6a3ac379c1a7f9626e9849f1c274988fff9e4f26a4a584a5898cd9cfc82426670eb7723557eb311cd055d7dff0baaf73845efc0ce4393c56940ae1055e55a0ebbf904a46ca3554a8428ac1eeffeae9695801dd70b680dda62cf2c4373a46ac19ad6e0c74b53efbf17b143e284d3b03d45a0a7c6eb2bde5f36a63f2d20e2ad64edfd2570a99aa722359f2968536b296b25823a43817e64d1d55852a0a7c5055d6db87899b0800b9a5e40c4eda2f0e525c0902672e317384a2e0171b7f74c2aeea26822f8b57b3a0adcfddd9fcf039c6be972d632371797866864ce7f4d6bf44ea26f0c53990521f3f5c9399a894feb2d36b76b4c86932c9f6f87dc8a561f3fb70ba785df02340d33dac4743882b0b1d09b416e047b2b7d392123cc262c751580883c87ca9b031236e399a19eedcc503d6476efb4478f3a3b0be58ea148ee47eb902fb7cfe507157c9521ecb5eb2876feaba085c7400ce1eff87b19413e1c41f7efc2c63c9d53e35d7083998d52572e3e33757e2dc74cd885804612cac3ae9827fe71c9066bf27a3b2fe09386342f4d1a507f4e5740d61154f3294b273e59e1413ddbe8f60f396d0436875ed28cc78a2214caf8bad6a350274480011a4b87f088ce6a820c530dc0f8b9c7c5ea325c73ec312a7ea0e15c17128e4dfc29ef03c73effe51bcf0bc8287a60c8c1da92a952e4fb34f3236a6374ff34a4e668f0c17ae4bd02b61c4800a78a8a547464c84476a6c54dbb3f592ebd37348cb1f37c2f40e5cf0d146606826bbf4aa8c2705f0801adec8768bbbebd71606b674f746f4a12081f614dc6f83bf6d57772837029dcf2abff6b5a3c499884b20cbdeb189078575da247e811e1cfa318d97d1a257887a531f1c4b52076f59e4bf63e10961f94cdaf29aaa8c39c7a5ea58addc401d66e95d07dee32874a0fb7d38bde00e96b9e3df9035513bb0aa620a57daf482b15ece076d15ba2f45e0d03dfc352cad276f79914f8f582441ec65277e8986295ee0bb5362976217d38315cf79ee8f4f6dcdfb161d9669b184b987e4cb1b7a64f95086efcc12a28ad4d709a0dd2c379699fa7f6b0ad73cea3a3660dc33ff9929959e5e74b84e375a923705ad58bfc1c7bb0e323190ef83660ba83299a25121c8107088b2a58954f4b7d9e08d42419280fec5356a40cf8eaf1c0d0b16729a4f1d8b44a7748bf7abdd45a24db665d540cd98f69840e43854a5c7056dc6f8670f66dc95258f2af005c634d5f08d43c95a346aa9e082d6e899f5023893c81e5a7cd0e527fd22216096ee042d6b56a9b098f0cf02e5a35f025be279e5f7c5d057893ec01d28cd9a9892c63b7fc96292086f0763757e4c049a7884048415a84636ce02d399535cc9a67235980f74bd2ce0b5336448623b3a7e27c9d6fa26c8ce8226f291619ea11d127cdebee6ced7175fcdee4997659acc8aa1037e6ba74d0852196062129ca0b8b962ea557039d42534103ee114a6eb5a616efd8a6e479049d51e65ed824df64337da927ccc1a5a7d8114bfb84de477b0f74645b03a61879ace5e3baa93f4851e8f01c456545dfe61c101df29a3f3f344b7586f5e4f1af55cac1c8c51df600594c0ec4938b3d8e10ec3864628d1a3817ffb36652e5b91e538d0f16025ebc3bf4a4d7454e0da4e997e9251c3c587477e19363d0572c49ac3ced1e79b8d9f2ca59a14a6207b02311790ae081245469302f2191ab0e335b056fa63abc68fddc99d6950ed80f45d68d50b283f30fc1f7345f77332abfc3ef9cc6b0821d39a4ea569191ea79b6ad1785f85af91bdab74412ed66f4d2c8820f026b20be17e4d179fd3af87b9e7e34ea8a483350040cfdba4eb3010dea3d6bb97b85dab5d6f1e9d680982bd784180a03ec07ed8248b32e8996a8dade85e4b04b0e575f8e50d103f3cb08953811b1cbada3eb3d164f8352afefe5c5a7a3cfbb63190fefbea977d8717ac427c11eba763fc73b51e74d79a8411f0f51827f7f16a4c7b32308c97b7b184490bd4efed3f0fe8d326ca50ef255a55048ed8fc9162ebf0c134cdb0dd076dfcd376c41482a8bf7aff980e9e809126df11deeeb96d25e9c8297fa014e5a76ad5bdf3f7df4f86d3c2f42054981670705fa0860345efb98726862f88f92557f94295a68d6237d96894a27d04f8f1d580f1056c75002181619648b60eed52dbd442dcc7693588ac5282822f211244f4cb64a36d280bbe6bf9f7eeda5237d3da22386d92a34576b24a78c39913dfc1b880d8a288a9864f3ca7680d43a5cbb6ecd08ab77d098ba7451adcc84442e62fa575d9083b2b560086c408e291cd31c70ad2cbb6b8bf45d0ac358b56c40f39cbab2372720db07a9b5aeef34648d383615ae77a5528cfaba4c30bc5cafc46ef44e49c2834415219a027a09682a28406fb831ae07394909d52e5bfe9528235add981fb61408ace3472d2c3b5d7acb59aef5ff12b74d1ca38f120fecad6ed05e63db64bec55b9295c0daa17b8fac412b4bd01342faaeefa5825c90721a419804bbeac9e785bcbe393d4fc732b627365a0869002268c1912957c23b37927f6bf2133986ed734f5e21918be5ca87de6dbe8a222be69cef35aa8ff1cd4ce0216198233f34e682fe1c54e42b5ac17e4cbbae77a105eeaf2c02f45f021b406eebcd463772a2eff6026ca3614c835418ed325c134464448898ff5133a4e2e688b18910d01a3aebefbc796631b8b44ede902227e5769142df52f86f2fb3b98af721f6d5eb54af3520702112ef7a874f13bc2e2540084204db288c36d365a01df4a53077d3b2681183cce0fcc98091650e84d6dcc2a6199a7a3bd9bbadcd6cf366af5208c357470e2218df9c12a5c6d79fc06799c9eee3a94f72aa8179c1d92ebdec41502da175638be83ea8bba10bac95572ca5e532ca871ee20df663b937772c47112e531ad7013047bd380ba65ebdcf8c70ba4c89e6e2cca2bd4319feb8050c9d17ef15812825fefd2384a6186425afd8b0f3fd92d35e30fbc43fd28aa4a4f95e9c4acbcfa01635767c150c752b7fdbdfda9263e4b6c0ac7ca5b53e2664ab770b0e66ab6ffabe7b6b29bb47e34461c42dd5065e824db1c509e0d0d1666040886fde1e437d841b6b59fb6d52fa2a4a5f218ea234b86d4abd0108db87312853c357da811f9755e2888dedfc3f3fa62e4711785ce870ef138d1fb13df79cd946d15f78638784ed40bb554383714cbca157f3d7881e71deec50af1399d853622377543f6be813a176fd64a43483e3db3148d63cb1185f4f7cacd4e203d707afa0c4b8b1fa3df4f8de9fcbd555238ff484e1e790b024523d9e4e4ceb3c5a0b92fc2cafeae485a148ac4e5f488e2dcb6a37b15dc863bf28c422c4dea2a5d1469a7e6747ed6ceeb77a590aff24f17f99bd6adc2fa894b3cbe208e7d69fc3d737acbdff37c1fddbfad23a0ffa9e373113f0fc79e4b98888d75697adb115a9ad0520248335c5f8458378c0afd15ed50c2c27de8d441e45cf496c33477e4e4a7f6e4a99362c67c624d798635d19b47a280a95313105b3fdc583dbee7b87ef11a122262edfd0325867236cced00685f2f6bbdbb7d6f3775dea28c7bc93b3c463373ad7a3c35ec9b2ecbda70f6c71b203145fa275df95898f643a187c9f799b77aa3401cfd6894e00637070d3498dc1bb94687cae259b858490578f631a7987731280735b3433e064176b505fa72dd90dd220e322cc9449b4c3795a982ee8e0b24ff6ea282402ade605349c501b03875e56ecf32fd583edc29fa94e993b18f598bab700d9b1ed5e0bbf9acd2250950e9b7a25f56c4a7ff20e87b2ddaeeccd4db825f9290d8991c3df09b0fd4594c135bbc2112ad00d3439b38b18e1b9bc7411315fb0d1112d299eda156f6f91a9b3835acf9aee166910cedbaaeba834dff2cee2908cb61c4c3f7c6f6dc0325749a53326f4e583fa5cb4d680daa4d531c8c0e7575956fc5427a511cadb7e4433069f21176d518536c55200fe7b49f85400655d49443ca365cdba269916ca1ca10a8d75cab7405258d14ed6368152840df30acbc9486dbf4e0d9e0f1d198d984ac85dfcf8bfcf21db4f0bcc0ed5f657b10ecac7b16144445a870c0031c864e047fcd32d74a61b38330e50b3c63554b13924fd075e66069db7e8978e2bc78887ee55006e1918af4bf2c142ad725ded291b7f4bd168a71d22221c256487bfc06f2bfe255b7b739030ea5b41f57307cdd3c214377717025c9f8227faa1187b0561eca8e17590cb1d1bad40d5ce42a60778477849875a926c58ed5e3b0e9ac68d15b83f7e2a000681793ff0f5b80536b467e0185f4ed02c251a072022bd2c14437585132795e3837125899845ead10437a18ba154d99085a7eabb533d1825d603ad557db4ef7543d97de47b81a7fc1cf2a89828e99f16ecdd7f322903974d59fe11540478fdb2751425864174fbe945e13a3c0e8cc124339762f53a18cea8cc8cf5b422c0cddc0103ba13e0008b746be0e18fc1885ad7a8b7eb0ecc4c612736a627fac6e6b89bc6d2a4b3537e1c2e8356fba257ec8370a99c0a7026b1b6b4edbe3cd0395849b3898a3feeb655da27f10a589e04eee79b726dc854ed09380aa7941deec5ab85ce03f58c751605cd40c1c9aeacf5ae8a3047dbf6cd8a9ee17ded6329c8ec86d5018087d8935d4049864d942bf2758d265ff92f9f02c1b4d4c1b633f9fca14e1b10f156f5274b59e64834f60d32092458f5a4549252a33710003073d95b4f34afa93b63be53cc1218c3017e488d483ca7700209f5ba23e7e105cc4f59f23d5c10940c60c7dbe70f9471e23f2fea14fbd0571961784d3b533fd7578a1440cb2fa42e75b8ce38573b0739e2c4e10619800a0218b47987ce0699923e7881ec0d474302180b00bc5d9282e279caa42b0592bff1098620a251529b25ac2b91c3f054d5433fcb77597be2b08cbb356f4b9b0109aaf7cdd4c6eab687a29ce152456132538db6aaa0c6b", 0x1000) socketpair(0x2b, 0x80005, 0x7f, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r5, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) accept4$netrom(r5, &(0x7f0000000000)={{0x3, @default}, [@remote, @remote, @rose, @bcast, @null, @bcast, @rose, @rose]}, &(0x7f00000000c0)=0x48, 0x0) 01:22:44 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 293.972316][T11952] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 01:22:44 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x1}], 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:44 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) 01:22:44 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x8, 0x12}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r3) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000380)="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", 0x1000) socketpair(0x2b, 0x80005, 0x7f, &(0x7f0000000340)={0x0, 0x0}) sendmsg(r5, &(0x7f0000003b80)={0x0, 0x0, 0x0}, 0x0) accept4$netrom(r5, &(0x7f0000000000)={{0x3, @default}, [@remote, @remote, @rose, @bcast, @null, @bcast, @rose, @rose]}, &(0x7f00000000c0)=0x48, 0x0) 01:22:44 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x0, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000080)=0x5, 0x2) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94}], 0x100488, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000180)={r0}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'vmac64(sm4-generic)\x00'}}, 0x0, 0x0) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x26, 0x19}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000240)="fb6af322054f5ee9c0c92d8784ad099bcb44ec8f438d6b6a6cb5788cb5bfbe04d6f1104a6ccb", &(0x7f0000000280)=""/25) [ 294.233607][T11939] Kernel panic - not syncing: panic_on_warn set ... [ 294.240234][T11939] CPU: 1 PID: 11939 Comm: syz-executor.2 Tainted: G B 5.7.0-rc2-syzkaller #0 [ 294.250292][T11939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.260354][T11939] Call Trace: [ 294.263647][T11939] dump_stack+0x188/0x20d [ 294.268053][T11939] panic+0x2e3/0x75c [ 294.272040][T11939] ? add_taint.cold+0x16/0x16 [ 294.276770][T11939] ? preempt_schedule_common+0x5e/0xc0 [ 294.282249][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 294.286757][T11939] ? preempt_schedule_thunk+0x16/0x18 [ 294.292169][T11939] ? trace_hardirqs_on+0x55/0x220 [ 294.297197][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 294.301699][T11939] end_report+0x4d/0x53 [ 294.305858][T11939] __kasan_report.cold+0xd/0x4d [ 294.310711][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 294.315216][T11939] ? gfn_to_pfn+0x4a6/0x4c0 [ 294.319723][T11939] kasan_report+0x33/0x50 [ 294.324053][T11939] gfn_to_pfn+0x4a6/0x4c0 [ 294.328386][T11939] reexecute_instruction+0x1fa/0x430 [ 294.333674][T11939] x86_emulate_instruction+0x880/0x1c50 [ 294.339232][T11939] ? mmio_info_in_cache+0x135/0x520 [ 294.344431][T11939] kvm_mmu_page_fault+0x308/0x15d0 [ 294.349545][T11939] ? perf_trace_lock+0x4c0/0x4c0 [ 294.354485][T11939] ? find_held_lock+0x2d/0x110 [ 294.359254][T11939] ? kvm_nx_lpage_recovery_worker+0x790/0x790 [ 294.365332][T11939] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 294.370883][T11939] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 294.376868][T11939] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 294.382417][T11939] ? handle_ept_violation+0x206/0x550 [ 294.387795][T11939] ? vmx_inject_irq+0x5b0/0x5b0 [ 294.392642][T11939] vmx_handle_exit+0x2b8/0x1700 [ 294.397496][T11939] vcpu_enter_guest+0xfea/0x59d0 [ 294.402431][T11939] ? vmx_vcpu_load_vmcs+0x960/0x960 [ 294.407740][T11939] ? kvm_vcpu_reload_apic_access_page+0x300/0x300 [ 294.414158][T11939] ? kvm_arch_vcpu_ioctl_run+0x23a/0x16e0 [ 294.419883][T11939] ? lock_release+0x800/0x800 [ 294.424567][T11939] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 294.430117][T11939] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 294.436102][T11939] ? kvm_check_async_pf_completion+0x2a4/0x400 [ 294.442261][T11939] ? lockdep_hardirqs_on+0x463/0x620 [ 294.447560][T11939] ? kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 294.453287][T11939] kvm_arch_vcpu_ioctl_run+0x3fb/0x16e0 [ 294.458838][T11939] kvm_vcpu_ioctl+0x493/0xe60 [ 294.463530][T11939] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 294.469946][T11939] ? ioctl_file_clone+0x180/0x180 [ 294.474973][T11939] ? __fget_files+0x32f/0x500 [ 294.479658][T11939] ? ksys_dup3+0x3c0/0x3c0 [ 294.484073][T11939] ? __x64_sys_futex+0x380/0x4f0 [ 294.489015][T11939] ? kvm_get_dirty_log_protect.isra.0+0x670/0x670 [ 294.495431][T11939] ksys_ioctl+0x11a/0x180 [ 294.499762][T11939] __x64_sys_ioctl+0x6f/0xb0 [ 294.504356][T11939] ? lockdep_hardirqs_on+0x463/0x620 [ 294.509644][T11939] do_syscall_64+0xf6/0x7d0 [ 294.514149][T11939] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 294.520036][T11939] RIP: 0033:0x45c829 [ 294.523931][T11939] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.543550][T11939] RSP: 002b:00007f53b2fffc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.551966][T11939] RAX: ffffffffffffffda RBX: 00000000004e7ac0 RCX: 000000000045c829 [ 294.559940][T11939] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 294.567923][T11939] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 294.575901][T11939] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 294.583874][T11939] R13: 00000000000003c0 R14: 00000000004c6499 R15: 00007f53b30006d4 [ 294.593210][T11939] Kernel Offset: disabled [ 294.597529][T11939] Rebooting in 86400 seconds..