[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 41.874521][ T26] audit: type=1800 audit(1553689376.964:25): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 41.903064][ T26] audit: type=1800 audit(1553689376.994:26): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 41.925345][ T26] audit: type=1800 audit(1553689376.994:27): pid=7706 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.134' (ECDSA) to the list of known hosts. 2019/03/27 12:23:08 fuzzer started 2019/03/27 12:23:11 dialing manager at 10.128.0.26:34077 2019/03/27 12:23:11 syscalls: 1 2019/03/27 12:23:11 code coverage: enabled 2019/03/27 12:23:11 comparison tracing: enabled 2019/03/27 12:23:11 extra coverage: extra coverage is not supported by the kernel 2019/03/27 12:23:11 setuid sandbox: enabled 2019/03/27 12:23:11 namespace sandbox: enabled 2019/03/27 12:23:11 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/27 12:23:11 fault injection: enabled 2019/03/27 12:23:11 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/27 12:23:11 net packet injection: enabled 2019/03/27 12:23:11 net device setup: enabled 12:27:08 executing program 0: 12:27:08 executing program 1: syzkaller login: [ 293.616428][ T7869] IPVS: ftp: loaded support on port[0] = 21 [ 293.831091][ T7872] IPVS: ftp: loaded support on port[0] = 21 [ 293.844312][ T7869] chnl_net:caif_netlink_parms(): no params data found 12:27:09 executing program 2: [ 293.923579][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.932518][ T7869] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.950597][ T7869] device bridge_slave_0 entered promiscuous mode [ 293.979223][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.002199][ T7869] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.012496][ T7869] device bridge_slave_1 entered promiscuous mode [ 294.095926][ T7869] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 294.122618][ T7869] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 294.136342][ T7874] IPVS: ftp: loaded support on port[0] = 21 [ 294.167620][ T7872] chnl_net:caif_netlink_parms(): no params data found [ 294.183040][ T7869] team0: Port device team_slave_0 added [ 294.192640][ T7869] team0: Port device team_slave_1 added 12:27:09 executing program 3: [ 294.294782][ T7869] device hsr_slave_0 entered promiscuous mode [ 294.371738][ T7869] device hsr_slave_1 entered promiscuous mode [ 294.448650][ T7872] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.456434][ T7872] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.464770][ T7872] device bridge_slave_0 entered promiscuous mode [ 294.474422][ T7869] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.484677][ T7869] bridge0: port 2(bridge_slave_1) entered forwarding state [ 294.492630][ T7869] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.499723][ T7869] bridge0: port 1(bridge_slave_0) entered forwarding state [ 294.519736][ T7877] IPVS: ftp: loaded support on port[0] = 21 [ 294.530986][ T7872] bridge0: port 2(bridge_slave_1) entered blocking state 12:27:09 executing program 4: r0 = creat(&(0x7f00000005c0)='./bus\x00', 0x11) iopl(0x2) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x7}, 0xff7f) epoll_create1(0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) modify_ldt$read(0x0, &(0x7f0000000300)=""/144, 0x90) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000003c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2040) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, 0x0) r6 = gettid() getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioprio_get$uid(0x0, r7) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) socket$inet6_udplite(0xa, 0x2, 0x88) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r6, 0x15) close(r5) ioctl$VIDIOC_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f00000001c0)={0x0, @reserved}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000600)=0xc) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000500)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000000c0)={0xb8, 0x8, 0x7ff, {0x77359400}, 0x80000001, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) timer_delete(r8) [ 294.547856][ T7872] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.557586][ T7872] device bridge_slave_1 entered promiscuous mode [ 294.665212][ T7872] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 294.747873][ T7872] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 294.766852][ T7869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 294.818481][ T3258] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 294.822178][ T7880] IPVS: ftp: loaded support on port[0] = 21 [ 294.832917][ T3258] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.852869][ T3258] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.862400][ T3258] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 12:27:10 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x200) [ 294.893941][ T7869] 8021q: adding VLAN 0 to HW filter on device team0 [ 294.953203][ T7872] team0: Port device team_slave_0 added [ 294.965025][ T7874] chnl_net:caif_netlink_parms(): no params data found [ 294.989631][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.011953][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.020333][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.027532][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.042420][ T7872] team0: Port device team_slave_1 added [ 295.075068][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.083757][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.092872][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.099923][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.107771][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 295.116453][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 295.142330][ T7884] IPVS: ftp: loaded support on port[0] = 21 [ 295.204411][ T7872] device hsr_slave_0 entered promiscuous mode [ 295.261628][ T7872] device hsr_slave_1 entered promiscuous mode [ 295.322728][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 295.331626][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.349522][ T7877] chnl_net:caif_netlink_parms(): no params data found [ 295.374785][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.439745][ T7874] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.447479][ T7874] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.456650][ T7874] device bridge_slave_0 entered promiscuous mode [ 295.469637][ T7874] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.477804][ T7874] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.486083][ T7874] device bridge_slave_1 entered promiscuous mode [ 295.513420][ T7877] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.520563][ T7877] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.528566][ T7877] device bridge_slave_0 entered promiscuous mode [ 295.536219][ T3258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 295.545598][ T3258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.558498][ T7869] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 295.569413][ T7869] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.588164][ T7874] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 295.602135][ T7874] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 295.610584][ T7877] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.618606][ T7877] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.626893][ T7877] device bridge_slave_1 entered promiscuous mode [ 295.634556][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.643313][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.652567][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.661081][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.669655][ T2988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.730606][ T7880] chnl_net:caif_netlink_parms(): no params data found [ 295.756256][ T7877] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 295.768199][ T7877] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 295.789634][ T7874] team0: Port device team_slave_0 added [ 295.797773][ T7874] team0: Port device team_slave_1 added [ 295.816671][ T7877] team0: Port device team_slave_0 added [ 295.828286][ T7877] team0: Port device team_slave_1 added [ 295.934419][ T7874] device hsr_slave_0 entered promiscuous mode [ 295.991840][ T7874] device hsr_slave_1 entered promiscuous mode [ 296.046235][ T7880] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.054222][ T7880] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.062760][ T7880] device bridge_slave_0 entered promiscuous mode [ 296.114284][ T7877] device hsr_slave_0 entered promiscuous mode [ 296.181837][ T7877] device hsr_slave_1 entered promiscuous mode [ 296.242169][ T7880] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.249354][ T7880] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.257894][ T7880] device bridge_slave_1 entered promiscuous mode [ 296.282681][ T7869] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.350111][ T7880] bond0: Enslaving bond_slave_0 as an active interface with an up link 12:27:11 executing program 0: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000240)={'syz'}, &(0x7f0000000300)='\a', 0x1, 0xfffffffffffffffe) r1 = accept4$unix(0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000080)=0x6e, 0x0) accept4(r1, 0x0, &(0x7f0000000200), 0x80000) r2 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="3894e0aa755678642797c675ec97969c56f2bf12f6039bb83db491604e9211ccc8408e7618ea37393e03de7717926ee49759d8a25fe0ee491d33465a996e601cab82e84deffd4f43b4b8de7c4fc0f12375966fce546ed08ab352a291b7f16898f20eb89ab513fe62e97796f94ae97e59c92f1eb86a95087d0372707700c803790f74e808663977e98054589d308059a63b0534d429abbad8c75335c1bcd5f596b4ef809be3492bf40907de6a8cedbb24290c9e878204418bbe903f3ced734530", 0xc0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000180)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0x53, &(0x7f00000001c0)={&(0x7f0000000040)={'sha224-generic\x00'}}) [ 296.421829][ T7880] bond0: Enslaving bond_slave_1 as an active interface with an up link 12:27:11 executing program 0: r0 = socket$kcm(0xa, 0x4, 0x87) sendmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x3}, 0x4}, 0x80, &(0x7f0000001a80), 0x1, 0x0, 0xfffffffffffffd5d}, 0x1) [ 296.474176][ T7884] chnl_net:caif_netlink_parms(): no params data found [ 296.553664][ T7880] team0: Port device team_slave_0 added [ 296.561129][ T7880] team0: Port device team_slave_1 added [ 296.600773][ T7872] 8021q: adding VLAN 0 to HW filter on device bond0 12:27:11 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x401c5820, &(0x7f0000000000)={0x18}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x5) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x4, 0x9, 0x1, 0x9}) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={r0, 0xd961}) ftruncate(r0, 0x0) 12:27:11 executing program 0: r0 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) syz_open_procfs(r1, &(0x7f0000000480)='cpus\x00\x00\xabKH\xed\x89\x06\xb6[t\'B\xa8\x8e\x00\xbd\xc0j\xa0n\xf8a\xcb\xc3? |\xd5\x0f+\a\'\xea\r\x93t\xa15\xebX\xb5\xdb\xd3\xbd\x9ab\r.\'\xd4\xe7D\x01|\xcf5\x00\xae/\x86\xde\xaa\xf72\xb1\xd0e\xc2=\xad\x00\x96Z#\xad\xdf\n\xe6\x82~\xd5Z2\xc3\xc9\x9az-\xb8\x92;\xbd\x0fC\x18)\a\x00m\x16C\x00\xcf\x17\x06\x16B\x85\x8a*\xe4\xbdp') ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) [ 296.703923][ T7872] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.715148][ T7874] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.773725][ T7880] device hsr_slave_0 entered promiscuous mode [ 296.783639][ C0] hrtimer: interrupt took 34527 ns [ 296.794829][ T7880] device hsr_slave_1 entered promiscuous mode 12:27:11 executing program 0: r0 = perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x2000000000000e) syz_open_procfs(r1, &(0x7f0000000480)='cpus\x00\x00\xabKH\xed\x89\x06\xb6[t\'B\xa8\x8e\x00\xbd\xc0j\xa0n\xf8a\xcb\xc3? |\xd5\x0f+\a\'\xea\r\x93t\xa15\xebX\xb5\xdb\xd3\xbd\x9ab\r.\'\xd4\xe7D\x01|\xcf5\x00\xae/\x86\xde\xaa\xf72\xb1\xd0e\xc2=\xad\x00\x96Z#\xad\xdf\n\xe6\x82~\xd5Z2\xc3\xc9\x9az-\xb8\x92;\xbd\x0fC\x18)\a\x00m\x16C\x00\xcf\x17\x06\x16B\x85\x8a*\xe4\xbdp') ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) [ 296.834294][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 296.848512][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.857067][ T7884] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.870533][ T7884] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.886908][ T7884] device bridge_slave_0 entered promiscuous mode [ 296.902581][ T7884] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.909685][ T7884] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.920741][ T7884] device bridge_slave_1 entered promiscuous mode [ 296.943341][ T7884] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.954320][ T7884] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 296.974932][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 296.987191][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.997213][ T7883] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.004364][ T7883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.013932][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.040026][ T7874] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.061619][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.069572][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.078293][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 12:27:12 executing program 0: r0 = socket$kcm(0xa, 0x400000000803, 0x11) socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x30, 0x0, 0xa4a2ec234f6862) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0xaeb}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2}, 0x8) [ 297.087489][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.096915][ T7883] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.104075][ T7883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.112275][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.121132][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.175067][ T7884] team0: Port device team_slave_0 added [ 297.185564][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.199413][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.209183][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.218917][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.227878][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.237310][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.245968][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.254735][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.263393][ T3262] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.270455][ T3262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.278267][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.286276][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.302152][ T7877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.312881][ T7884] team0: Port device team_slave_1 added [ 297.320245][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.331472][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.339712][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.348401][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.357001][ T3262] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.364137][ T3262] bridge0: port 2(bridge_slave_1) entered forwarding state 12:27:12 executing program 0: r0 = semget$private(0x0, 0x2, 0x0) semop(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = semget$private(0x0, 0x2000000207, 0x0) semop(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x1800}], 0x1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x2, 'veth1_to_bond\x00', 0x1}, 0x18) [ 297.375821][ T7872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.436481][ T7877] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.513531][ T7884] device hsr_slave_0 entered promiscuous mode [ 297.551791][ T7884] device hsr_slave_1 entered promiscuous mode [ 297.601251][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.608984][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 297.616965][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.652427][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.663634][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 297.672726][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 297.681468][ T3262] bridge0: port 1(bridge_slave_0) entered blocking state [ 297.688601][ T3262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 297.696778][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 297.705401][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 297.714149][ T3262] bridge0: port 2(bridge_slave_1) entered blocking state [ 297.721304][ T3262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 297.729379][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 297.748381][ T7880] 8021q: adding VLAN 0 to HW filter on device bond0 [ 297.771518][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 297.789532][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.798233][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.806945][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.816109][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 297.825225][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 297.833831][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 297.844282][ T7872] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 297.869127][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.877717][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 297.886146][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 297.894584][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 297.904030][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 297.912784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 297.922636][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 297.933295][ T7874] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 297.944311][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 297.953554][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 12:27:13 executing program 1: connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, {0xfffffffffffffffc}}, 0xe) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffdffbffffa4, &(0x7f0000000000)) finit_module(r0, &(0x7f0000000080)='+.cpusetvmnet0}-md5sum%bdevnodev\x00', 0x3) [ 297.970177][ T7880] 8021q: adding VLAN 0 to HW filter on device team0 [ 297.991967][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 297.999711][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.035963][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.057438][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.089330][ T7874] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.104415][ T7877] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 298.130572][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.139716][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.148582][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.157913][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.166488][ T3262] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.173688][ T3262] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.204001][ T7877] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.211071][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.221019][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.230053][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.238653][ T3262] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.245742][ T3262] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.254904][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 298.280179][ T7884] 8021q: adding VLAN 0 to HW filter on device bond0 12:27:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="1400060000000000"], 0x14}}, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) [ 298.332520][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 298.358397][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 298.368137][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 12:27:13 executing program 3: r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101400, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0x7768, 0x10001, 0x80000001, 0x800000010000000}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000000c0)={r2, 0x1}, 0x8) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, 0x0, 0xe3) [ 298.404637][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 298.416828][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 298.448219][ T7880] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 298.470417][ T7880] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 298.500386][ T7884] 8021q: adding VLAN 0 to HW filter on device team0 [ 298.508789][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 298.517427][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 298.528316][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 298.537615][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.546507][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.555442][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.563959][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.572654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 298.602003][ T7880] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 298.611075][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 298.620930][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 298.629738][ T7883] bridge0: port 1(bridge_slave_0) entered blocking state [ 298.637043][ T7883] bridge0: port 1(bridge_slave_0) entered forwarding state [ 298.691885][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 298.700000][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 298.731972][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 298.740463][ T7883] bridge0: port 2(bridge_slave_1) entered blocking state [ 298.747622][ T7883] bridge0: port 2(bridge_slave_1) entered forwarding state [ 298.756875][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 298.766161][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 298.775385][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 298.784061][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 298.792938][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 298.801837][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 298.811993][ T7883] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 298.830785][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 298.843272][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 298.857666][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 298.867118][ T3262] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 298.889537][ T7884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 298.915977][ T7884] 8021q: adding VLAN 0 to HW filter on device batadv0 12:27:17 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) r2 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r2, 0x0, 0xc8, &(0x7f00004fd000)=0xfffffffffffffffd, 0x4) sendmmsg(r1, &(0x7f0000000200)=[{{&(0x7f00000004c0)=@in={0x2, 0x4e20, @multicast1}, 0x80, 0x0}}], 0x1, 0x0) 12:27:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x01\x01\x00', 0x2}) socket$unix(0x1, 0x5, 0x0) 12:27:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, 0xffffffffffffffff, 0x400001, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x27, 0x0, 0x1, 0x6, 0x2, 0x8, "248dd98d1eeb654cf044bd75aea13a9cb1cc8d384f2fb8d451db34350c47d2f9cec61caa7eff4d9a64155c266d1937854b709fe09a92e2c4436d6e01a8f457", 0x18}, 0x60, &(0x7f0000000600)=[{&(0x7f00000001c0)="505f2dc86114077e71b4eaca0482babea3724641e90691af4735b45e068070df7560f9b4902bc4643128406a3d9e5e3ee66f8bbefd3ce04ac40f8b1ee233215d0961838377da30ad28ee294250f2e9ceec03dd3c1516fa824f87542a5f0bbe5da41dbdbc45d6a26e07dbaafc62dadc70ec4a941be7649fb8caccea3b505d4ee832813b899188", 0x86}, {&(0x7f0000000280)="b1207c3182cc08ad8b1324ad6695a270c64c2900cf5764d717f75918158a38e7f913e6f0bb2475f2b40fd4e2779b62407842d7fbbcd9c1f0269ed56cbf7fe5a45d08c2ffd06b0af7c37393691f3c8624d12a6daddf0449829b9c7c9ecba1c1190b1542162283573ef0feae9fbc3c9f04b0b4baa0189178c18b912ed65517623e0c3a2f0a224f18e273a8013807bfabe71bfbcf81d7ce8294458af0bc4ad84d4d55c4de9a", 0xa4}, {&(0x7f0000000340)="651311aa1527d469c57a375499b74d2020a04dfd3e16c0469ea674edab36979380d8bf9ced87b15e7d11bd46a6402b0613afe733a34e4159a880a539831ab6a77ccb26a489785ab68e960072b736693f3f2948fbf5d985f4a6ff283708302858d1f28dac9cf4cb8ce31b1c2f5c4cd2a8e5f1b55fa56f729e3441fa888135f34c526fdd48e81513bdc64c46fdd8606f893f9d11dbe62b8777466b9f41a5bb89f2d52b4738850e32e7284119a086f9a7694ef33c55879e7431e7e15fcd524e71bba45050e6fee4613282397aa43504d0d8f5e7711639327b9fe2b5bff45518e42104a27db5bcafe2354ea3592a73c898fdba1d1059cdc540", 0xf7}, {&(0x7f0000000440)="ef4dabb50ddbc9673f59b7d8f5574d9bf028f3f728e4109d995d1ab5086efba83e7bc107b9f615789041967c6b1c32c84bd8319dbce8f3ada020b0f405231267dbc1c861fecf795af0d13934fe898e5cdeacbaf3fa2b07767fb7cf4edc8cdfcf013d1115744fafcae74637d5234904321d0b6a2a8e32b955760586cca1f37b0d5e6c22461bbfacc32dca76a0f1c125896c59934092976a0f2c221e8a831a9871", 0xa0}, {&(0x7f0000000500)="b4d15cd4d3b9f84085e3514330a7f09ef3a3bc7411b4d9c14e4fd79949be4b22520255f56217e9bb1c41e5f7330a609caab249d39baa68fc891c482c95206a5f5979c38d04bc538ed595bc17248cbab12ed9d448a277e9753c948692566659fbdfd390c12eb07978094c64e0050e9c2db0ff907665e3dd25589a0f6263dd074b764e67d40f4b381957550c1eaf63df9353807b82a6a76796addfaa296cf756fb80b59e5b9bafd92870a0ed3e0e375c9996e39315044aad1c12824cdf533b78ae31eb603f192095dea4b7a20616239af55e3695effcc7265c", 0xd8}], 0x5, &(0x7f0000000680)={0x90, 0xff, 0x20000, "f2638c382b1f05385305ad4e4d2e6f93f6d019b8f99942cbc2f0744ae80f6391b3b59b794112b198e300df41f410851dcfaed2c57a8a516b68b020c74c75af02bd50cd8cda33f3b5781a97f5fbe746aac2bd582eba7527f2bc8c968ff704b9b1e3927e0f46e2957293f8cbcfe3b8619ee0a27e154cdb27b765"}, 0x90, 0x20040814}, 0x40) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xed, 0x200) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000100)={r1, r2, 0x2, 0x1}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") unshare(0x400) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x400000001e, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000740)={0x0, 0x5}, &(0x7f0000000780)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000007c0)={0x8000, 0x20a, 0xff, 0x8, r4}, 0x10) 12:27:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x1, 0xf93, 0x2}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffd, 0x0, 0x820005, 0x0, 0x2}, 0x2c) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f00000000c0)={0x4, 0x1, 0x1}) 12:27:17 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x8a6080c253f4bd24) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) fcntl$addseals(r1, 0x409, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='/dev/zero\x00') r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000040), 0x8) 12:27:17 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'vcan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="390000000a000000c5bc476201800000060000001f000000ff0000e2cb146a000000008a11000000000004afd47c607cf0612d024ff9d4eade08f0a7347bb8db8aae5667cc11f6a4dc9e7544ccbe4ee753a1876648e2ca5a3f979dddc8566ede023d0f86c6d9647315bfff7eb523d312e776c84fa859c9d2e54cced5fecce39aa7ecb38603b3edbfd1cd4f8413c816711c33f73f888cdb12eb00000000000000000000000000000000000000000000"]}) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x400000000000098, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000006c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1f}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20008000}, 0x80) syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r1, &(0x7f0000000600)=[{&(0x7f0000000280)=""/184}, {&(0x7f0000000340)=""/140}, {&(0x7f0000000100)=""/27}, {&(0x7f0000000400)=""/151}, {&(0x7f00000004c0)=""/100}, {&(0x7f0000000180)=""/60}, {&(0x7f0000000540)=""/84}, {&(0x7f00000005c0)=""/44}], 0x100000000000019b, 0x0) 12:27:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) write(r1, &(0x7f0000000040), 0xfffffe4f) ioctl$TCFLSH(r0, 0x540b, 0x0) r2 = socket$inet(0x2, 0x80a, 0x5) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000000)=0x7, 0x4) 12:27:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) prctl$PR_SET_FPEXC(0xc, 0x10000) [ 302.065927][ T7972] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:27:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x8000, 0x0) syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x2, 0x400) syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa00) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x401, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x10) syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x9, 0x20000) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xffffffffffffffff) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r1) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendto$unix(r1, 0x0, 0x0, 0x8000, 0x0, 0x0) io_setup(0x7, &(0x7f0000000240)=0x0) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) 12:27:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) dup3(r0, r0, 0x80000) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x20080, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x5, 0x74b, 0x20, 0x5]}) 12:27:17 executing program 5: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x8000000100079) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000040), 0x0) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x0) r0 = socket$inet6(0x10, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, 0x0, 0x8040, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000400)={&(0x7f00000003c0)=""/42, 0x105000, 0x800, 0x47}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) clone(0x4080002182001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\f', 0xffffffffffffffff, 0x4c00000000006874}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) [ 302.229997][ T7989] syz-executor.2 uses obsolete (PF_INET,SOCK_PACKET) 12:27:17 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xc) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 12:27:17 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x4, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="05630440c8f9e49c24ccbf4683c96665839f6c65d81e97ac6518ba6fa91ee741e6aadde4ca3fb7edef47b9470a6f4d288d45a4663f62dbb9d80d69cc742e10f693f5bc1354a1c240931394984e60f1383b2a95d4fa96beb12ceedafb8f6c3fe13499d4b6ee698eadde9f38e2f646421833e40951b2419ba0b7a0156ee4d416892f655c6e5cf08b4e11b5abef03b8a61a58d8a087cc08045521a0436882ac890acbd169c28b03b28320107e3f8a19a8607ea3a3c75c8664faf090ec9ad740004f0c"], 0x0, 0x0, 0x0}) r2 = dup2(r1, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x4c, 0x0, &(0x7f0000000900)=[@transaction_sg={0x40046307, {{0x0, 0x400c630e, 0x0, 0x0, 0x40406300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) 12:27:17 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$sndseq(&(0x7f0000832ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc05c5340, &(0x7f0000000000)) 12:27:17 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x4000, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x7ffb, 0xa0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x9) write(r2, &(0x7f0000001000)="edca4c00e7b354e40b9e0fd32a1175327fea151502c06217aca17db3131e6072cdfd69e7cd5135eaf6568d7607c841192f7e70236b57d96863375712e7058c4ec548f381d55e4615590c64443ae8179f6366cb59df8f61a1b11de7270c39ed664c816cb657ed2f4356b28b105e42ae1edb6fb192cdea77ca26c662b4f30fd0c225f5b7cf5a2de1929e24eaea1551b46903f3dda28db6ba3305c52cc91723e93bc452f55b53a12a59b2975c6e3bea28edefd3726a64e3967b6e87164f0cb0de76bf87225d1748b0a068ece9ff12be45a4142ab3d2c88d67d8248d0d8c4b3d64dce1c6bc4cd8c39d96e8da06a72feb2a5a470b45ab3b18d7e0331b480bc058a009ee7ada1645f5e67d55bbbc623bf8478c0aa18881cbda37c97961535d77556a35ce2863776499910491a8bed4f921a43e3b70809cd53b0e8f15834e10cac343cce6935b5dc6069cf82895a814b8be42d95f41e20aea0ba0012139613289a155ae79402d93ea47425daca8e2ff0db9d2580179f22f7adf5e971427d02c606d7d9399303280e6f2f53eafee5078b9ccbdd3633b95008e1ebf72b8acd87047684af0c322f142e1a155afed365d3990ada50cfc5924224a9102959f9bb0a66765bcf2f7b8780168148dacc98065901ac465f6a6e5f4425e4d232599a5a968135816e5a0863a6eaddb6aa7f7b0e32b589254494242497d0c569165d1e40865a2fdfa3b36e348f289f57a9de57fd076f96ba3d6da5f646dc85ba6fa1681e2bc7cc96e998df36b940e423007046d78e150137075b0488a8f94f056ed5a8ee93f26952a36a755d2a2099d4e14489ac60a4b318cad79b60d7a58cf71fdf149aaf0dcc3ac30a4ab41c9bd3ef0ac9f310d8b44ffd4d5988f552f544d5eeefe295bf51d6e2ca0556a61c081b0ca54eea19ed7f5a187ac1109539ed7bf5a59750600377e451b831b56bc6b5fd534187e1cf113585e07ad578f7bd0d2424306cdd45e69727e13f18d69107b107ad558472aab0ee915839862a94a45ecdfdeb4732c3558a0ea878aeb5eb54e6f3fdfc149838fbfbac8c219d87e29c724670e706d2479fb4e41ce189b379d9d1f37af43fd2d53434fcaeaea0ea94eacd62071e924fccfdc26d8e1635efdbd7bb678fc0ee60081f47ac16d82c340c53421761a549511fac31fb4ef513c6c95635231863ec86035182a50ef7142ec000ebae17d822f91a58663ec3b7b2754cc526f3f4dc6b8adace6e8244fb6d12c2c0da3f4086a0ef28e84e1af34a2fdfc07b9c8e652f097bdfd5517c1ad6711d60637fb8f3fe0d83cb2689b396e6d406d661aa474b883ef1e1ab9f5c11f7ac5fd61a77700d65652e04f7bb4ae0d81ed84236618149fefaeafd36c2345d6156b80988a5b6e12e97f17570b7c66a91dc895293137e11d8ea2c3a5ee255ebdebc5815e436d2eb1976e22f4d72704b9863bcac10a697917fba6ca5d0aa8f44dca72bf59e82e21cc4fdeadd3baa90cbde1a287aab6c163cd3a6a898de9a18bce8749523f1bc9d99e96b49069954d90a60e08fdae720f8b1e1205783d525573fe329486eaa1bae4975723d0c5d715248c26558bdf8a04347e6202ff079ff207c215db8cc295ae153963489a6928af57bddca93cc03b4fd3fc0cd886d4de975125e4ea888c9baa1fd4ac7e81fc24ea42f854bce47810d44aa3887a9e47fe9a28e6e8244de7bfe91671a9cd9a0ff77ca1f1c42506c61ee668ad75875f6b947a8983a61042b478b376039e190aa5f1db4fe52c7fcd401a3b25c3008b1eef4dad0313ba261c3301f0923b9394a3fa233440e1d84282edbd18a24730b460354c362fb21016b79a934dac80e4d00534cf88bce6db34823b6a630479147a8abcbccf2ca41f8bedcc9695a01840669fe22dd32916bae5fea1af5ba89be819444f235d0faa7e8c32c4d3da1efb8b367e738c94248c9a69322409d869289484761415a2ff0e9bcfa337b5ab751da35ed1dc2e77d36a20129808780eab232064c98ee4ea1cd9801d6e71e1b16a28911dd249f49387a361517febdfcc305d9d0cb3992674dab33b41bdf232f151ccd3192025aaead5a30e3cf0a057fe36dc29577980f81bcc57c2f052136a13eed2bb6816e44d43af2b80a218fc7d5e06669a5b175fbdb288b7f70386043ca97a059b3c3e868a861b7053288d36d875a8152ab2ae5cefe454baa6d6a32a64beeff8991004dbeafb43b1a095391db2a8ed9c2f93a47157145fd1515ccc0d96d876edf92cd196382278496db5b41e0478b32eba040b8e088b9014dc3b44410ede0d400a0a0d1b77271695e6494d3c2e4cf11aa25593891b80e2eeff5ac31b522ba5b906425830bd215fe1b1227a5af91978af872decba7db9455bb37252b4d152ac41d8b0cd5edb75902be27dcce1816dd07c2d095b259f6892b937e83c21a5c36488816dd28baf4b010009c62147f66770b4ced321bf17b1aceb7f9afe864f6c389a25c3c0a22f4fd8a900ffb18e633e0ffaaa413df47b9e689416092eb3a69c32b2e41b573b49ffabdd73db7b97d9864d038039843c21b36c0394a1104d1feee652e3c4c1a6d991d518e0ad9dc210cc6b6480f97c9856737ee9c1e349b1d129ac8bb53939964da7fa8c511f9ce648bb9c7679181c1f433b35337089e9b50f97b346c25eff2fc3486d69575f28025ab0253ef56a405a51a6da27ab9de3e189daccd5eaa88a6212d866bd2382952d7e57a5b93391ff1400eac67f6c9fef11ef9931b9162710198ea6d00041b113010f7aed955a1cfff0bceb1f0fb714429fbc9f695bb2ac7de7bac3f52c23690c46fa0febf80df782e72daf5a9cd0acfed6f26b851313a0b04f37eb1bcdfe17a37794fa9058feee52a58d4c2959c66f71933fcd66a0187d8a31880341cae695f50e80d7f9cfbf98b57eb024b2e61f31cdae882b53211da15e2e26f6577a408542674c56cb10a95d44b9c2a5e8970832c007d5ff9f26cd96ddc9dc059fff8cdadfc60fd78f47e7cc99f648d65ff18fd824d990c3c137b3b79ea6a55eac895cfebfc12ab8addef871baee1317021440fa8a8dc049a9bf4ff9452a5695577abce5ba96897677fb698f1ae17771a9b71aef8f2c06f4459fe6052737377834333421bdf38aa3c7ecbd22b518a51fbbad3b85f322df1dbbf79f68377718d3810558055170ebaeb90cb1463699679cb2f486e7845f729fc8f23b65283f098c910bbe4b06f7f06b1b0c41ff5b2d097d46cf4050cc74c9413b6809cc4d2e1a1e770bd69251f2010f4994aa73a229991abd79b222b79bd2e45f7b3d912365ca8646e686650401f8b05eb124bbac4078c416f9df21f53e6076dfd3e2d6153f0b91d484f0f0d36a0073099b4ee997bac02345e5fa49670a8b5968449ab508bb8d8663428974633f07e3f5f4b3d2cc0b6ffd5fdec7417137f4c05a1162412b6c4bdeaf110a90a2ba17947fe82fe2c1ddbc9a5a2cae29b8cc929c9ed47f195d06968cc036022c35a225678972fefbd7b6d6d8e7a26bbeb702246a736daca4bc1ed6cc8b3ee9894abc5178601289120c64884ed3055bb062e0c3891df2fa2ca33ce6da4bb884a4b43ba94871cd5ad5771b1503b61759fc843b7a2829cf0cfeabad5cf6902124", 0x58e) io_setup(0x100, &(0x7f0000000480)=0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000640)={0xffffffffffffffff}, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f00000006c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) io_cancel(r3, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x8, r2, &(0x7f00000004c0)="a618f134a8b419a0bb72b137c715c9d849d3a6857a1111c1c12f3cc25e151a90f97b01b986b1010de96b75919dbaab18d06c30843152182229380e86d61cecb45360ef73677c831b189a3eb39da51160a1aa9078f8c83a985709012cba331c72e2d120ad1e9e3b0058c195cb6a2e1499eccc032bed9ca742038e23f374025c4db16abf81826a4c4c80106ef3f1c077bf91c30f5aa38c45fabef0a9bb864bd4457160a44665a1277a6d7e6fdd434a6ffd7aa55cde7e30a6688fab85010bcccb89ec3bfe46352037c03e0a538b72b908749d2f2c8798838bed", 0xd8, 0x6, 0x0, 0x2, r1}, &(0x7f0000000600)) r5 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x0) ioctl$BLKROSET(r2, 0x125d, &(0x7f0000000180)=0xffffffffffffffe1) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f00000003c0)=0x2) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r0, 0x0, 0x10018) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000380)=0x10) sendto$packet(r2, &(0x7f0000000240)="249f291cbe681b042aef7d116baa2849dac0b29bc5b6c209d681fbc7d5f7d857e007b0bc05c156e056b28d94ce3003003f433813c7157646eb9670862ac2dc92412b3b3792b93b89615a9c03b67eeb35d547f08974722e36f75962cbba512caab34b846e2ffd204124efe5e5180af9b287369448d7c2fc1a9ee973e049ea684a98285159916679772bd2d65952cd0bd847a4a1010aa6144e63bb10564a853c1a132f66ac9e4dee0055d65a5b28086fc0526ea38d41be93553e7df70520c96ddb9f77a3cca1376e6e49fd7621ae8b2061939b42d8f7db3d8c96314fca2b1a92c7105d35904c9a6b4881b13c2aac19d504de150c39ddfd54e4b9229cedcad8c5", 0xff, 0x20000001, &(0x7f0000000340)={0x11, 0x11, r7, 0x1, 0x3, 0x6, @broadcast}, 0x14) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000000)) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000400)=ANY=[@ANYBLOB="010100000000000009000000000000000300000000000000", @ANYRES32=r5, @ANYBLOB="00000000060000000000000000000000000000000000000000000000", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="00000000e604000000000000005d062eb543172afd00000000000000"]) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0xfffffffffffffff7) 12:27:17 executing program 4: unshare(0x200) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) modify_ldt$write2(0x11, &(0x7f0000000000)={0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3f, 0xfffffffffffeffff, 0x3ff, 0x3, 0x4, 0x400}, 0x10) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000540)={{0x5, 0x9}, {0x6, 0x9}, 0x3f, 0x0, 0x2}) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000140)={"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"}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)) [ 302.433860][ T8009] binder: 8008:8009 Acquire 1 refcount change on invalid ref -1662715448 ret -22 [ 302.473705][ T8009] binder: 8008:8009 DecRefs 0 refcount change on invalid ref 0 ret -22 [ 302.484976][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 302.485022][ T26] audit: type=1800 audit(1553689637.574:31): pid=8014 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="file0" dev="sda1" ino=16541 res=0 [ 302.509848][ T8009] binder: 8008:8009 BC_REQUEST_DEATH_NOTIFICATION invalid ref 0 12:27:17 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000440)={0xf000000, 0x7, 0x400, [], &(0x7f0000000400)={0xbf0b79, 0x40, [], @string=&(0x7f00000003c0)=0x7ff}}) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x200, 0x100) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x0, 0x2, 0x1, r1}) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000140)={0x0, 0x80000001, 0x9, [], &(0x7f0000000100)=0x6}) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e23, @local}, {0x7, @dev={[], 0x27}}, 0x8, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 'ip6gre0\x00'}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000600)={r5, 0x6, 0x9, 0x6}, &(0x7f00000005c0)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r7 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r7, 0xc008551a, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000018"]) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000340)) syz_kvm_setup_cpu$x86(r8, r9, &(0x7f0000014000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r9, 0x89e0, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000580)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mremap(&(0x7f000001b000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000022000/0x4000)=nil) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)) 12:27:17 executing program 4: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) tkill(r2, 0x35) r3 = getpgrp(0xffffffffffffffff) capget(&(0x7f0000000000)={0x20080522, r3}, &(0x7f0000003840)) [ 302.551091][ T8009] binder: 8008:8009 transaction failed 29189/-22, size 0-0 line 2994 [ 302.629885][ T8025] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 302.634414][ T12] binder: undelivered TRANSACTION_ERROR: 29189 12:27:18 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000440)={0xf000000, 0x7, 0x400, [], &(0x7f0000000400)={0xbf0b79, 0x40, [], @string=&(0x7f00000003c0)=0x7ff}}) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x200, 0x100) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x0, 0x2, 0x1, r1}) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000140)={0x0, 0x80000001, 0x9, [], &(0x7f0000000100)=0x6}) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e23, @local}, {0x7, @dev={[], 0x27}}, 0x8, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 'ip6gre0\x00'}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000600)={r5, 0x6, 0x9, 0x6}, &(0x7f00000005c0)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r7 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r7, 0xc008551a, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000018"]) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000340)) syz_kvm_setup_cpu$x86(r8, r9, &(0x7f0000014000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r9, 0x89e0, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000580)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mremap(&(0x7f000001b000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000022000/0x4000)=nil) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)) 12:27:18 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x1c) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0x3f, 0x30, 0x10001, 0x5}, &(0x7f0000000300)=0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000000), 0x4) bind$unix(r2, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000180)=0x14) ioctl$KVM_ENABLE_CAP(r4, 0x4068aea3, &(0x7f0000000480)={0x79}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r4, r5, &(0x7f0000fe1000/0x18000)=nil, 0x0, 0x179, 0x0, 0x0, 0xffffffffffffff9a) ioctl$KVM_SET_LAPIC(r5, 0x4400ae8f, &(0x7f0000001940)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfe2f) ioctl$KVM_RUN(r5, 0xae80, 0x0) 12:27:18 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x2}, 0x2f) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r0, 0x406, r1) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000080)=0xfffffffffffff1a1) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), 0x0}, 0x18) 12:27:18 executing program 4: r0 = socket$kcm(0x11, 0x20000040000000a, 0x300) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$RTC_VL_CLR(r1, 0x7014) r2 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000080)={r2, 0x40, 0xb88}, &(0x7f00000000c0)={'enc=', 'pkcs1', ' hash=', {'ghash-clmulni\x00'}}, &(0x7f0000000200)="e569a9c4c7c166b4018aec44d2ed8c13df292490e5ffc471c13b05a6b9502ac9b56e7e071663076a6abe5b66cd806e39a32c0b3dc727656b5eec4c53d4c843c6f1d5eb0b13831b84249af9b7f5982e4f566a432dee767cae21d5c524b02411d2ed0bb211f6ef63f2241715baa460f500849063a595cb5890fe893e37045eaca243c695d2c310b13d23", &(0x7f0000000140)) recvmsg(r0, &(0x7f000000c240)={&(0x7f0000000180)=@xdp, 0x80, 0x0}, 0x0) 12:27:18 executing program 3: r0 = syz_open_dev$vbi(&(0x7f00000006c0)='/dev/vbi#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000100), r1, 0x2}}, 0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000000)=ANY=[@ANYRES32=0x0, @ANYBLOB="140080008085fd757b9e4313148e7c724391502432c42be3"], &(0x7f00000004c0)=0x1c) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000540)={r2, 0x6}, &(0x7f00000005c0)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='net/ipv6_route\x00') r5 = syz_open_procfs(0x0, &(0x7f0000000840)='\x00') r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000680)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1010000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x70, r6, 0x300, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}]}, 0x70}, 0x1, 0x0, 0x0, 0x8800}, 0x24048011) dup2(r5, r4) 12:27:18 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000440)={0xf000000, 0x7, 0x400, [], &(0x7f0000000400)={0xbf0b79, 0x40, [], @string=&(0x7f00000003c0)=0x7ff}}) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x200, 0x100) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000200)={0x0, 0x2, 0x1, r1}) r2 = syz_open_dev$sndctrl(&(0x7f000000a000)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r3, 0xc0285628, &(0x7f0000000140)={0x0, 0x80000001, 0x9, [], &(0x7f0000000100)=0x6}) r4 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f00000002c0)={{0x2, 0x4e23, @local}, {0x7, @dev={[], 0x27}}, 0x8, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1a}}, 'ip6gre0\x00'}) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000600)={r5, 0x6, 0x9, 0x6}, &(0x7f00000005c0)=0x10) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r7 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r7, 0xc008551a, &(0x7f00000001c0)=ANY=[@ANYBLOB="0900000018"]) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$VIDIOC_G_AUDIO(r3, 0x80345621, &(0x7f0000000340)) syz_kvm_setup_cpu$x86(r8, r9, &(0x7f0000014000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, 0x0, 0x0) ioctl$SIOCRSGCAUSE(r9, 0x89e0, &(0x7f0000000040)) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000580)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r9, 0xae80, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mremap(&(0x7f000001b000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000022000/0x4000)=nil) ioctl$sock_rose_SIOCDELRT(r4, 0x890c, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000480)) 12:27:18 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0x4100) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x40) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={0x0, 0x8fc3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={0x0, 0xd01}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000280)={r3, 0xde, 0x400, 0x1, 0xa0d, 0x5f, 0xca, 0x0, {r4, @in={{0x2, 0x4e24, @broadcast}}, 0x1d2, 0x371c0163, 0x1ff, 0x0, 0x4}}, &(0x7f0000000340)=0xb0) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ftruncate(0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xffffffffffffffff, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x20000000) dup(0xffffffffffffffff) syz_read_part_table(0xfffffffffffffffe, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) [ 303.151633][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 303.157972][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:27:18 executing program 3: add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f0000000ac0)="10323000038741aa81c32cbfd79af8b0063e529c15ba1e620a1c21f0f95a9f00a713d13d717c59306b74df47c2981ca1521ea8ca", 0x34, 0xfffffffffffffffc) [ 303.243099][ T8054] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:27:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') exit(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r2, 0x34, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @ib={0x1b, 0x0, 0x8d2d, {"2c0a414c3fa9b7c61a1736905885279f"}, 0xfff, 0x2, 0x3f}}}, 0x118) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') 12:27:18 executing program 3: socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp(0x3, 0x0, &(0x7f00000000c0)={0x0, 0x0}) dup3(r0, r1, 0x7fffc) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000100)={0xc8d, 0xeb, 0xffffffff, 0x0, 0x0, [], [], [], 0x8, 0x81}) 12:27:18 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xae9, &(0x7f0000000100)=0x0) r1 = userfaultfd(0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000009c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) 12:27:18 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) vmsplice(r2, &(0x7f0000000580)=[{&(0x7f0000000080)="1d64d09690059f5dc845d4b80dd18dc5ff8bf5fce026071f2c2eac3fe67845d816c2c823ab152267c216ba10", 0x2c}, {&(0x7f0000000240)="fd9f7e", 0x3}, {&(0x7f0000000280)="2ecfa8997b515412373927652a0fb648d88cfb1c758d32be793929923fc69c7cf43c277d9f715d02549670baa5e8d3016044d7fed497e5ce762a66e7e73232076bfd665441f2c0971883e286687b62a074564826544831fc5efa472438d94ab8c7f25c60f5e3410a6164598b6f0ed35c45252de930e230c915bb6ee74f57d48eda440676", 0x84}, {&(0x7f0000000340)="fe639729e9330c744cf47f6d91afeee2476c8268ceb0a7f67dd4d85faaa3ffc3ef90f9ea9ac55113a9ae75bfac46ddaaa609014a82e12af4d0e0091402cd0e761618f1e9ab2961cade651c829f18f673861f2d6b99744cb0", 0x58}, {&(0x7f00000003c0)="8d497294601176c452ea2497641a31725cbe93033a5916079da25b0fd04d08d3e80d2ea1e0cc6637a3f3f8bf3a254494199d96f73cf5d0a26167240fd6835f7d26d20d0fa4bafa660cbe8abff1b908bd022033c7bc5b6dfa4d8f7c0505f7509cfe4ba4da712db569ec6debcb5c8f3223958e8e6a0d0e9970ae1eed80ff0e582a6cc38d0f390ab011a38e324b1b585d46ee22df8a76ffe0df89df102da0a89848c8b854b9b5f24bee01146e6f6310e3eeffadb6490e24a92f17038af99a9029deb5b36b9f32e85b5bbe645e01c5efa1a166e10b24b7e5d07a59b6ead6639b6a529366b164", 0xe4}, {&(0x7f0000000540)="7331faa19a17f5b06d49b33f354f4422a6ffbed72346417262ffb254fe06e42147839ecc19b2f1e9ee1fa1e73ce876a51daa8b1f5d4511c97d", 0x39}], 0x6, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x21) fcntl$notify(r4, 0x402, 0x8000002b) close(r3) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x6, 0x10000, 0x8}) getpgrp(0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs(0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000000000443) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f00000006c0)) 12:27:18 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x400) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000240)={0xb, @sliced={0x6, [0x1, 0x0, 0x101, 0x7fff, 0x100000000, 0x100000001, 0x9, 0x4, 0x0, 0x5, 0x1f, 0x7, 0x3, 0xf6a, 0xe7, 0x401, 0x81, 0x7, 0xc3a4, 0x1, 0xfffffffffffffff7, 0x9, 0x7, 0xbc1, 0x2, 0x2, 0x0, 0x81, 0x3ff, 0x1fe, 0x2, 0x3, 0x0, 0x9bb0, 0x7f, 0x7, 0x7ff, 0x7, 0x1, 0x8, 0x51, 0x8001, 0x44e5, 0x7fffffff, 0x8, 0x7f, 0x7ff, 0x3], 0x7}}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0xfffffffffffffdeb, 0x0, 0xffffffffffffffff, 0x0) [ 303.618731][ T8077] kvm: vcpu 0: requested 34784 ns lapic timer period limited to 200000 ns 12:27:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_vs\x00') finit_module(r0, 0x0, 0x1) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x9, 0x1) 12:27:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000000)={'bond0\x00', {0x2, 0x4e20, @loopback}}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000002e09000000000000000000001d010200180002000000000000010000004fb6a45bd0d76a9a6ff600"], 0x2c}}, 0x0) 12:27:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4, &(0x7f0000000040)="0adc1f12e117c3deaabbb1adae0ec2de0d5bccda7a5e205199c64f701c18b5f6a678fbbae447d76f019d280d3abdda3cfbf27ce458e18d83120821cf211080ca9b54d66804efa15ae13acb2e8c4c3cbf52662e239fdc75c39ac6") bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x1c}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 12:27:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x200c0) setsockopt$ax25_SO_BINDTODEVICE(r0, 0x101, 0x19, &(0x7f0000000100)=@netrom={'nr', 0x0}, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r1, 0x500, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000040)) syz_read_part_table(0xe01f0300, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000080)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl(r0, 0x0, &(0x7f0000000140)="ade2233ba0448ff157e432acc183c19ab5398af2c79a6f7c5f13dc7837defcada0adb1d55bc969e6a2ecb8fb747fc8cb728fa6987d053628267a72727fa18f0f3a3c3ee847573f6d0fcffa2523dd36fe02a2a1f0221ead57b3c1642945611335513d407b28ad18caa6dc79c4c2800f9108804c4d0292e07ac569c8217ba12e349414a73c21a4fd5cc11e139f54fdb528feb417ae5fc1f309e43e6aaa3ad9e2e3f5018e2f31ce7c2689d8b51007671c9eada747d74f1afd4defafc0c151efb2e0508c59b142e8232b92750cc7a8a1503925f63a8629d59493ac584df2576108fdc3cacd8d7fe1c30e3b") 12:27:18 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) vmsplice(r2, &(0x7f0000000580)=[{&(0x7f0000000080)="1d64d09690059f5dc845d4b80dd18dc5ff8bf5fce026071f2c2eac3fe67845d816c2c823ab152267c216ba10", 0x2c}, {&(0x7f0000000240)="fd9f7e", 0x3}, {&(0x7f0000000280)="2ecfa8997b515412373927652a0fb648d88cfb1c758d32be793929923fc69c7cf43c277d9f715d02549670baa5e8d3016044d7fed497e5ce762a66e7e73232076bfd665441f2c0971883e286687b62a074564826544831fc5efa472438d94ab8c7f25c60f5e3410a6164598b6f0ed35c45252de930e230c915bb6ee74f57d48eda440676", 0x84}, {&(0x7f0000000340)="fe639729e9330c744cf47f6d91afeee2476c8268ceb0a7f67dd4d85faaa3ffc3ef90f9ea9ac55113a9ae75bfac46ddaaa609014a82e12af4d0e0091402cd0e761618f1e9ab2961cade651c829f18f673861f2d6b99744cb0", 0x58}, {&(0x7f00000003c0)="8d497294601176c452ea2497641a31725cbe93033a5916079da25b0fd04d08d3e80d2ea1e0cc6637a3f3f8bf3a254494199d96f73cf5d0a26167240fd6835f7d26d20d0fa4bafa660cbe8abff1b908bd022033c7bc5b6dfa4d8f7c0505f7509cfe4ba4da712db569ec6debcb5c8f3223958e8e6a0d0e9970ae1eed80ff0e582a6cc38d0f390ab011a38e324b1b585d46ee22df8a76ffe0df89df102da0a89848c8b854b9b5f24bee01146e6f6310e3eeffadb6490e24a92f17038af99a9029deb5b36b9f32e85b5bbe645e01c5efa1a166e10b24b7e5d07a59b6ead6639b6a529366b164", 0xe4}, {&(0x7f0000000540)="7331faa19a17f5b06d49b33f354f4422a6ffbed72346417262ffb254fe06e42147839ecc19b2f1e9ee1fa1e73ce876a51daa8b1f5d4511c97d", 0x39}], 0x6, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000980)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec\xad\x1b\xa2\xf4x\x1d\x9f\xf5\xda\x9a\"\xf97\xf4i\x91e\xd5f\xbf7N\x13\xbe\xbe\ve\x82\xa1\xd2b\x06\xb5\xebt\xb1b\xefd\xb0\xecbf\x96\xd4\x88\x99\xeeh\xc5$\xc3\xf4D\xac\xc4P\xe3\x98R\xef\xf4\xdb\x017\xef\x90\'n/\x88\xae\x93\vx\'\xdf]A\x97\x99\xadr\xdcvw\xbf\xac\x9e=\xe1\xd8P\xea\x10}\xdbC\xab\xae\xf9\xcfS|\x9ce\x12\x8eV\xa8\xd2\xc7\x9bJ', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x21) fcntl$notify(r4, 0x402, 0x8000002b) close(r3) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0x6, 0x10000, 0x8}) getpgrp(0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_procfs(0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x10000000000443) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f00000006c0)) 12:27:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, &(0x7f0000000540)) accept4$packet(r3, &(0x7f0000000580), &(0x7f00000005c0)=0x14, 0x800) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000500, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_UNALIGN(0x6, 0x100000000000002) request_key(&(0x7f0000000000)='logon\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)='/\x00', 0x0) readahead(r2, 0x0, 0xf83) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000780)=ANY=[]) open$dir(0x0, 0x20000008004, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_genetlink_get_family_id$ipvs(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) 12:27:19 executing program 0: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40000, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x2000000000000001}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) setxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x1, 0x7}, {0xa3b, 0xfffffffffffffeff}]}, 0x14, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000f8dfe0)={{&(0x7f00002a9000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000722000/0x1000)=nil, 0x1000}}) 12:27:19 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0xffffffffffffffa0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="b7f2288a", 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x420000, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000002980)=[{{&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000000240)=""/246, 0xf6}, {&(0x7f0000000340)=""/4, 0x4}, {&(0x7f0000000380)=""/88, 0x58}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/57, 0x39}, {&(0x7f0000001440)=""/124, 0x7c}, {&(0x7f00000014c0)=""/171, 0xab}, {&(0x7f0000001580)=""/197, 0xc5}, {&(0x7f0000001680)=""/247, 0xf7}], 0x9}, 0x200}, {{&(0x7f0000001840)=@generic, 0x80, &(0x7f0000001bc0)=[{&(0x7f00000018c0)=""/186, 0xba}, {&(0x7f0000001980)=""/106, 0x6a}, {&(0x7f0000001a00)=""/75, 0x4b}, {&(0x7f0000001a80)=""/111, 0x6f}, {&(0x7f0000001b00)=""/135, 0x87}], 0x5, &(0x7f0000001c40)=""/178, 0xb2}, 0xffff}, {{&(0x7f0000001d00)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d80)=""/135, 0x87}, {&(0x7f0000001e40)=""/86, 0x56}], 0x2, &(0x7f0000001f00)=""/39, 0x27}, 0x8001}, {{&(0x7f0000001f40)=@nl=@unspec, 0x80, &(0x7f00000021c0)=[{&(0x7f0000001fc0)=""/235, 0xeb}, {&(0x7f00000020c0)=""/238, 0xee}], 0x2, &(0x7f0000002200)=""/249, 0xf9}}, {{&(0x7f0000002300)=@xdp, 0x80, &(0x7f0000002680)=[{&(0x7f0000002380)=""/65, 0x41}, {&(0x7f0000002400)=""/161, 0xa1}, {&(0x7f00000024c0)=""/31, 0x1f}, {&(0x7f0000002500)=""/237, 0xed}, {&(0x7f0000002600)=""/109, 0x6d}], 0x5, &(0x7f0000002700)=""/197, 0xc5}, 0x100}, {{&(0x7f0000002800)=@rc, 0x80, &(0x7f0000002940)=[{&(0x7f0000002880)=""/179, 0xb3}], 0x1}}], 0x6, 0x40000000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000002b00)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000080)={0x1, 0xab, 0xa}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000002b40)) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000002bc0)={0x0, 0x0, 0x3}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000002b80)={r3, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={r4, 0x80000, r1}) 12:27:19 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) fstat(r0, &(0x7f0000000bc0)) 12:27:19 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200980, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) unshare(0x40000000) 12:27:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1000002, 0x40800000000031, 0xffffffffffffffff, 0x0) ioctl$TCGETS(r0, 0x5414, &(0x7f0000000040)) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xa1c2, 0x2000) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000000c0)={0x9, 0xfffffffffffffe01}) linkat(r2, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1000) 12:27:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = userfaultfd(0x800) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000001400)) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ppoll(&(0x7f0000000000), 0x2, 0x0, 0x0, 0xffffffffffffff04) [ 304.390191][ T8150] sched: DL replenish lagged too much [ 304.452011][ T8150] IPVS: ftp: loaded support on port[0] = 21 12:27:19 executing program 4: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f0000000540)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000004c0)=0x0) r3 = syz_open_dev$usb(&(0x7f0000000500)='/dev/bus/usb/00#/00#\x00', 0x401, 0x2) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x1ff, 0x6, 0xffffffffffffffff, 0x3ff, 0x0, 0x50000000000000, 0x11, 0x0, 0xfffffffffffffffa, 0x4, 0x5, 0x0, 0x1ff, 0x8001, 0x7, 0xf, 0x4, 0x2e, 0x6, 0x2, 0xffffffff, 0x81, 0xffffffffffffff01, 0x6, 0x4, 0x3, 0xffff, 0x4, 0x4, 0x3f, 0x3, 0x99, 0xffffffff, 0x80, 0x0, 0x1, 0x0, 0x20, 0x1, @perf_bp={&(0x7f0000000400), 0x2}, 0x8, 0x4, 0x2, 0xb, 0xfffffffffffffff8, 0x1, 0x2}, r2, 0x9, r3, 0x8) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x0, @dev}, 0x10) [ 304.498205][ T8155] overlayfs: './file0' not a directory 12:27:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r2, 0x114, 0x2, &(0x7f0000000200)={{&(0x7f0000000280)=""/143, 0x8f}, &(0x7f00000001c0), 0x1}, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r3) socket$rxrpc(0x21, 0x2, 0x2) io_setup(0x0, &(0x7f0000000240)=0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x12f}]) 12:27:19 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x4, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x6, 0x6, 0x1, &(0x7f00000002c0)}) 12:27:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="00449aaecc6bf906000000000000e50000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3f67676f8a16bea3643d24860f0876e6a3f8afdf59501f3e4e8356cb1f23f1cd840a39ac7196d26bc56924bb25074c978cdb0da9603f126ea37ee05258412c3fec27", @ANYRESDEC=0x0, @ANYBLOB="1ba42c10003ecf4f3a74191ed4a0a118cb181a854c26e2fd2f3215129ab2c3c56ba542fde2505dedb6562b7ee292f4755d0a"]) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1}}, 0x30) read$FUSE(r0, 0x0, 0x0) 12:27:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x20000000000003, 0x5) r2 = fcntl$dupfd(r1, 0x0, r1) getsockname$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c9, 0x0) 12:27:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, &(0x7f0000000540)) accept4$packet(r3, &(0x7f0000000580), &(0x7f00000005c0)=0x14, 0x800) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000500, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) prctl$PR_SET_UNALIGN(0x6, 0x100000000000002) request_key(&(0x7f0000000000)='logon\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)='/\x00', 0x0) readahead(r2, 0x0, 0xf83) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, &(0x7f0000000780)=ANY=[]) open$dir(0x0, 0x20000008004, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') syz_genetlink_get_family_id$ipvs(0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, r0, 0x0) 12:27:19 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000340)='/dev/midi#\x00', 0x20, 0x400000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000380)={0x4, 0x5, 0xff, 0xf9b, '\x00', 0x8}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x40) write$FUSE_WRITE(r2, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x7}}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r1, 0x0, 0x1, 0x0, 0x0}, 0x20) ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) write$P9_RCREATE(r2, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0xa0, 0x1}, 0x3}}, 0x18) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)={0x0, @speck128, 0x2, "dbb8dec118d23886"}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="000226bd7000ffdbdf25090000002c00720008000700008000000800caf633a884d72156e3d5a7730300000000000800040000100000080004000000000008000500010000fe880000000000000000000000000001"], 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x24000010) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f00000011c0)=""/4096) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 304.938785][ T8171] IPVS: ftp: loaded support on port[0] = 21 12:27:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x40000000000009, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7fff, 0x20000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0xef, "78165e135ef0d26f623f72422e07066acfc1aa2f28dfbe774bb0bde78708a413a7e81f06c7b8dd4bf7df5cb2de8b7a2a87a9e93431432c5ce272f86ef714db556b03d4ecf99599c77aad97071eed0d0d9ab3eef5fafb33f9d98cd9c7d34d8f820aeb52a59b94aba5f3e2c812bad3a3cae32ace4ed636ec83ff6dd5e0f3666ec371ba85641013df60cf9e977949dc38e69d6d8f8300e93d6e2b40cbfb0b1d0e64a3ba735816ad1b1fdaeaa4e94e1d79cb26b5a79ab90fcf3ffb6b425d33ee3053d0f06413467af5798319b85d76f8466eb71f77cea91e8a09caeeeefc34c6688d939ffbf4054751d82bf53e9ce75912"}, &(0x7f0000000180)=0xf7) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00000001c0)={r3, 0x401}, &(0x7f0000000200)=0x8) setsockopt$packet_fanout(r1, 0x107, 0x17, &(0x7f0000000000), 0x4) 12:27:20 executing program 0: get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0x1, &(0x7f0000ffe000/0x1000)=nil, 0x2) r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8, 0x2002) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000240)={0x100, 0x5, 0x4, 0x4002000, {r2, r3/1000+30000}, {0x1, 0xc, 0x9, 0x5, 0x0, 0x80, "905c7579"}, 0x10001, 0x1, @fd=r1, 0x4}) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000180)) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000007ff0)={0x2}, 0x10, &(0x7f0000002ff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000000002000000000000000018df4118c5199f", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x7530, @ANYBLOB="00003f219e1f77a1d106d100000400000002000000000000008e15adecfc04ab219f3530540004a87259922978bc35a2c76b0d6bc665b6decc6be6e4b7b4116bb66ff7f700000000"], 0xfcd8}}, 0x0) 12:27:21 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x80200000000002, 0x0) getsockopt$llc_int(r0, 0x10c, 0x9, &(0x7f00000001c0), 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, 0x0) ioctl$PPPOEIOCSFWD(0xffffffffffffffff, 0x4008b100, 0x0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000340)=""/1) syz_mount_image$f2fs(&(0x7f0000000100)='f2fs\x00', &(0x7f0000000240)='./file0\x00', 0x4, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000980)="c9964a4ab69b739a9701968a2912033b5c3583c6a9e66efd365af3e20378f44395283c32c6f14bdf675901f75abe5f90cbf7ab1836687f08c1200ce28824658910d0334cae3e4a97e58ac9a5f013375c62c6fd6875eb2ddf43466b82579dd83a776b1644ecb9b6f75af96e7e4a1126d317d47376eaa983ead7e9b2c06ad16877194c58002d817f316bce0cf0bfce11d89e9971ff78fc8f56432930b3db9f36fd876f6fef3949793f4928149c57044f01d2673922eb3e450538", 0xb9, 0x10000}], 0x91080, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x22002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() get_robust_list(r3, &(0x7f0000000480)=0x0, &(0x7f0000000500)) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000540)={0x0, 0x913}, &(0x7f0000000580)=0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, &(0x7f00000006c0)) sched_setscheduler(r3, 0x5, &(0x7f0000000040)=0x9) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) write$P9_RREMOVE(r1, &(0x7f0000000300)={0x7, 0x7b, 0x2}, 0x7) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000740)={{0x0, 0x0, 0x1, 0x800, 'syz1\x00', 0x80}, 0x4, 0x700, 0x0, r3, 0x0, 0x4, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x3, 0xda7, 0x82e]}) mkdir(&(0x7f00000002c0)='./file0\x00', 0xd2) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078b", 0x54, 0x1}], 0x0, 0x0) mount(&(0x7f0000000b40)=ANY=[@ANYBLOB="f72c2363ca04643263358f3c052a63031988dc0bccbe955378114cb02db7d857fe461a9eb97641cd10ced74524f94dc9c69b6bb2437264c6b1d84d49af05bfc59a1a92b3d6b267a6f0590e57aa5f4ca0fc"], 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x48000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065722829c48ee64f57b36c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={r4}, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x0) 12:27:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ftruncate(r0, 0xffffffffffffffff) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080)=0x5, 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='fd/3\x00') 12:27:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100000001, 0xa0303) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000100)={0x5, 0x0, [{}, {}, {}, {}, {}]}) write(0xffffffffffffffff, &(0x7f00000000c0)="2400000052001f0014f9f407010904000200071008000100010000000800000000000000", 0x24) 12:27:21 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0xffffffffffffffa1) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0x5, 0x0, 0x3f}, &(0x7f0000000140)=0x10) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0xfffffddf}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) quotactl(0x2080000201, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f00000002c0)) 12:27:21 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200980, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) unshare(0x40000000) 12:27:21 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0xe000000, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0xd8a, 0x8, 0x46f, 0x20, r0, 0x8}, 0x2c) 12:27:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000080)={0x3, "f99ba5a0abe42af82b9674c66253b6febd1e5997adb6f171ab927dbe58bede4c", 0x3, 0x5, 0x2, 0x0, 0x40520, 0x8}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 12:27:21 executing program 4: socket$inet6(0xa, 0x2, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000001c0)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000000080)=0x2c, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x2df, 0x80000000000) [ 306.653203][ T8238] overlayfs: unrecognized mount option "upper()ÄŽæOW³le0" or missing value 12:27:21 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) connect$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "2907417e43b886d11ae47d50fef4030dde6e5d6c537e28453b63162d9bf6214e2c9d6277abd129fa47d3434a7962ab2720633eab8a3ea00784693d82e347d9", 0xd}, 0x60) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000040)={0x7, "3fc8a1ded7ae766031deecaa901cfe28e09fdf1d61567953d7f32b04d2983c05", 0x2, 0xa0, 0x100000001, 0x5, 0x5, 0x1, 0x6}) 12:27:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x200000) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 12:27:21 executing program 5: socket$tipc(0x1e, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, 0x1c) sendmmsg(r2, 0x0, 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000100)="9e48d95d82d81f47ad61b70f2170a31c233a12fa58df5fbfb38a9df7e75b4b41964073531495b78d0c2cf07df9b8dc33447a7c26af74fdb2fa1a8d560a047b78696197c5520a8ce360922217385f1e6f000869f4ae899774739aa6df05557ab4be8df12f79553419cdea636ed6d416c9388663d702720e1bafdecf38f5c02c5933cab46ced695c971a5908725c5db7fd89fb292030a2201ef04f5ed9430ee5d2da34bc0a2b00d244241c72c27dac8c8841ff6bb00b67347d5e0e0c66") ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r3, 0xab, "08707a34cc162c039b76ba8e72c380c2fbb0b14422faa28e8b9dcca242068d5f1c289c0d11ae609820b2a27778a8e34775310a1acc885c0c8d0cea6403d39b102abed54674de661716a7ae1251fd63787f95db3a03948d206e75d804047eef7d2d8c7d277678129091e2c685b9a9e7cc558a68d54baeac62825c0684298266f21d8185e4a730aeb3dc29ec1c66a8fd19a95e83be666759881b710f0aaba6661fdc81e1b60f4a7cf51f47c9"}, &(0x7f0000000340)=0xb3) unshare(0x40000000) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x7ff}) ioctl$DRM_IOCTL_AGP_BIND(r1, 0x40106436, &(0x7f0000000080)={r4, 0x2}) poll(&(0x7f00000003c0), 0x0, 0x0) [ 307.604519][ T8262] IPVS: ftp: loaded support on port[0] = 21 12:27:22 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x35, 0x0, "12cc03b206269d377ed8a49ccf10bc64c651798f2820165c1b961d67e1bf97c6771b92835c3ec5b6b34ac45d96"}, 0x2) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x48) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) clock_gettime(0x6, &(0x7f0000000540)) 12:27:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @multicast2}, 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) listen(r0, 0x8) write$P9_RREADDIR(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x103) listen(r0, 0x4d) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000)=0x8001, 0x4) recvmmsg(r2, &(0x7f0000004300)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f00000027c0), 0x1, &(0x7f0000000080)=""/210, 0xfffffd94}}], 0x684, 0x0, &(0x7f0000004480)={0x0, r3+30000000}) 12:27:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) readahead(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x12, r0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) 12:27:22 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x200000) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) r3 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) write$binfmt_script(r3, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r3, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 12:27:22 executing program 2: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, 0x0) r2 = openat$nullb(0xffffffffffffff9c, 0x0, 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200980, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$vbi(0x0, 0x1, 0x2) unshare(0x40000000) 12:27:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0a01fe123c123f3188b070") clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:n'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x3cc, 0xfffffffffffffffe) 12:27:23 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69763d4b30d55bfdeeb6477de702818ee194af065c413e9821d8ee1d3872336e3d841e131544cf000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/164, 0xa4}], 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000240)={0x20, 0x0, 0x2}, 0x20) [ 307.900643][ T8288] encrypted_key: keylen parameter is missing [ 307.933133][ T8284] encrypted_key: keylen parameter is missing [ 308.001865][ T8287] IPVS: ftp: loaded support on port[0] = 21 12:27:23 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x4000, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) 12:27:23 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x82000, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x80000, 0x0) fanotify_mark(r0, 0x80, 0x28, r1, &(0x7f00000001c0)='./file1\x00') getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000000240)=0x55be, &(0x7f0000000280)=0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) accept4(r1, &(0x7f00000002c0)=@isdn, &(0x7f0000000340)=0x80, 0x80000) setxattr$security_ima(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000400)=@sha1={0x1, "e4be3943889d1de24ee60b21f293bf9774730aa9"}, 0x15, 0x1) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="707065726469723d37ec7f9148ed03c2cea5b276342e2f66696c65302c776f6d6b6469723d2e2f66696c65312c6c6f7765726469723d0e2f66696c65302c6e66735f6579706f72743d6f66662c00"]) syz_mount_image$ceph(&(0x7f0000000440)='ceph\x00', &(0x7f0000000480)='./file1\x00', 0x1, 0x4, &(0x7f0000000680)=[{&(0x7f00000004c0)="c1541daacb8b22a9d83939345d5bf1e3ef", 0x11, 0x7}, {&(0x7f0000000500)="0078c8327febfa63ae4647df15888ff5e197f8d27fe9906943bbb7bc257339ac421709efe4118e", 0x27, 0x40}, {&(0x7f0000000540)="0c15765fc1bf50f46e91904fe19f134a16ca1d4b649ac1d92038d320699dc9d819a51cc2e7247030106b", 0x2a, 0x7}, {&(0x7f0000000580)="7bcf7bb4a3b90a83468cb63254bc16a4a5a77d24e3678586a901e62d194e7c65680c45d5637578437d25362be8fd7a19aae54a8dcfbe9648dfacc89b6dd876bb67e729f4d6e5670c4fc7df3c30240e70f07d98724764472d22e853409c3252cb6d50e3cd6ff2ae9119025b3cd4e75fa77807863834289abdba743e0e2d1a7810a49481aad76bff749cc2d26567abe80c283660d7bb03937f7874957875aaacb2a327283092225971835e0168c214a8002b6d06cf66450c888de7e7c37b0cfc0f26efde15c5a8b87654c97a0c3a3803fb7a30d44fce9afdda0cf947099992d8b0ac5efba908f783ffbe4a495ecadc6c9e7d55b29ef914", 0xf6, 0xceb3}], 0x4000, &(0x7f0000000700)='overlay\x00') 12:27:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs_stats\x00') syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x228, 0x20080) lseek(r0, 0x209, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x5) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf8, r1, 0x700, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc8e9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff8001}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 12:27:23 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000008000)={0x7, {{0x2, 0x0, @multicast2}}}, 0xcd) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000001c0)={0x8, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) r3 = fcntl$getown(r2, 0x9) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x1, 0x200000) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x6, 0x5, 0x2, 0x6, 0x0, 0x6, 0x80000, 0x4, 0x4, 0x800, 0xffffffff, 0x0, 0x800, 0x401, 0xc2, 0x3, 0x9cf, 0x3, 0x80000001, 0x2, 0x1, 0x1fad52a8, 0xfa, 0x961, 0x401, 0x9, 0x1, 0x7ff, 0x7, 0x4, 0x2, 0x7f2da778, 0x1, 0x2, 0x7, 0x3, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x382a0, 0x67d, 0x8525, 0x0, 0x6, 0x8, 0x10001}, r3, 0xc, r4, 0x8) [ 308.340521][ T8313] overlayfs: unrecognized mount option "pperdir=7ì‘HíÂÎ¥²v4./file0" or missing value 12:27:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000001000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = dup2(r0, r0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f00000002c0)=""/178) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=@polexpire={0xc0, 0x1b, 0x1, 0x0, 0x0, {{{@in=@multicast2=0xff010000, @in6=@local}, {}, {}, 0x0, 0x8}}}, 0xc0}, 0x8}, 0x0) 12:27:23 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000040)={0x8000, 0x3, 0x1, 0xffff, 0x6}) r1 = socket$inet6_sctp(0xa, 0x6, 0x84) r2 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x0, 0xfb, 0x15, 0x0, 0x0, "3fe357afe88c0d80cdb8bd4f1ccb1c70"}, 0x15, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x3, @local}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r3, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x24, &(0x7f0000013e95), 0x4) close(0xffffffffffffffff) 12:27:23 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x2, 0x20000) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f00000001c0)={0x6, 0x101}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x4000, 0x0) epoll_create(0x7) r2 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) write$apparmor_exec(r1, &(0x7f0000000000)={'stack ', '\x00'}, 0x7) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000140)={0x0, 0x84}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0x8000}, 0x8) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000840)={0x0, 0x0, 0x0, {0xe, @vbi={0x40000000000, 0x17, 0x6, 0x34565559, [0x9, 0x1], [0x1, 0x8000], 0x109}}}) [ 308.439780][ T8313] ceph: device name is missing path (no : separator in /dev/loop4) [ 308.470329][ T8320] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 12:27:23 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = fcntl$dupfd(r1, 0x406, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x7fff, @empty, 0xfffffffffffffffa}, r4}}, 0x30) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 308.541903][ T8327] overlayfs: unrecognized mount option "pperdir=7ì‘HíÂÎ¥²v4./file0" or missing value 12:27:23 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x9, 0x2) recvfrom$netrom(r1, &(0x7f0000000280)=""/138, 0x8a, 0x20, &(0x7f0000000340)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f00000003c0), 0x4) r2 = accept$alg(r0, 0x0, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000100)={{0x3, @rose}, [@netrom, @rose, @default, @remote, @remote, @null, @netrom, @default]}, &(0x7f0000000040)=0x48) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f0000000180)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) 12:27:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs_stats\x00') syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x228, 0x20080) lseek(r0, 0x209, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x5) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf8, r1, 0x700, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x10}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x53}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xc8e9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff8001}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 12:27:23 executing program 3: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='cgroup.controllers\x00', 0x0, 0x0) openat$cgroup_type(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) gettid() openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000500)}], 0x1, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x20601, 0x0) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e24, @rand_addr=0x3}, 0x10) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_CREATE_OPEN(r2, 0x0, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000080)) [ 308.751319][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 308.757215][ C0] protocol 88fb is buggy, dev hsr_slave_1 12:27:23 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xa6d}, &(0x7f0000000200)=0xfffffffffffffea5) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0)=@assoc_id=r0, &(0x7f0000000100)=0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @initdev}, 0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), 0x8) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f00000001c0)=0x5) 12:27:23 executing program 2: r0 = open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x0) dup2(r0, r0) 12:27:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c12a41d88b070") open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000000)={0x9, 0x120c00000001, '?'}, 0x40) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x91) [ 308.889391][ T8356] QAT: Invalid ioctl 12:27:24 executing program 1: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x2) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x149000) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, 0x0, 0x0) msgget(0x0, 0x400) [ 308.952043][ T8360] QAT: Invalid ioctl 12:27:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="0cb63165e875a04fc30b489f1800000000000000000000000000000061104c00000000009500000000000000"], &(0x7f0000007dc0)='GPL\x00'}, 0x48) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) accept$packet(r1, 0x0, &(0x7f0000000080)) 12:27:24 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x5382, 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x800) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0x20, 0x4) 12:27:24 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) eventfd2(0x101, 0x0) 12:27:24 executing program 2: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r0, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 12:27:24 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x4, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mknod$loop(&(0x7f0000000000)='./file0\x00', 0x6000, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x3, 0x100) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x1) write$capi20(r0, &(0x7f00000001c0)={0x10, 0x100000000, 0x87, 0x83, 0x0, 0x100}, 0x10) r1 = open(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x33, 0x7fc000000, 0xff, 0xd88, 0x2, 0x7, 0x1ff, 0x1c, 0x40, 0x7c, 0x1, 0xfffffffffffffbc6, 0x38, 0x2, 0x8, 0x5, 0x49a7}, [{0x70000005, 0xd3aa, 0x400, 0x1, 0x3, 0x258e0, 0x7}], "0637db7ed9876e07f9de9ba96900f4f168b0bd43982f00eedf8f04cce322972d40fb44b8c4c2506ab13237e005ac67eae3", [[], [], [], [], [], [], [], [], [], []]}, 0xaa9) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x2) 12:27:24 executing program 4: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x10) open$dir(&(0x7f0000000080)='./bus\x00', 0x2000000000002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r0 = socket$inet6(0xa, 0x400000000001, 0x200) r1 = dup(r0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x0, @loopback, 0x3}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x6) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000140)=0x6, 0x4) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) ioctl$VT_DISALLOCATE(r1, 0x5608) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = accept$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000480)={@local, @remote, @local, 0x5, 0x0, 0x8000, 0x100, 0x100000001, 0x400001, r4}) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000440)=@fragment={0x0, 0x0, 0x5, 0x10001, 0x0, 0x800000000, 0x67}, 0x8) ioctl$VT_RELDISP(r3, 0x5605) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getpeername$packet(r1, &(0x7f00000002c0), &(0x7f0000000340)=0x14) memfd_create(&(0x7f0000000240)='\xb25\x17\x00', 0xbfffffffffffffff) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ftruncate(r5, 0x7fff) sendfile(r1, r5, 0x0, 0x8000fffffffd) 12:27:24 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x8, 0x0, 0x80000001, 0x0, 0x155, 0x0, @perf_config_ext={0x8001, 0x7fffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) stat(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) getgroups(0x0, 0x0) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x3e0000}], 0x0) 12:27:24 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x0, 0xffffffffffffff83, 0x0}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f00000000c0)=0x1) [ 309.509615][ T8390] Unknown ioctl -2147204315 [ 309.569111][ T8400] Unknown ioctl -2147204315 12:27:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x600040) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f0000000040)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0x81a0ae8c, 0x713000) 12:27:24 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x210280, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[], 0xfffffcda}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) 12:27:24 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000100)={'team0\x00', 0x4, 0x1400000000000000}) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e1, &(0x7f0000000000)={'eth0\x00\xfd\xfd\xff\xff\x00\x00\x00\x00\x00\r\xbb?\x89\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\x17\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00S0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00_/0\xc4\x00\x00\x00\x00\x00\x00\x00\x80\x00', 0x0, 0x5}) 12:27:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb=':d::]:,:4.:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='openpromfs\x00', 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x80002, 0x0) mknodat(r0, &(0x7f0000000140)='./file0\x00', 0x10, 0x2) 12:27:24 executing program 4: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) write$ppp(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f00000000c0)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0xc0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, r1}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}}, {0x2, 0x0, 0xfffffffffffffffd, @local}, r1}}, 0x48) 12:27:25 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000001, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x8, 0x0, 0x80000001, 0x0, 0x155, 0x0, @perf_config_ext={0x8001, 0x7fffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) stat(0x0, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) getgroups(0x0, 0x0) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x0, 0x3e0000}], 0x0) 12:27:25 executing program 3: clock_adjtime(0x44, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x9}) r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x50000, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x0, 0x5, 0x4, 0xfffffffffffffffc}]}, 0x10) 12:27:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2400, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x14, 0x4, 0x4000000004, 0x200003605, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa]}, 0x2c) 12:27:25 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, 0x0) io_setup(0xfffffffffffffe00, &(0x7f0000000040)=0x0) io_destroy(r0) timer_gettime(0x0, &(0x7f0000500ff0)) 12:27:25 executing program 2: unshare(0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x4000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000dc9ff0)={0x2, 0x4e20}, 0x10) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x3c, @empty, 0x4e24, 0x2, 'lc\x00', 0x1, 0x2, 0x36}, 0x2c) bind$rose(r1, &(0x7f00000002c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000000)) shutdown(r2, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ptrace$setsig(0x4203, r3, 0x6, &(0x7f0000000340)={0x6, 0xd2a, 0xe7}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000180), 0xbe0558d841c80c85, 0x4007ffd, 0x0, 0x3df) recvfrom(r2, &(0x7f0000000280)=""/26, 0x1a, 0x10101, 0x0, 0xfffffc8e) 12:27:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0x200000000000ff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r1, &(0x7f00000000c0), 0x370, 0x0, 0x0, 0x0) 12:27:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x5, 0x301800) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0x0, 0xa97, 0x4, {0x200000000002, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc]}}}) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000000)=0x2) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x200, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)={0x1a0, r3, 0x520, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffa}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffe01}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6782}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffff001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6ee3492d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000) dup3(r0, r1, 0x0) 12:27:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x4, 0x800) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x800, 0xc080) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000140)="f083a96d06f6baf80c66b89d9fb18266efbafc0cec67660f350f0766b8af6400000f23c00f21f8663502000a000f23f8ba2000ed66b9a40b000066b8dbabfa4566ba000000000f30baf80c66b82e98698a66efbafc0cec3e0f01d10f380845c7", 0x60}], 0x1, 0x48, &(0x7f00000022c0)=[@cstype3={0x5, 0xb}, @cr0={0x0, 0x2}], 0x2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000000)={0xc, 0x4b, "2b287dbccf87ca70c04860d6b214654fe9b5fd85c3f0e6f8160556bce47c3d162f03cf96073f49b8bfe38f3e3666499910fece51d341c74f9e74c60cc8c78521e624fdeda2b96136872e87"}, 0x51) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000002280)=ANY=[@ANYRESOCT=r0]) ioctl$KVM_SET_NESTED_STATE(r4, 0x4080aebf, &(0x7f0000000200)={0x0, 0x0, 0x1f3e, {0x0, 0x100000000000000}, [0xffffffff00000000], "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", "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"}) [ 310.401509][ T8456] IPVS: set_ctl: invalid protocol: 60 0.0.0.0:20004 12:27:25 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r1, 0x3, 0x0, 0x8001) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffeb74, 0x428702) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r2, 0xc0385720, &(0x7f00000000c0)={0x1, {r3, r4+10000000}, 0x9, 0x3}) [ 310.447706][ T8456] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:27:25 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x8000000400000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = geteuid() ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=@getpolicy={0x8c, 0x15, 0x404, 0x70bd29, 0x25dfdbfe, {{@in=@multicast2, @in6=@mcast1, 0x4e23, 0x0, 0x4e21, 0x80000001, 0xa, 0xa0, 0x0, 0x2d, 0x0, r2}, 0x6e6bb7, 0x2}, [@encap={0x1c, 0x4, {0x0, 0x4e20, 0x4e20, @in=@rand_addr=0x1000}}, @lastused={0xc}, @policy_type={0xc, 0x10, {0x1}}, @extra_flags={0x8, 0x18, 0xa702}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x80) recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@generic, 0x80, &(0x7f0000000300)=[{&(0x7f0000000100)=""/217, 0xd9}, {&(0x7f0000000200)=""/11, 0xb}, {&(0x7f00000002c0)=""/63, 0x3f}], 0x3, &(0x7f0000000340)=""/77, 0x4d}, 0x10103) fcntl$setlease(r0, 0x400, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file1\x00') 12:27:25 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r3 = dup2(r2, r1) linkat(r3, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x1400) ppoll(&(0x7f0000000280)=[{r2}], 0x1, 0x0, 0x0, 0x0) [ 310.584117][ T26] audit: type=1804 audit(1553689645.674:32): pid=8469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir993683401/syzkaller.Ua83qi/21/file0" dev="sda1" ino=16607 res=1 [ 310.672641][ T8456] IPVS: set_ctl: invalid protocol: 60 0.0.0.0:20004 12:27:25 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='highspeed\x00', 0xa) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) bind$netlink(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="84080000", @ANYRES16=r2, @ANYBLOB="00022dbd7000fddbdf250e000000100004000c00010073797a30000000001c0002000800010006000000080001001f0000000800010001000000180004001400010062726f6164636173742d6c696e6b0000100007000c00030006000000000000001c000100100001007564703a73797a300000000008000300fdffffff"], 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x40) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$P9_RWALK(r1, &(0x7f0000000340)={0x64, 0x6f, 0x2, {0x7, [{0x2, 0x3}, {0x4, 0x0, 0x8}, {0x0, 0x3, 0x1}, {0x4, 0x3, 0x1}, {0x80, 0x3}, {0x48, 0x3, 0x3}, {0x0, 0x2, 0x3}]}}, 0x64) getgroups(0x0, 0x0) stat(0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 12:27:25 executing program 4: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x20, 0x4) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) 12:27:25 executing program 1: msgctl$MSG_INFO(0xffffffffffffffff, 0xc, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x8000c) pipe(&(0x7f0000000180)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20008}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r2, 0x20, 0x70bd28, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x8000, 0x7f, 0x0, 0xfffffffffffffffa, 0x100000001, 0x7, 0x9, 0x3, 0x7ff, 0x1, 0x1000}, 0xb) 12:27:26 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x1) r1 = dup2(r0, r0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000040)=0xff) exit(0x0) getdents64(r0, 0x0, 0x0) close(r0) 12:27:26 executing program 4: semtimedop(0x0, &(0x7f0000000040)=[{}, {0x0, 0xffff}], 0x2, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)={{0xa2, 0x3}, {0xc6, 0x8}, 0x1000, 0x1, 0x8000}) semtimedop(0x0, &(0x7f0000000080)=[{0x0, 0x8001}], 0x1, 0x0) [ 311.004556][ T26] audit: type=1804 audit(1553689646.094:33): pid=8476 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir993683401/syzkaller.Ua83qi/21/file0" dev="sda1" ino=16607 res=1 [ 311.118045][ T8504] QAT: Invalid ioctl [ 311.139366][ T8505] QAT: Invalid ioctl [ 311.177579][ T26] audit: type=1804 audit(1553689646.264:34): pid=8502 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir993683401/syzkaller.Ua83qi/21/file0" dev="sda1" ino=16607 res=1 12:27:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000600)={"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"}) 12:27:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x21ff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1000, 0x101000) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000000c0)) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x1000000077, 0x0, [0x570]}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x9c, "18b6eb7f2ae25d966c5bcf51a8fa1c2df6b26a2057ab3dca87b97d3cc0c25605fe3e00b6d2b2d5d6eebbf92d5566c552f377b039c16d1c1de9dadf3b5fa8cd994c3fa9ed8ed8c01030d1c08d10f12887309b9ec823b1e7288bedb3336b3da40ad76bbd0c6995c083c50fe20d1295b5d3bd404715db23d584a67f6f93bc71055312f93fdf939d45bc8ea599aaab17260a24d0fe1a614fc8ed63837378"}, &(0x7f00000001c0)=0xa4) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f0000000300)={r4, 0xe2, 0x10001}, 0xfffffffffffffce6) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4080, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000200)={0x2, 'yam0\x00', 0x4}, 0x18) connect$pppoe(r5, &(0x7f0000000240)={0x18, 0x0, {0x4, @link_local, 'ip6_vti0\x00'}}, 0x1e) 12:27:26 executing program 5: mkdir(&(0x7f0000000000)='./control\x00', 0x0) lgetxattr(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f00000001c0)=""/149, 0x95) chmod(&(0x7f0000000140)='./control\x00', 0x9c32f69e6caa24eb) creat(&(0x7f0000000180)='./control/file0\x00', 0x0) 12:27:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x5, 0x80) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000140)=0x3) sendmmsg(r0, &(0x7f0000003940)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @mcast2, 0x10000}, 0x80, 0x0, 0x0, &(0x7f0000000480)=[{0x28, 0x29, 0x2, "48ae51560c37ae89ad3eb98a41797fb2c2"}], 0x28}}], 0x1, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 12:27:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3, 0x1, 0xd000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) r2 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x73e1f48d, 0x200) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000140)=""/79) r3 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, r3}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x1, r3, 0x3}) 12:27:26 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000cab000)=0xc) connect$tipc(r0, &(0x7f0000000000)=@id={0x1e, 0x3, 0x2, {0x4e24, 0x2}}, 0x10) setreuid(0x0, r1) 12:27:26 executing program 1: socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xa1b) clock_adjtime(0x0, &(0x7f0000000000)={0x7ff}) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000140)={0x9, 0x5, 0x8, 0x0, 'syz1\x00', 0x7}) 12:27:26 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x20000, 0x0) write$P9_RCREATE(r0, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x8, 0x3, 0x3}}}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) shutdown(r4, 0x1) r5 = accept4(r1, 0x0, 0x0, 0x80800) sendto$inet6(r5, &(0x7f00000000c0)='\x00', 0x1, 0x800, 0x0, 0x0) keyctl$session_to_parent(0x12) dup2(r2, r4) 12:27:27 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x18) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000), 0x0) 12:27:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000180), 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x402500) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000080)=0x9, 0x4) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000340)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, 0x0) [ 311.904679][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 12:27:27 executing program 3: setrlimit(0x8000000000006, &(0x7f00000a3ff0)) r0 = socket(0x11, 0x80003, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x98, "010eec82fc1b7ffba4e0faa44681ab283f114e32f55e98bb4f4f7f9f2fe8d9242f9ce2dde8a798d4ad58c76b21d190e502c6809d2425a42134ab3867117c59c41c9f6632db44a07b08e90bf009d05580161bd2aefda887d006a173f71384999499478bfb0e70be125acfc0a418823141a0cc43c1a7994a58c756f322ef1f66b617c46ef4785a40e3d35216aeb71bb74d569e8c4aca8b2741"}, &(0x7f00000000c0)=0xa0) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000100)={r2, 0x8f, 0x7a, "551d5eba2fe19f5405f83a9e5f21671ef2064fda9d8d0b8fce4b4271c042722270c98ea7bbf37236f1f868ea90c64d2ab19ac38042cf579c2cd4cbc70e98319bf014258392bd36751ec4188cf5d5e22eabf6f74b7398e0f0fea136e862d6373a36f361b883887c03a9ec54d000064fce7be2d23a58ea3bbf804f"}, 0x82) setreuid(r1, r1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:27:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x2c) r1 = getpid() get_robust_list(r1, &(0x7f0000000280)=&(0x7f0000000240)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)}}, &(0x7f00000002c0)=0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000140)="52991ec9c9378f79ee81f24d7321357476fccf115d97c5ade4df5c2c48efa3cf9cf5478f5c6afbf61b664ea3540939dbeeff7af1d88ee7be202f8f6e9c98ab4079d2f0b946706f6888c8d6784509837f0a3b5d50e115f098d9dd34bfe0b6c7bded5b93be353e853d41e518b9583a3010ad8e9d158a63f2810f0afc3ca56c69bc1c9d8613279182d192e0d877d85489a2a30d91f8ad823c2bd18c034f21", 0x0}, 0xfffffffffffffd8e) 12:27:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x4000fffffffd, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) pread64(r0, &(0x7f0000000000)=""/40, 0x28, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f00000000c0), 0x377) ptrace$setopts(0x4206, r2, 0x0, 0x3) tkill(r2, 0x39) fcntl$setstatus(r1, 0x4, 0x42803) 12:27:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) getpeername$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f0000000140)=0x10) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x6, 0x40040) ioctl$RTC_PLL_SET(r3, 0x40207012, &(0x7f0000000380)={0x9, 0xa5, 0x7, 0x7337, 0x42aa, 0xa2, 0x1ff}) ioctl$TIOCLINUX6(r3, 0x541c, &(0x7f00000001c0)={0x6, 0xc6}) r4 = shmget$private(0x0, 0x1000, 0x400, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_INFO(r4, 0x3, &(0x7f0000000280)=""/173) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0xe0) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000340)={0x39, ""/57}) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x35b, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x200005e4}], 0x2}}], 0x1, 0x0, 0x0) 12:27:27 executing program 2: openat$rtc(0xffffffffffffff9c, 0x0, 0x10000, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r1, 0x18) r2 = dup3(r0, r1, 0x80000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) r3 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6e, &(0x7f0000000000), 0x0) 12:27:27 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@loopback, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000000)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @local}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', r1}) sendmsg$can_bcm(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000001c0)={&(0x7f0000000140)={0x1, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "ef3a904f6b4e4163"}}, 0x48}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000007ff0)={0x1d, r2}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0xfcd8}}, 0x0) 12:27:27 executing program 1: perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x400000) 12:27:27 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000001c0)={0x6, 0x118, 0xfa00, {{0x0, 0x0, "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", 0x0, 0x1000000000, 0x100}}}, 0x120) 12:27:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x588e, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) 12:27:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000007c0)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000008c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002b40)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000002c40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002c80)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000002d80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002dc0)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000002ec0)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000002f00)={0x11, 0x0, 0x0}, &(0x7f0000002f40)=0x14, 0x800) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000003280)={&(0x7f0000002f80)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003140)=[{&(0x7f0000003000)=""/38, 0x26}, {&(0x7f0000003040)=""/212, 0xd4}], 0x2, &(0x7f0000003180)=""/242, 0xf2}, 0x2000) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000004f40)={@multicast2, @dev, 0x0}, &(0x7f0000004f80)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000005080)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000005180)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000006340)={'vcan0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000006380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000063c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000007900)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000007a00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000007b00)={@multicast1, @multicast2, 0x0}, &(0x7f0000007b40)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000092c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000009300)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000009340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000009380)=0x14, 0x800) getpeername$packet(0xffffffffffffffff, &(0x7f0000009440)={0x11, 0x0, 0x0}, &(0x7f0000009480)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000094c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000095c0)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f00000096c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f000000bbc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bc00)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f000000bd00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000bd40)=0x14, 0x80000) accept4$packet(0xffffffffffffff9c, &(0x7f000000be80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000bec0)=0x14, 0x80000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000bf00)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000000bf80)={'caif0\x00', 0x0}) accept4(r0, &(0x7f000000c0c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f000000c140)=0x80, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f000000cac0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f000000ca80)={&(0x7f000000c180)={0x8d4, r1, 0x101, 0x70bd28, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r3}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x48, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r6}, {0x100, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x13c, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xff}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}]}}, {{0x8, 0x1, r14}, {0x140, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8000}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r15}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}]}}, {{0x8, 0x1, r17}, {0xb8, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x2, 0x8, 0x1}]}}}]}}, {{0x8, 0x1, r18}, {0xf8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}]}}, {{0x8, 0x1, r23}, {0x1d0, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x80000000, 0x6, 0x7, 0x1}, {0x783, 0x6, 0x0, 0x9}, {0xfed7, 0x1f8000000000, 0x9, 0x2}, {0x401, 0x4, 0xffff, 0x3}, {0x3, 0xfffffffffffffffc, 0x9, 0x101}, {0xfcf, 0x1, 0x1f, 0x10001}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r24}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r25}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}]}}]}, 0x8d4}, 0x1, 0x0, 0x0, 0x4}, 0x10) r27 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)={0x28, r27, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x28}}, 0x0) 12:27:27 executing program 1: mq_unlink(&(0x7f0000000000)='vboxnet0\x00') r0 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x2, 0x2a082) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f00000000c0)={0xad, "0d693720c1b35c8d7de0a43a2cced0930f2864cd176f3e54b2698c3a878ef040", 0x7b208ca88824f06b, 0x0, 0xfffffffffffffff7, 0x2, 0x4, 0x1, 0x6, 0x5}) timer_create(0x6, &(0x7f0000000280)={0x0, 0x3e, 0x1, @thr={&(0x7f0000000140)="37813419a35c27198285f4a5e1501a6620aea6afa73c92b5c497ca2597bc85e1f65c0fc0e11daa", &(0x7f0000000180)="4a01898f94b8aa81c3f2f74876d8d9f08832e3e973d7901d269e956cd59ff5107d478f050ff2a25759bce97823733048a4273c328c78084713ea15b7501abb654883bade6d9e3cfec6c6fc39cf586ec3252e3372963f94304b0f24d595e1cac02d1bfafb5a415ec9aceeb89bc33a77346701e1d2c04c077f41b2158b3743284dc2206c71bfbd7903d6bebba18601e7cffd2cf2a3bf877ed0c4a94a2fd010294407315e2116036f42a2b1fcf3dff03a50878771a9fc1dc127176e16b93011688b8f1e4a15fa26a255ca9e8388f20f030cfb25eb4da9"}}, &(0x7f00000002c0)) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)=0x1) bpf$MAP_CREATE(0x18, 0x0, 0xe6) fadvise64(r0, 0x0, 0x39c6, 0x3) 12:27:27 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0xfffffffffffffffc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000080)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r1) close(r0) [ 312.923320][ T8606] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 12:27:28 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:28 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x400000000000098, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') preadv(r0, &(0x7f0000000100), 0x0, 0x0) 12:27:28 executing program 1: setresuid(0x0, 0xee01, 0x0) r0 = socket$inet6(0xa, 0x6, 0x7f) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xc}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x35}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x265, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000180)=0x7f, 0x4) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x600, 0x0) ioctl$VIDIOC_ENUMOUTPUT(r1, 0xc0485630, &(0x7f0000000200)={0x0, "c3c0225c2514b3ce65bcaac3abc64caad6d727ad73571737ef7241d247619695", 0x1, 0x0, 0x9, 0x10000, 0x4}) 12:27:28 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @broadcast}}}, 0x0, 0x5, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea88a1c7f5c8fdf3bcaf8b520003dab4011d7c60963832f302a5020f3f6af0b1d2fb5a00eb0900"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000080)) 12:27:28 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000000100), 0x4) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x142) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x480400, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000180)) clock_nanosleep(0x4, 0x1, &(0x7f0000000300), 0x0) sendmsg$rds(r1, &(0x7f0000003080)={&(0x7f0000000000)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/213, 0xd5}, {&(0x7f0000000080)=""/17, 0x11}, {&(0x7f00000000c0)=""/27, 0x1b}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000280)=""/126, 0x7e}, {&(0x7f0000000200)=""/46, 0x2e}, {&(0x7f0000001640)=""/4096, 0x1000}], 0x7, &(0x7f0000002d80)=[@cswp={0x58, 0x114, 0x7, {{0x1, 0x7ff}, &(0x7f0000000440)=0x3, &(0x7f0000000540)=0xbe, 0x4, 0x9, 0x1ff, 0x10000, 0x20, 0x8}}, @rdma_dest={0x18, 0x114, 0x2, {0x4}}, @mask_fadd={0x58, 0x114, 0x8, {{0x9, 0xffb1}, &(0x7f0000000580)=0x6c, &(0x7f0000002640), 0x7fffffff, 0x9, 0x4, 0x7fff, 0x40, 0x6}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000002680)=""/133, 0x85}, &(0x7f0000002740), 0x8}}, @mask_cswp={0x58, 0x114, 0x9, {{0x7ff, 0x5}, &(0x7f0000002780)=0xcf, &(0x7f00000027c0)=0x3ff, 0x0, 0x0, 0x6, 0x80, 0x0, 0x7fffffff}}, @rdma_args={0x48, 0x114, 0x1, {{0xfffffffffffffff8}, {&(0x7f0000002800)=""/197, 0xc5}, &(0x7f0000002b40)=[{&(0x7f0000002900)=""/105, 0x69}, {&(0x7f0000002980)=""/117, 0x75}, {&(0x7f0000002a00)=""/92, 0x5c}, {&(0x7f0000002a80)=""/156, 0x9c}], 0x4, 0x1, 0x6}}, @fadd={0x58, 0x114, 0x6, {{0x0, 0x1}, &(0x7f0000002b80)=0x7f, &(0x7f0000002bc0)=0x2, 0x96c1, 0x5, 0x81, 0xf5, 0x22, 0x101}}, @cswp={0x58, 0x114, 0x7, {{0xad7c, 0xe5}, &(0x7f0000002c00)=0x2, &(0x7f0000002c40)=0x8, 0xac8, 0x5a7, 0x6, 0x667d, 0x20, 0x5}}, @mask_cswp={0x58, 0x114, 0x9, {{0x10000, 0x2000000000}, &(0x7f0000002c80)=0x3ff, &(0x7f0000002cc0)=0x3, 0x80000001, 0x6, 0x2, 0x3, 0x8, 0xe44b}}, @fadd={0x58, 0x114, 0x6, {{0x663, 0x7f}, &(0x7f0000002d00)=0x400, &(0x7f0000002d40)=0xfff, 0x8, 0x7fff, 0x2, 0x1fe000000000000, 0x48, 0x9}}], 0x2f8, 0x805}, 0x80) ioctl$VIDIOC_S_FBUF(0xffffffffffffffff, 0x402c560b, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)=0x3) syz_extract_tcp_res$synack(&(0x7f0000000240), 0x1, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/nullb0\x00', 0x80002, 0x0) ioctl$VIDIOC_S_OUTPUT(0xffffffffffffffff, 0xc004562f, &(0x7f0000000100)) syz_open_pts(r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000030c0)={r3, r1}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000600)={0x0, 0x3f, 0x2, 0x6, 0xd, 0x6, 0x2, 0x0, 0x0, 0x0, 0x1}) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000140)={0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x9}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000005, 0x5c831, 0xffffffffffffffff, 0x0) 12:27:28 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x200088) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x16c}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140), 0x14a}, 0x1000000}], 0x40001ab, 0x807e) 12:27:28 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x7ff, 0x10040) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) mkdir(0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x100000405, 0x0) chdir(&(0x7f00000005c0)='./file1\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpid() lsetxattr$security_smack_entry(0x0, &(0x7f0000000400)='security.SMACK64EXEC\x00', &(0x7f0000000680)='#cgroup:\x88Ftrusted\x00', 0xae, 0x2) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000480)='btrfs\x00', 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2, &(0x7f0000000c40)=ANY=[]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) r3 = getgid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000440), &(0x7f0000000540)) getresuid(&(0x7f0000000580), &(0x7f0000000600)=0x0, &(0x7f0000000640)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x4000, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@uname={'uname', 0x3d, '(/+'}}, {@fscache='fscache'}, {@posixacl='posixacl'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_uid={'access', 0x3d, r4}}, {@cache_loose='cache=loose'}, {@version_L='version=9p2000.L'}], [{@uid_lt={'uid<', r5}}, {@subj_user={'subj_user', 0x3d, 'ppp1'}}, {@hash='hash'}, {@obj_role={'obj_role', 0x3d, '#cgroup:\x88Ftrusted\x00'}}, {@euid_eq={'euid', 0x3d, r6}}]}}) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000001c0)) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0x1200}) 12:27:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = gettid() migrate_pages(r1, 0x5, &(0x7f00000000c0)=0x6, &(0x7f0000000100)=0x827) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x12) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) 12:27:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) r2 = syz_open_dev$usb(0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="01040700090001003f000200c88000005700d0f9be2a9f3572356d7526e54ba3488ea2f2992162ee0d685604fcf067b0f279ac8fc553fd357aa0733467a783542343b6738a9e826f7f87131d43932e6bc35bd4cddb5c985c8ee0dc8149cc909ffbed522ed3f3a0a65d330a17645614e868df36fd7839c8c1792743125fa49fd6f8fc8bb8a824f0"], 0x16) socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, 0x0, 0x0) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000200)={0x76, 0x1c95, 0x5, 0x9, 0x1, 0x81}) openat(r2, &(0x7f0000000040)='./file0\x00', 0xc401, 0x8) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 12:27:28 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x48400) [ 313.881310][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 313.887893][ C1] protocol 88fb is buggy, dev hsr_slave_1 12:27:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x800000001, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x0, 0x0, @ioapic={0x100000, 0xfffffffffffffffc, 0x9, 0x0, 0x0, [{0x8, 0x7, 0x6, [], 0x5}, {0x2, 0x4, 0x5, [], 0xfff}, {0x100000000, 0x74d, 0x0, [], 0x3}, {0x401, 0xb438, 0x26, [], 0x1f}, {0x1e, 0x5, 0x9}, {0x3, 0x8, 0x4209983f, [], 0x9}, {0x5c, 0x8, 0x9, [], 0x100000001}, {0x6, 0x3, 0xce4, [], 0x3b42}, {0x9, 0x6, 0x800, [], 0x9}, {0x7fffffff, 0xc709, 0x9, [], 0x9}, {0xa5c, 0x200, 0x1f, [], 0x8}, {0x10001, 0x40, 0x3, [], 0x4}, {0x0, 0x3, 0x80000001, [], 0x8001}, {0x7000000000000000, 0x8, 0xd4, [], 0x8}, {0x3f, 0x52, 0x5, [], 0x3}, {0x8, 0x0, 0x3f, [], 0x7fffffff}, {0x200, 0xdd, 0x4, [], 0x5}, {0x1, 0x57, 0x4ee505f1, [], 0xbf}, {0x6, 0x4, 0x40000000000}, {0x2, 0x822, 0x9, [], 0x8000}, {0x8, 0x400, 0x2, [], 0x7}, {0x0, 0x1, 0x2}, {0x0, 0x400, 0x400, [], 0x5}, {0x6, 0x2, 0x1, [], 0x6}]}}) socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) bind$unix(r1, &(0x7f0000003100)=@file={0x1, './file0\x00'}, 0x6e) dup3(r2, r1, 0x0) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='&%vmnet1eth0selinux\x00', 0xfffffffffffffff8) add_key(&(0x7f0000000280)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000300)="ace7e655d4bd2d63ad7a4ca180e656719f44a82ca0ef8bb7fa466ebfd0fe6599ea2526ff78647ea1ca4b07be63001ccdf547d5002d1afff3881f3c18e3dad90db1857cf1f2e80547334a6ee1000712ec936585c7a57c7f2436b6d3d63e1e71dd19ae14c987b02e3e91a702780002b0c75c7598ba7770eaf2b765da7c6842ca3c9fe5f51bed0367fd0e977979fb2b73", 0x8f, 0xfffffffffffffff8) request_key(&(0x7f00000003c0)='ceph\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)='\x9auserlobdev$/\x00', 0xfffffffffffffff9) add_key$user(0x0, 0x0, 0x0, 0x189, 0xfffffffffffffffb) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 12:27:29 executing program 1: pipe2(&(0x7f0000001800)={0xffffffffffffffff}, 0x800) sendto$netrom(r0, &(0x7f0000001840)="1b979a0ec93531656c207f456a99f67bcfe1ee8da2e2df0b7ddd88d41561804d", 0x20, 0x0, &(0x7f0000001880)={{0x3, @null}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) r1 = socket$inet6(0xa, 0x80006, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x1, 0x0, [{{0xa, 0x0, 0x0, @local}}, {{0xa, 0x0, 0x0, @ipv4}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}]}, 0x440e) [ 314.043797][ T8645] overlayfs: missing 'lowerdir' [ 314.084665][ T8656] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 314.431398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 314.437234][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 314.637872][ T8645] 9pnet: Insufficient options for proto=fd 12:27:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:29 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x0) close(r0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = socket$kcm(0xa, 0x7, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000280), 0x4) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)="a0", 0x1}], 0x1}, 0x0) close(r0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0xf4, 0x4) 12:27:29 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x20180) lseek(r0, 0x3d, 0x4) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) ioctl$KDSETLED(r0, 0x4b32, 0x1) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000180)={0x19, 0x2, 0x2}) sendto$ax25(r0, &(0x7f0000000080)="53822373", 0x4, 0x20000000, &(0x7f00000000c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x77359400}, {0x0, 0x9}}, 0x0) 12:27:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80, 0x101000) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x68) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000340)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r3, 0x4018aee1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) [ 315.036116][ T8645] overlayfs: missing 'lowerdir' [ 315.054651][ T8645] 9pnet: Insufficient options for proto=fd [ 315.101182][ T8645] overlayfs: failed to resolve './file1': -2 12:27:30 executing program 3: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(r1, 0x0, 0x0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB='::,.:nu`lb:\x00'], 0x0, 0x0, 0x0, &(0x7f0000000140)='P\xf0selinuxcgroup\x00') prctl$PR_SET_FPEXC(0xc, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x400040, 0x0) connect$bt_sco(r2, &(0x7f0000000100)={0x1f, {0xb3, 0x8, 0x5, 0xff, 0x7, 0x6}}, 0x8) clock_gettime(0x0, &(0x7f0000004300)={0x0}) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000280)={0x18, 0x35, 0x9, 0x1e, 0xb, 0x100, 0x2, 0x74, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000480)=@assoc_value={0x0, 0x6}, &(0x7f00000004c0)=0x8) recvmmsg(0xffffffffffffffff, &(0x7f0000004240)=[{{&(0x7f0000000200)=@nl=@unspec, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/205, 0xcd}], 0x3, &(0x7f0000001a40)=""/175, 0xaf}, 0x1}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f80)=""/4096, 0x1000}, 0x20}, {{&(0x7f0000002f80)=@ipx, 0x80, &(0x7f0000004200)=[{&(0x7f00000030c0)=""/254, 0xfe}, {0x0}, {&(0x7f0000003200)=""/4096, 0x1000}], 0x3}, 0xee2d}], 0x3, 0x10043, &(0x7f0000004340)={r3}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="cc7eafebdc7c85871245f70fa1ddb4ac00", 0x11) 12:27:30 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000000)={0x8001, 0x8}) 12:27:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc9f123c123f3188b070") ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) r2 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) r3 = perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r5, 0x0, 0x3, &(0x7f00000009c0)=0x3f, 0x4) io_setup(0xffff, &(0x7f00000001c0)=0x0) io_submit(r6, 0x8, &(0x7f0000000840)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x7, 0x58, r3, &(0x7f0000000200)="c205b81c7ea0676b83c8fa8382239082d27e116bb4cd1e84fb735f2cd981382cab43c9ee07af9ae0d3ce2ce3d9d4affc4c1756df12b57c4f145706b2d5338c3d67b5479d7652012c6f9785af4d6acdfcdbdbe2ad7167cbd45bc7a9f7ac167595", 0x60, 0xffe00, 0x0, 0x2, r2}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x8, r4, &(0x7f0000000340)="6c0b3aca86df3bc6bb7e4f174db65b95c57713795635e3e82524f20fee789d776a3f96f378e44a4c81a374a1f558a1155cd04020967792f56fc25524519550f698f2b1fdd7864f68363fc843cfa4133d4f63189867cddccba98026350bdcfc256e124e96c2f8a16c45d54f2781f339a86bb4b5459a355253fe936b8a897f11b7ba8131c0fc48f062e67355ad6b1b5edacc426dff484847a7e7c334b59c222a07e937855da425db0fe31e252bbf0dbb85691f817f00f752b42ae6", 0xba, 0x8, 0x0, 0x1, r5}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x9f, r1, &(0x7f0000000440)="ebd298a17d42b1a3", 0x8, 0x101, 0x0, 0x0, r5}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0x4, r4, 0xfffffffffffffffe, 0x0, 0x1, 0x0, 0x1, r5}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x7f, r0, &(0x7f0000000500), 0x0, 0x3f, 0x0, 0x1, r3}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0xc21, r2, &(0x7f00000005c0)="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", 0xfa, 0x0, 0x0, 0x1, r2}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f0000000700)="82b03b5b000d07533023af09eba414f32fc4b786f3b83185c98468045f27f585211ec55cfe6b2423877af4e061230d8981853246cee3c733d55f2211552b7548778294ffacf2fe04e5c254b4a1724ec509aeaf08f338d9a35f6e9d63e7570069", 0x60, 0x2, 0x0, 0x1, 0xffffffffffffff9c}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x4, r2, &(0x7f00000007c0)="5f3d6d3b5d5f72d816cafc8e27451fbe48fcf72cd4b34360eed47cf68e52df262801d75de3c6f2", 0x27, 0xfff, 0x0, 0x0, r5}]) getsockopt$inet_int(r4, 0x10d, 0x2, &(0x7f0000000040), &(0x7f0000000000)=0x1c5) getpeername$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000002c0)={0x0, 0xa, 0x30, 0x8d5, 0xc}, &(0x7f0000000540)=0x18) r7 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) write$capi20(r2, &(0x7f0000000280)={0x10, 0xffffffff, 0x41, 0x82, 0x9, 0xc3}, 0x10) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000880)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r5, &(0x7f0000000940)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x1c, r8, 0x8, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x80) connect$llc(r7, &(0x7f00000000c0)={0x1a, 0x1, 0x5, 0x5, 0xc93, 0x8, @link_local}, 0x10) sendmmsg(r7, &(0x7f0000001380), 0x2af195c, 0x43) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8001, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r9, 0xc018643a, &(0x7f0000000140)={0x40000000, 0x100000000, 0x1a}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}]}) 12:27:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x7, 0x4, 0x6, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0xffff, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00004f1ff0)={r0, &(0x7f0000068000)}, 0x10) 12:27:30 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x7ff, 0x10040) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) mkdir(0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x100000405, 0x0) chdir(&(0x7f00000005c0)='./file1\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpid() lsetxattr$security_smack_entry(0x0, &(0x7f0000000400)='security.SMACK64EXEC\x00', &(0x7f0000000680)='#cgroup:\x88Ftrusted\x00', 0xae, 0x2) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000480)='btrfs\x00', 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2, &(0x7f0000000c40)=ANY=[]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) r3 = getgid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000440), &(0x7f0000000540)) getresuid(&(0x7f0000000580), &(0x7f0000000600)=0x0, &(0x7f0000000640)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x4000, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@uname={'uname', 0x3d, '(/+'}}, {@fscache='fscache'}, {@posixacl='posixacl'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_uid={'access', 0x3d, r4}}, {@cache_loose='cache=loose'}, {@version_L='version=9p2000.L'}], [{@uid_lt={'uid<', r5}}, {@subj_user={'subj_user', 0x3d, 'ppp1'}}, {@hash='hash'}, {@obj_role={'obj_role', 0x3d, '#cgroup:\x88Ftrusted\x00'}}, {@euid_eq={'euid', 0x3d, r6}}]}}) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000001c0)) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0x1200}) 12:27:30 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x7fe, 0x200000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000180)={r1, @in6={{0xa, 0x4e23, 0x100000001, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x67d, 0x80000001, 0x8, 0x1ff, 0x7}, &(0x7f0000000240)=0x98) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4c, &(0x7f0000000000)=0x200000007, 0x4) getsockopt$inet6_opts(r2, 0x29, 0x3f, &(0x7f0000000040)=""/62, &(0x7f0000000080)=0x3e) 12:27:30 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) sysfs$2(0x2, 0x1, &(0x7f00000000c0)=""/46) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001240)="2e0000002a00815fe4", 0x9}], 0x1}, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 12:27:30 executing program 1: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x35}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x301000) write$P9_RLOCK(r1, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x2}, 0x8) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000000c0)) [ 315.450207][ T8729] 9pnet_virtio: no channels available for device 127.0.0.1 12:27:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) [ 315.590107][ T8723] 9pnet_virtio: no channels available for device 127.0.0.1 [ 315.645646][ T8719] overlayfs: missing 'lowerdir' 12:27:30 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x140, &(0x7f0000ffb000/0x2000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000080)=""/20) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f0000001200)={&(0x7f0000000500)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x730}, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x25a002) read$eventfd(r1, &(0x7f00000000c0), 0x8) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000040)) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000100)="b0224cda54bc0f7abf4dde23001e62c3b22e120a3c7f71deb19a3affdc0cb3ae089a55e192338c6a8f4db3d82c3909179f558a7be7d419f76fc76243eee52031a6f2595ab4896f2e37437616f2792b894bc5593fbe8c96c7e37208fb86843e43b5a7b03a3eaed84d7832c357e34e9fc0bd4d8630ad", 0x75) [ 315.749428][ T8719] 9pnet: Insufficient options for proto=fd [ 315.833540][ T8719] overlayfs: failed to resolve './file1': -2 12:27:31 executing program 1: r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x35}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x301000) write$P9_RLOCK(r1, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x2}, 0x8) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f00000000c0)) 12:27:31 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) sysfs$2(0x2, 0x1, &(0x7f00000000c0)=""/46) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001240)="2e0000002a00815fe4", 0x9}], 0x1}, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) [ 316.018910][ T8743] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 12:27:31 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) socket$inet6(0xa, 0x2, 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x100, @mcast1}, 0xffffffef) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 12:27:31 executing program 1: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200000, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x2f8, 0x0, 0x118, 0x118, 0x0, 0x118, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, &(0x7f0000000080), {[{{@uncond, 0x0, 0xf8, 0x118, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d6, 0x933b, 0x7}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x5, 0x4, 0x0, 'snmp_trap\x00', 0x8000}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 12:27:31 executing program 4: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x96, 0x80) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000140)={0xa, 0x1}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000001880)={0x204, r2, 0x402, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff8}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6269}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'netdevsim0\x00'}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x453}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x1b}, 0x883e022}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x77b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xb2}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x8000}, 0x20000090) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e21, 0x81, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}], 0x1c) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000440)) recvfrom$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$UFFDIO_WAKE(r3, 0x8010aa02, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f0000000880)=""/4096, 0x1000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x6}, 'port0\x00', 0x85, 0x110c00, 0xfffffffffffffffc, 0x3, 0x0, 0x8, 0x0, 0x0, 0x2}) sendmsg$TIPC_NL_MEDIA_GET(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000800)=ANY=[@ANYBLOB="02d7467778504640238021eb146d3438998251a1743a2b12a5f0fd0ad11e52a9abc0a6aab3e48fdcd60562e244c1d72de8e8340347ff8c1428e779f790684c71b53380f2731daf4632b9e2aba83553cc6381099466219c5922eb2318bfbda31fe87f70265d6db8c3568f"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 12:27:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local, 0x0}, &(0x7f0000000500)=0xc) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x100000001, @empty, r2}, 0xc) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) [ 316.527832][ T8784] IPVS: ftp: loaded support on port[0] = 21 12:27:31 executing program 5: r0 = syz_open_dev$vcsa(0x0, 0x7ff, 0x10040) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, &(0x7f0000000040)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) mkdir(0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x100000405, 0x0) chdir(&(0x7f00000005c0)='./file1\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = getpid() lsetxattr$security_smack_entry(0x0, &(0x7f0000000400)='security.SMACK64EXEC\x00', &(0x7f0000000680)='#cgroup:\x88Ftrusted\x00', 0xae, 0x2) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000480)='btrfs\x00', 0x0, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[]) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x2, &(0x7f0000000c40)=ANY=[]) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x1ff) r3 = getgid() lstat(&(0x7f0000000300)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000440), &(0x7f0000000540)) getresuid(&(0x7f0000000580), &(0x7f0000000600)=0x0, &(0x7f0000000640)) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x4000, &(0x7f00000006c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@uname={'uname', 0x3d, '(/+'}}, {@fscache='fscache'}, {@posixacl='posixacl'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@access_uid={'access', 0x3d, r4}}, {@cache_loose='cache=loose'}, {@version_L='version=9p2000.L'}], [{@uid_lt={'uid<', r5}}, {@subj_user={'subj_user', 0x3d, 'ppp1'}}, {@hash='hash'}, {@obj_role={'obj_role', 0x3d, '#cgroup:\x88Ftrusted\x00'}}, {@euid_eq={'euid', 0x3d, r6}}]}}) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f00000001c0)) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0x1200}) 12:27:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x1e0, &(0x7f0000000000)=[{&(0x7f0000000140)="24000000180007041dfffd946f610500020081001f0000050000080008000b001200ff7e", 0xffffffffffffffd5}], 0x1}, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.advise\x00') ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0xfffffffffffffffa) 12:27:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) socketpair(0x4, 0xf, 0x8, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000180)={r4, 0x0, 0x10, 0x6, 0x80}, &(0x7f00000001c0)=0x18) bind$bt_hci(r1, &(0x7f0000000040), 0xc) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) close(r1) [ 316.977255][ T8797] overlayfs: missing 'lowerdir' [ 317.022718][ T8796] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 12:27:32 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x40000) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000180)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = socket(0xa, 0x802, 0x88) r2 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2}, 0x1c) writev(r2, &(0x7f0000fb1000)=[{&(0x7f0000000000)="480000001400197f09004b0109048c590a88bfffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e0000000000d5a49b19007a9eace3dbe8b12c000000000000000000", 0x48}], 0x1) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 12:27:32 executing program 3: r0 = socket(0x40100000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1) getsockopt(r0, 0x800000000000114, 0x2716, 0x0, &(0x7f0000000080)) 12:27:32 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") writev(r0, &(0x7f0000000040)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080482900000046000107a277001419000a000d000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1d5) [ 317.147596][ T8792] 9pnet: Insufficient options for proto=fd 12:27:32 executing program 3: r0 = socket$inet(0x10, 0x3, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0xc0, 0x0) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_keyring_id(0x0, r2, 0x0) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x2000005) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000280)={'nat\x00'}, &(0x7f00000000c0)=0x78) listxattr(&(0x7f0000000300)='./file0\x00', &(0x7f00000013c0)=""/21, 0x15) ioctl$LOOP_CLR_FD(r1, 0x4c01) ioctl$LOOP_SET_FD(r1, 0x4c00, 0xffffffffffffffff) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000380), &(0x7f00000003c0)=0x4) socketpair$unix(0x1, 0xffffffffffffffff, 0x0, &(0x7f0000000240)) 12:27:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="010001000000000088b070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000006110100000000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 317.325624][ T8784] IPVS: ftp: loaded support on port[0] = 21 12:27:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = msgget$private(0x0, 0x40) msgctl$IPC_RMID(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$inet(0x2b, 0x801, 0x8) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10402, 0x0) ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f0000000040)) connect$inet(r2, &(0x7f0000000200), 0x10) 12:27:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000480)={@initdev, @local}, &(0x7f0000000500)=0xc) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:32 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x0) mmap(&(0x7f0000008000/0xe000)=nil, 0xe000, 0x0, 0x20011, r0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x4, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="24000000000507031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20ce97ed01cc0", 0x4c}], 0x1}, 0x0) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x9c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x9, 0x60}}], 0x48}, 0x0) 12:27:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xae}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8804}, 0x10) ioctl$KDSKBLED(r1, 0x4b65, 0x4) 12:27:33 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x200, 0x0) accept4$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000500)=0x14, 0x800) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dsp\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setxattr(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)=@known='trusted.overlay.redirect\x00', &(0x7f00000003c0)='{vboxnet1\x00', 0xa, 0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') fanotify_init(0x4e, 0x800) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1010118}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r3, 0xc00, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000400)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='gfs2meta\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x400a, &(0x7f00000001c0)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@access_user='access=user'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'gfs2meta\x00'}}]}}) 12:27:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000040)={0x200000002, 0x70, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e88e9bb, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8, 0x0, 0x0, 0x40000}, 0xffffffffffffffff, 0x0, r0, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e2f66696c65302020280aeb10f436c6f80adc8752252e962ca8bc35018000006f04c5f42e50f269027044d32daecc1bc3e5ca8d4528e4e8937b12e453ffe8c5a7e3a1df52de5b753cdf5e0d9f1c7bb3070f8487b7f9186200c404b600977a0bfb176fd29b00b994ac9f84c086cff7d2c47fcec346a009953251d98e696b4ba44a"], 0x6f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$SG_GET_ACCESS_COUNT(r2, 0x2289, &(0x7f0000000140)) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000180)=0x102000) ptrace(0x10, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 12:27:33 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockname(r0, &(0x7f0000001640)=@caif=@dgm, &(0x7f00000016c0)=0x80) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000540)) bind$llc(r1, &(0x7f0000000580)={0x1a, 0x6, 0xffffffffffffffff, 0x8, 0x8, 0xed, @broadcast}, 0x45) bpf$OBJ_GET_MAP(0x7, &(0x7f00000005c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0xffffffffffffffd6) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000001780)='/proc/self/attr/exec\x00', 0x2, 0x0) r2 = socket(0x10, 0x3, 0x0) sendto(r2, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x44}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f00000001c0)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x1, 0x6, &(0x7f0000000300)={0x77359400}) getpeername$tipc(r1, &(0x7f0000000180)=@id, &(0x7f0000001600)=0x10) [ 317.923944][ T8855] input:  as /devices/virtual/input/input5 12:27:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") preadv(r0, &(0x7f0000001740)=[{&(0x7f0000000080)=""/107, 0x6b}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/115, 0x73}, {&(0x7f0000000240)=""/214, 0xd6}, {&(0x7f0000000340)=""/203, 0xcb}, {&(0x7f0000000440)=""/84, 0x54}, {&(0x7f00000004c0)=""/122, 0x7a}, {&(0x7f0000001580)=""/125, 0x7d}, {&(0x7f0000001600)=""/23, 0x17}, {&(0x7f0000001640)=""/241, 0xf1}], 0xa, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f0000000180)="8e", 0x1, 0x8000, 0x0, 0x0) close(r1) [ 317.988341][ T8858] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 318.027246][ T8867] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 12:27:33 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) [ 318.154568][ T8879] gfs2: gfs2 mount does not exist 12:27:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000140)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f00000001c0)={0x4, 0x8, 0xfa00, {r2, 0xedf}}, 0x10) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x0) recvmmsg(r4, &(0x7f0000004ec0)=[{{0x0, 0x35b, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x200005e4}], 0x2}}], 0x1, 0x0, 0x0) [ 318.229973][ T8886] 9pnet: p9_fd_create_tcp (8886): problem connecting socket to 127.0.0.1 [ 318.244452][ T8859] input:  as /devices/virtual/input/input6 [ 318.250841][ T8859] input: failed to attach handler leds to device input6, error: -6 12:27:33 executing program 3: syz_read_part_table(0xffffffffffffffff, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="0200a6ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 12:27:33 executing program 4: r0 = open(&(0x7f00000006c0)='./file1\x00', 0x0, 0x4) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x100) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(0x0, 0xf4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x480, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0x1c00000000, 0x4) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000180)=0x1) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000280)={0x0, 0x1, {0x34, 0x17, 0x15, 0x8, 0x6, 0xff, 0x3, 0x5e}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) migrate_pages(0x0, 0x2, &(0x7f00000002c0)=0x200, &(0x7f0000000340)=0x7f) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc4ac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x48010000, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)={0x1c8, r3, 0xc00, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x758}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x36c}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcf}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2e}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x95}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffdacb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x14000000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x800}, 0x8091) [ 318.370334][ T8879] gfs2: gfs2 mount does not exist [ 318.390833][ T8886] 9pnet: p9_fd_create_tcp (8886): problem connecting socket to 127.0.0.1 12:27:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfffffcad) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/4096, 0x20010485}], 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 12:27:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xae}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8804}, 0x10) ioctl$KDSKBLED(r1, 0x4b65, 0x4) [ 318.857996][ T8908] input:  as /devices/virtual/input/input7 12:27:34 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, r3, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xae}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x8804}, 0x10) ioctl$KDSKBLED(r1, 0x4b65, 0x4) 12:27:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xb0500000713000, 0x0, 0x0, 0x0) [ 319.473703][ T26] audit: type=1326 audit(1553689654.564:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8938 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x0 [ 319.496037][ T8940] input:  as /devices/virtual/input/input8 12:27:34 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:34 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:34 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x20000000000bcc) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x2, 0x4, {0x0, 0x7fff, 0x3, 0x1}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000100)=@alg, 0x3bb, 0x0, 0x0, 0x0, 0x27a}}], 0x400000000000040, 0x10122, 0x0) 12:27:34 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000740)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[], 0xfffffcad) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/4096, 0x20010485}], 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)={'team0\x00'}) 12:27:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0xfcf0b7078c2d3072, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000200)={0x7, 0x4d, 0x2}, 0x7) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000000)={0x1000000a, 0xfffbffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x80000, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0xa8200, 0x0) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000002000000", @ANYRES32=r3, @ANYBLOB="0000000000f0ffffffffffff0080000000000000bfb063768aacaa980fe993515e44d01c355ad831c17e7bb105dca86074ac914a7119", @ANYRES32=r4, @ANYBLOB="0000000000200000000000000000010000000000"]) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 12:27:35 executing program 4: r0 = open(&(0x7f00000006c0)='./file1\x00', 0x0, 0x4) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x100) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(0x0, 0xf4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x480, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0x1c00000000, 0x4) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000180)=0x1) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000280)={0x0, 0x1, {0x34, 0x17, 0x15, 0x8, 0x6, 0xff, 0x3, 0x5e}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) migrate_pages(0x0, 0x2, &(0x7f00000002c0)=0x200, &(0x7f0000000340)=0x7f) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc4ac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x48010000, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)={0x1c8, r3, 0xc00, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x758}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x36c}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcf}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2e}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x95}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffdacb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x14000000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x800}, 0x8091) 12:27:35 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4000000004, 0x4, 0x8}, 0x2c) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f00000000c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 320.243853][ T26] audit: type=1326 audit(1553689655.334:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=8938 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0x0 12:27:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x3, 0x35b, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x761) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) fstat(r0, &(0x7f0000000080)) 12:27:35 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 320.714846][ T8991] QAT: Invalid ioctl 12:27:35 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/240) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000100)) 12:27:36 executing program 4: r0 = open(&(0x7f00000006c0)='./file1\x00', 0x0, 0x4) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x100) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(0x0, 0xf4, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x480, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0x1c00000000, 0x4) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000180)=0x1) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, 0x0) sched_setaffinity(0x0, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000280)={0x0, 0x1, {0x34, 0x17, 0x15, 0x8, 0x6, 0xff, 0x3, 0x5e}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) migrate_pages(0x0, 0x2, &(0x7f00000002c0)=0x200, &(0x7f0000000340)=0x7f) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc4ac, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x48010000, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000640)={&(0x7f0000000440)={0x1c8, r3, 0xc00, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xf}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'teql0\x00'}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x758}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x36c}]}, @TIPC_NLA_MEDIA={0x70, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcf}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2e}]}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x95}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffdacb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x14000000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x800}, 0x8091) 12:27:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0_to_bond\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x10c, 0x4) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_aout(r1, &(0x7f0000007180)=ANY=[@ANYBLOB="fa73eb1fa2af79ef4b2b39e6e77e"], 0xe) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f00000000c0)=0xfffffffffffffffd, 0x4) recvmmsg(r1, &(0x7f0000006f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2040, 0x0) 12:27:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) [ 321.153332][ T8996] QAT: Invalid ioctl 12:27:36 executing program 5: socketpair$unix(0x1, 0x200000000000001, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$reiserfs(&(0x7f00000004c0)='reiserfs\x00', &(0x7f0000000500)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f0000000b80)={[{@resize={'resize'}}, {@grpquota='grpquota'}, {@errors_continue='errors=continue'}]}) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3f, 0x0) 12:27:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x21, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000140)) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000010000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000080)="c421fbe62e66baf80cb881f5198def66bafc0cb09cee48b880d9555f000000000f23c80f21f835000050000f23f8470f20c0b8010000000f01c1c402118eb302000000b9800000c00f3235008000000f3066ba410066b85c0266efb9430900000f3266bad00466b8000066ef", 0x6c}], 0x1, 0x0, 0x0, 0xffffffffffffff45) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000200)={0x4, 0x71, &(0x7f0000000180)="af778bd05e114a0b1dc2f89187fbdf9896c4bfefa2b1e4d32839171453a6f7ff308f12ea6351a306e3cbca1a7e58bd4d5dddce9ad4ce9d090504fb04a4edd90707bcd64f5b01b46e13fb6888b7dc874b2c478c67caf400b11ad5578b8439efeb6e8227621cdf6b17d5b7326cebd4f65411"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000280)={[0x6000, 0x1000, 0x100000, 0x5000], 0x400, 0x4, 0x6}) [ 321.532056][ T9020] REISERFS warning (device loop5): reiserfs_fill_super: Cannot allocate commit workqueue 12:27:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d96b63190408000340000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/240, 0xf0}], 0x1, &(0x7f00000002c0)=""/110, 0x6e}, 0x161) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000380)="998c2f65f3ef998a5f826427e19fab293ff3adeb8731f7ab868ceaf962e7f9a945134c2480a117cfa8d748f5f128666bae62bd95fd6d2296abfbfa") 12:27:37 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:27:37 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x100) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000000c0)={0xe2c, 0x28, 0x1, r1}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x8802) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000180)={0x100323, 0x6}) 12:27:37 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200180, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="46000000060000005de6f00568efb3a23dd5f4d513da2066f009c8ee03d1713110ed01095cdc29f715000000f1cf18d10f028ba842dcbb9ca1cc02e9348eea152701a95a2e0db6"], &(0x7f0000000180), 0x1c41773f3a806ef6) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x2080) ioctl$LOOP_CHANGE_FD(r1, 0x1261, 0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000280)=0x1ac) r4 = gettid() kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000240)={r0, r2, 0x2}) 12:27:37 executing program 4: pipe(0x0) r0 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) recvmmsg(r1, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x6, 0x4) fstat(r1, &(0x7f0000000340)) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) socket$alg(0x26, 0x5, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd601bfc97004d8800fe800000000000000000000000000000ff020000000000000000010a0000000100004e20004d9078e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"], 0x0) shutdown(r1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) 12:27:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) [ 322.589788][ T9054] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 322.650805][ T9058] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 12:27:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008103e00f80ecdb4cb9d96b63190408000340000000fb120001000e00da1b40d819a9060015000000", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/240, 0xf0}], 0x1, &(0x7f00000002c0)=""/110, 0x6e}, 0x161) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000380)="998c2f65f3ef998a5f826427e19fab293ff3adeb8731f7ab868ceaf962e7f9a945134c2480a117cfa8d748f5f128666bae62bd95fd6d2296abfbfa") 12:27:37 executing program 3: r0 = socket$inet6(0xa, 0x800000003, 0x9) connect$inet6(r0, &(0x7f0000000040), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f00000002c0)=""/170, 0xaa}], 0x1}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80000, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f00000000c0)) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000000)=0xffffffff, 0x4) 12:27:37 executing program 4: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000080)=""/253, &(0x7f0000000180)=0xfd) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={0x0, 0x1ff}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000002c0)={r3, 0x1dc6000000000000, 0x28c4f8a8, 0x7}, 0x10) flock(r2, 0x1) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000340)="ff0204000000000000000000000000000000000000000000", 0x18) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) close(r0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000300)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000380)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f00000003c0)={r4, r5}) [ 322.886168][ T9064] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 12:27:38 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 12:27:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x10002) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0xc0605345, &(0x7f0000000100)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000200)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x5, 0x1, 0x5, 0x1}) 12:27:38 executing program 1: bind(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x4e24, 0x0, @dev}}}, 0x2fa) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f1, &(0x7f0000000040)={'tunl0\x00', @ifru_data=&(0x7f0000000000)="ac8be4abd0f79d6325ae476aab5970a3131f2fb4bbfb3c75500e33d0612f430d"}) 12:27:38 executing program 4: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r0, &(0x7f0000000000)="88", 0x2f2) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:27:38 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'eql\x00\x00\xdf\xdd\x94D\x8f\x15\xcf!\x00', 0xec38ed91f1c74952}) ioctl$TUNDETACHFILTER(r0, 0x400454cc, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001380)=0x14) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000013c0)=r1) 12:27:38 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = dup(r2) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000040)={0x7f, "ceed212c54557fe07eac14cf43ee824c955daa7b16870fe7c59db5e808afeaa2", 0x10, 0x2, 0x800, 0x1d, 0x3}) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x7b, 0x0, [0x200000485, 0xffffffffffffffff]}) 12:27:38 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) epoll_create(0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400000, 0x0) linkat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000100)='./file0\x00', 0x1000) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000140)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000003c0)={0x0, 0xfffffffd, 0x2, {0x2, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000180)) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc058565d, &(0x7f0000000200)={0xffffffffffffffff, 0x1000, 0xfffffffffffffffc, {0x0, @raw_data="2085f3072c9b42f03f10be83b68ebcf014a0409fdf8be3d3e82c747c7f79f7cee00b443f02000000a91ca25441677d169fb75a152d6eebf4bef6c96076d67f243aebaac6430c9ef1a788e60eb3d0a7c29a5e3416871c8a51df55701a05e0a2f09883c482efaf6dc9e1695038733a23bbf0faf76a1d3fae5c251c4fad507b2ead2f1581057e3f84f3e8503ee570d8069eb53a897d2dd5f3d89629917fb171132181e9f3c510ac5229a6b6096547977578c5795d84cf23fe1d042df97dbd37a4b3d0e338a1b611e3ae"}}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 12:27:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) bind$isdn(r0, &(0x7f0000000040)={0x22, 0x81, 0xd97, 0xffff, 0x34}, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[], 0x0) setgroups(0x400000000000033d, &(0x7f0000000100)=[0x0]) socket$inet(0x2, 0x2, 0x1) 12:27:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:38 executing program 3: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x0, @loopback, 0x0, 0x0, 'lblcr\x00\x00\x00\x00\x00\x00\a\x00'}, 0xfffffec3) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x100000000003, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x400452c8, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x2000000000000000, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001380)={{{@in, @in=@remote}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@mcast2}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$IMCLEAR_L2(0xffffffffffffffff, 0x80044946, 0x0) ioctl$int_in(r2, 0x800040c004500a, &(0x7f0000000040)=0x80000002) read$FUSE(r2, &(0x7f0000000200), 0x1000) write$smack_current(r2, &(0x7f0000000080)='\x00', 0x1) ioctl$LOOP_CLR_FD(r2, 0x4c01) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000001540)={0x8, 0x3, 0xc5, 'queue1\x00\x00\x00\x00\x00\x00\xca\x01\x00'}) syz_init_net_socket$x25(0x9, 0x5, 0x0) r3 = getpgrp(0xffffffffffffffff) capset(&(0x7f0000001600)={0x20071026, r3}, &(0x7f0000001640)={0x8, 0x3, 0xe97, 0x400, 0x6, 0xde}) read$alg(r2, &(0x7f0000001340)=""/24, 0x18) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000f71000/0x2000)=nil) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) 12:27:38 executing program 4: mmap(&(0x7f0000004000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000000180)={0xfffffffffffffffd}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0)={0xfffffffffffffdb0}, 0x8, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x200000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000200)={0x2710, 0x2, 0x3000, 0x1000, &(0x7f0000004000/0x1000)=nil}) read(r1, &(0x7f0000000080)=""/128, 0xae3f3fb) 12:27:38 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x420800, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0x80) socket$key(0xf, 0x3, 0x2) 12:27:38 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:38 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)) fcntl$getown(0xffffffffffffff9c, 0x9) r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/ip_mr_cache\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x1) 12:27:38 executing program 4: dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000200)='./bus\x00', 0x140) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0xffffffffffffffdc, 0x66, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000140), 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) add_key$user(&(0x7f0000000240)='user\x00', 0x0, &(0x7f00000002c0), 0x0, 0xfffffffffffffffe) prctl$PR_GET_FP_MODE(0x2e) write$tun(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000003c0)='127.0.0.1\x04', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc004, &(0x7f0000000640)=ANY=[@ANYBLOB='trans=rdma,port=0x00000p0000000000,sq=0x0000000000000080,rq=0x0000000000000004,fowner>', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b6673726f6f743d2f6578650009c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e3332653002c7375626a5f726f6c653d2c66736e616d653d272d47504c2c646566636f6e746578743d73797374656d5f752c00"]) [ 323.846200][ T9124] capability: warning: `syz-executor.3' uses deprecated v2 capabilities in a way that may be insecure 12:27:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'ip6gretap0\x00', 0x0}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80000, 0x0) inotify_add_watch(r2, &(0x7f00000000c0)='./file0\x00', 0x20000000) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="400000001400010100000000000000000a000000", @ANYRES32=r1, @ANYBLOB="14000600a30b00000100fe8000000000000000000000000000a80000000000000000000000000000"], 0x40}}, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000040)) r3 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x20000, 0x89) ioctl$SIOCX25SCUDMATCHLEN(r3, 0x89e7, &(0x7f0000000200)={0x7b}) 12:27:39 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000000)) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) futex(0x0, 0x1, 0x0, 0x0, &(0x7f0000000040)=0x2, 0x10) [ 324.026584][ T9137] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:27:39 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x100, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f0000000040)) [ 324.105932][ T9145] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 12:27:39 executing program 1: pipe(&(0x7f0000000a00)={0xffffffffffffffff}) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000000)=ANY=[@ANYBLOB="050000fa53000000ff1479b939401354ec051c6b8067de2a6640e710f2ba45fb43555323aefdc17ed836fc003e66e4d0a5a47491474dde63e80123e3f8536c9e19afaeff0000000000000000000000"]) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r0) accept4$ax25(r0, &(0x7f0000000100)={{0x3, @null}, [@default, @bcast, @rose, @null, @null, @bcast, @default]}, &(0x7f0000000080)=0x48, 0x80800) sendmsg$netlink(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) recvmmsg(r2, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 12:27:39 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:39 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, 0x8, 0x7, 0x1, &(0x7f0000ffd000/0x1000)=nil, 0x401}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000004c0)='cgroup.procs\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000001c0)=@ipx, 0x80, 0x0, 0x15e}}], 0x1, 0x0, 0x0) preadv(r2, &(0x7f00000009c0)=[{&(0x7f0000000500)=""/154}, {&(0x7f00000003c0)=""/68}, {&(0x7f00000005c0)=""/214}, {&(0x7f00000006c0)=""/194}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/144}, {&(0x7f0000000480)=""/13}, {&(0x7f0000000940)=""/71}], 0x2a9, 0x0) 12:27:39 executing program 3: mknod$loop(&(0x7f00000000c0)='./file1\x00', 0x2000, 0x0) r0 = open(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000100)={0x0, @reserved}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000040)=0x4) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000003c0)={{&(0x7f0000000280)=""/204, 0xcc}, &(0x7f0000000380), 0x5a}, 0x20) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000400)=0x0) fcntl$lock(r0, 0x7, &(0x7f0000000440)={0x0, 0x0, 0x4, 0xffffffffffff0000, r1}) 12:27:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) lsetxattr$security_smack_entry(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm], 0x1) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0xffffff7f, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4080000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getuid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000480)=0xc) fcntl$getownex(r0, 0x10, 0x0) accept$netrom(r3, &(0x7f00000004c0)={{}, [@remote, @rose, @remote, @rose, @rose, @rose, @rose, @null]}, &(0x7f0000000000)=0x48) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getpeername$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) sendto$llc(r3, &(0x7f0000000380)="68afd25c177c792c142e7d99aca2d44d302d24e09a42f52793fd70bb89639cbbbaf714a60410b58d751b3a291c766fd62acdc1162a4a9c16e8eff5a51c7e59fa067a1cb71403c6bb", 0x48, 0x4040010, 0x0, 0x0) 12:27:39 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:39 executing program 3: r0 = socket$inet(0x2, 0x80000, 0x8000) r1 = accept4$ax25(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x80000) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f00000002c0)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r2}) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$VIDIOC_EXPBUF(r3, 0xc0405610, &(0x7f0000000140)={0x3, 0x4, 0x5, 0x80000}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB="0000030006000000e5c4554d658dfc24ac1414bbffffffffac1414aaac1414aaffffffffac1414bb0000000000010000c24f77f944f0b74c9c736bb75854b5b7da280085cd9ae3f7e9ffe049bcb68b3d8d27b31f4ab1e6519cd13525fe7a30b030561e4215ee53eda7a6770ab708593e34fdc1f19421fe4b9ab5dd67"], 0x28) 12:27:40 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x40046109, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x4b34, 0x5) 12:27:40 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@default, @remote, @netrom, @remote, @default, @bcast, @rose, @default]}, &(0x7f00000000c0)=0x48, 0x800) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x2, 0x89, 0xff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x3, 0x2) 12:27:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x80, 0x20}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000003c0)={r2, 0x92}, 0x8) r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$KVM_SET_SREGS(r3, 0x4138ae84, &(0x7f00000001c0)={{0xd000, 0x0, 0xf, 0xfffffffffffffffa, 0xe000000000000000, 0x3ff, 0x0, 0x3, 0xd8f8, 0x3, 0x7, 0x1}, {0x4000, 0x6000, 0xe, 0xaa, 0x1, 0x9, 0x8, 0x101, 0x7, 0x7fffffff, 0x7f, 0x100000000}, {0x1, 0xf000, 0x10, 0x2, 0x401, 0x1, 0x8000, 0x8, 0x8000000, 0xff, 0x95, 0x1ff}, {0x107002, 0x4, 0x3, 0x200, 0x528b, 0x7, 0x6c, 0x9, 0x8001, 0x7ff, 0x55, 0x1}, {0xd000, 0x0, 0xc, 0x8, 0xffffffff, 0x2, 0x6, 0x8, 0xff7, 0x2, 0x100, 0x7}, {0x100000, 0x1, 0xb, 0x1, 0x101, 0x5, 0x4, 0x1, 0x7, 0x0, 0x1ff, 0xfffffffffffffff7}, {0x103000, 0x7000, 0xb, 0xdbc8, 0x10001, 0xffffffffffff8001, 0xffff, 0x4fb, 0x126, 0xe0, 0xe, 0xa9}, {0x1, 0x100000, 0xf, 0x2, 0x9, 0x400, 0x33, 0x5, 0x3, 0x8000, 0x8, 0x211}, {0x5000, 0x10000}, {0x3000, 0xf000}, 0x10000, 0x0, 0x6000, 0x400, 0x5, 0x4000, 0x107002, [0x7fff, 0x100000001, 0x251, 0x80]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r3, 0x6, 0x1, 0x6, 0x3f}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x8) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x0, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000100)={0x2, 0xf, 0x0, 0x0, 0x14, 0x2000000, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 12:27:40 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x9b1, 0x400) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x7ff, 0x1}, 0x8) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0x80045500, &(0x7f0000000000)) mmap$perf(&(0x7f00001db000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) 12:27:40 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:40 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:40 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f00000000c0), r2}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x10000000003, 0x9) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070a07681dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 12:27:40 executing program 1: r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000000)={{0x3, @netrom}, [@default, @remote, @netrom, @remote, @default, @bcast, @rose, @default]}, &(0x7f00000000c0)=0x48, 0x800) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x2, 0x89, 0xff}) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x3, 0x2) 12:27:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e24, @multicast1}}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f500000000000002000000ed05000500000000000a000000000000ae46980000085c000000170000000000083104296044882f1c"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x4000) bind$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x1, 0x697a, 0x5, 0x7ff, 0x9, 0x7}}, 0x8) 12:27:40 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$netlink(r0, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000380)=0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000180)=""/207) write$USERIO_CMD_SEND_INTERRUPT(r1, 0x0, 0x0) unshare(0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) shmget$private(0x0, 0x1000, 0x228, &(0x7f0000fff000/0x1000)=nil) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, 0x0) pipe2(&(0x7f0000000140), 0x0) keyctl$session_to_parent(0x12) r4 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000022c0)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f00000023c0)=0xe8) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') ioctl$TUNSETOWNER(r1, 0x400454cc, r5) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000041}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r6, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x47ba53a8}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x48080) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={[], 0x0, 0xbd, 0x279d, 0x0, 0x0, r3}) 12:27:40 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x1) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 12:27:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)={0x14, r1, 0x101}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) perf_event_open(&(0x7f0000000280)={0x3, 0x70, 0x22, 0x3f, 0x0, 0x7fffffff, 0x0, 0x8000, 0x4, 0xf, 0x7fffffff, 0x9, 0xfffffffffffffffe, 0x9, 0x0, 0x6, 0x7f1, 0x57, 0x7, 0x9, 0xfffffffffffffffa, 0x1000, 0x0, 0x3ff, 0x0, 0xc4, 0x8, 0x6, 0x1, 0x101, 0x2, 0xfffffffffffffffd, 0x200, 0x7, 0x300000000, 0x8, 0x3, 0x6, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000240), 0x8}, 0x408, 0x1, 0x3ff, 0x7, 0x2, 0x8, 0x9}, r2, 0x5, 0xffffffffffffffff, 0x9) openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x20000, 0x0) syz_mount_image$gfs2(&(0x7f00000003c0)='gfs2\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2, &(0x7f00000004c0)=[{&(0x7f0000000440)="2ff883109b0ff990768ed05ad1136f2a2a0db1eabf6d19e26f7fe552dc22e6e3c8e3240dfda8b21c8c23faca06e20c3627e79d3ae3822cff7c0248d2b268e5dccbba5138c39f12b9363379db535a931513b4f30602cece88e116c04a7b3abbb0298881f9a3c32c2ce0", 0x69, 0x1ff}, {&(0x7f0000000540)="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", 0x1000, 0x3037}], 0x20, &(0x7f0000001540)={[{@data_ordered='data=ordered'}], [{@euid_lt={'euid<', r3}}, {@uid_eq={'uid', 0x3d, r3}}, {@euid_gt={'euid>', r3}}, {@subj_user={'subj_user', 0x3d, '/dev/md0\x00'}}, {@appraise_type='appraise_type=imasig'}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x24001002}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0xc0, r1, 0x900, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fff}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3ff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffffffffffd7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x80000001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10}, 0x10) 12:27:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x4e24, @multicast1}}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f500000000000002000000ed05000500000000000a000000000000ae46980000085c000000170000000000083104296044882f1c"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x5, 0x4000) bind$bt_sco(r2, &(0x7f00000000c0)={0x1f, {0x1, 0x697a, 0x5, 0x7ff, 0x9, 0x7}}, 0x8) [ 326.045715][ T9241] binder_alloc: 9239: binder_alloc_buf, no vma [ 326.075029][ T9241] binder: 9239:9241 transaction failed 29189/-3, size 24-8 line 3147 12:27:41 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000040)={0xc, 0x8b, "1df5053dcb4ba2c12039a78c285b608fc6ff8c3790c8c6b76fce1a46ed930cebb3b8063a50b31131fdfc3dd0e4fa866a97e7ef3522d2a6dc9a79cb34d038e337a550cd6465b10d63daf8c12f75d79c997f517b3c1f92380c700c13526b79512da82afae51a8892966b4403dc229924242d829a374457a5ac17860947442873c5e756406a8807232537f7c7"}, 0x91) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'Lsr0\x00\x00\x14\xf4M`\x00\x00\x80\x00', &(0x7f0000000200)=@ethtool_perm_addr={0xa}}) [ 326.124513][ T9247] binder: BINDER_SET_CONTEXT_MGR already set [ 326.143724][ T9247] binder: 9239:9247 ioctl 40046207 0 returned -16 12:27:41 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) [ 326.202547][ T12] binder: undelivered TRANSACTION_ERROR: 29189 [ 326.210008][ T9249] binder_alloc: 9239: binder_alloc_buf, no vma 12:27:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 326.305157][ T9249] binder: 9239:9249 transaction failed 29189/-3, size 24-8 line 3147 [ 326.338270][ T3262] binder: undelivered TRANSACTION_ERROR: 29189 [ 326.400725][ T9267] [ 326.403154][ T9267] ===================================================== [ 326.406715][ T9265] kobject: '7:0' (00000000cf8d502d): kobject_add_internal: parent: 'bdi', set: 'devices' [ 326.410116][ T9267] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 326.410134][ T9267] 5.1.0-rc2+ #38 Not tainted [ 326.431124][ T9265] kobject: '7:0' (00000000cf8d502d): kobject_uevent_env [ 326.431958][ T9267] ----------------------------------------------------- [ 326.431973][ T9267] syz-executor.5/9267 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 326.431978][ T9267] 00000000894b0177 (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_read+0x540/0x1940 [ 326.432226][ T9267] [ 326.432226][ T9267] and this task is already holding: [ 326.440151][ T9265] kobject: '7:0' (00000000cf8d502d): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 326.446079][ T9267] 00000000107565bf (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 326.446106][ T9267] which would create a new lock dependency: [ 326.446161][ T9267] (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} [ 326.446184][ T9267] [ 326.446184][ T9267] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 326.446187][ T9267] (&(&ctx->ctx_lock)->rlock){..-.} [ 326.446196][ T9267] [ 326.446196][ T9267] ... which became SOFTIRQ-irq-safe at: [ 326.446286][ T9267] lock_acquire+0x16f/0x3f0 [ 326.446369][ T9267] _raw_spin_lock_irq+0x60/0x80 [ 326.458410][ T9265] kobject: 'loop0' (00000000161ddf54): kobject_add_internal: parent: 'block', set: 'devices' [ 326.463805][ T9267] free_ioctx_users+0x2d/0x4a0 [ 326.463902][ T9267] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 326.463923][ T9267] rcu_core+0x928/0x1390 [ 326.463937][ T9267] __do_softirq+0x266/0x95a [ 326.463957][ T9267] irq_exit+0x180/0x1d0 [ 326.475148][ T9265] kobject: 'loop0' (00000000161ddf54): kobject_uevent_env [ 326.482748][ T9267] smp_apic_timer_interrupt+0x14a/0x570 [ 326.482760][ T9267] apic_timer_interrupt+0xf/0x20 [ 326.482804][ T9267] write_comp_data+0x0/0x70 [ 326.482874][ T9267] batadv_nc_worker+0x4d9/0x760 [ 326.482902][ T9267] process_one_work+0x98e/0x1790 [ 326.498619][ T9265] kobject: 'loop0' (00000000161ddf54): kobject_uevent_env: uevent_suppress caused the event to drop! [ 326.503093][ T9267] worker_thread+0x98/0xe40 [ 326.503104][ T9267] kthread+0x357/0x430 [ 326.503116][ T9267] ret_from_fork+0x3a/0x50 [ 326.503121][ T9267] [ 326.503121][ T9267] to a SOFTIRQ-irq-unsafe lock: [ 326.503124][ T9267] (&ctx->fault_pending_wqh){+.+.} [ 326.503134][ T9267] [ 326.503134][ T9267] ... which became SOFTIRQ-irq-unsafe at: [ 326.503136][ T9267] ... [ 326.503150][ T9267] lock_acquire+0x16f/0x3f0 [ 326.503160][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.503175][ T9267] userfaultfd_release+0x48e/0x6d0 [ 326.503241][ T9267] __fput+0x2e5/0x8d0 [ 326.503258][ T9267] ____fput+0x16/0x20 12:27:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:41 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 12:27:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000020807031dfffd946fa2830020200a0009000102001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 12:27:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000040)={@broadcast, @rand_addr, @multicast1}, &(0x7f0000000080)=0xc) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0xfffffffffffffe0a, &(0x7f0000000140), 0x100000000000011e, 0x0, 0xfffffffffffffff3}, 0x20000000000) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x3f9, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000100)={0x7, 0x2, @stop_pts=0x570}) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xe3, 0x1, 0x1, 0x0, 0x2, 0x3e, 0x4, 0x133, 0x40, 0x99, 0x3, 0x3ff, 0x38, 0x2, 0xd643, 0x2, 0x5}, [{0x1, 0x16, 0xffff, 0x100000000, 0x8, 0x100, 0x4, 0x4}, {0x0, 0x100000001, 0x9, 0x80000000, 0x38, 0x200, 0x4, 0x4}], "6e9c46de0c99b9a0e71a9e9d86674deed7050fbabf7725227be967e8458165", [[], [], [], [], [], [], [], [], []]}, 0x9cf) [ 326.513690][ T9265] kobject: 'holders' (00000000a0cec307): kobject_add_internal: parent: 'loop0', set: '' [ 326.521206][ T9267] task_work_run+0x14a/0x1c0 [ 326.521252][ T9267] exit_to_usermode_loop+0x273/0x2c0 [ 326.521266][ T9267] do_syscall_64+0x52d/0x610 [ 326.521287][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.521291][ T9267] [ 326.521291][ T9267] other info that might help us debug this: [ 326.521291][ T9267] [ 326.521294][ T9267] Chain exists of: [ 326.521294][ T9267] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 326.521294][ T9267] [ 326.521311][ T9267] Possible interrupt unsafe locking scenario: [ 326.521311][ T9267] [ 326.521314][ T9267] CPU0 CPU1 [ 326.521318][ T9267] ---- ---- [ 326.521320][ T9267] lock(&ctx->fault_pending_wqh); [ 326.526992][ T9265] kobject: 'slaves' (0000000014a4ec6e): kobject_add_internal: parent: 'loop0', set: '' [ 326.534230][ T9267] local_irq_disable(); [ 326.534233][ T9267] lock(&(&ctx->ctx_lock)->rlock); 12:27:41 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) [ 326.534241][ T9267] lock(&ctx->fd_wqh); [ 326.534248][ T9267] [ 326.534250][ T9267] lock(&(&ctx->ctx_lock)->rlock); [ 326.534256][ T9267] [ 326.534256][ T9267] *** DEADLOCK *** [ 326.534256][ T9267] [ 326.534265][ T9267] 1 lock held by syz-executor.5/9267: [ 326.534268][ T9267] #0: 00000000107565bf (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 326.534300][ T9267] [ 326.534300][ T9267] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 326.534309][ T9267] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 326.534357][ T9267] IN-SOFTIRQ-W at: [ 326.534376][ T9267] lock_acquire+0x16f/0x3f0 [ 326.534388][ T9267] _raw_spin_lock_irq+0x60/0x80 [ 326.534411][ T9267] free_ioctx_users+0x2d/0x4a0 [ 326.534445][ T9267] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 326.540445][ T9265] kobject: 'loop0' (00000000161ddf54): kobject_uevent_env [ 326.543947][ T9267] rcu_core+0x928/0x1390 [ 326.543960][ T9267] __do_softirq+0x266/0x95a [ 326.543973][ T9267] irq_exit+0x180/0x1d0 [ 326.543985][ T9267] smp_apic_timer_interrupt+0x14a/0x570 [ 326.543997][ T9267] apic_timer_interrupt+0xf/0x20 [ 326.544009][ T9267] write_comp_data+0x0/0x70 [ 326.544026][ T9267] batadv_nc_worker+0x4d9/0x760 [ 326.544041][ T9267] process_one_work+0x98e/0x1790 [ 326.544052][ T9267] worker_thread+0x98/0xe40 [ 326.544063][ T9267] kthread+0x357/0x430 [ 326.544074][ T9267] ret_from_fork+0x3a/0x50 [ 326.544088][ T9267] INITIAL USE at: [ 326.544102][ T9267] lock_acquire+0x16f/0x3f0 [ 326.544112][ T9267] _raw_spin_lock_irq+0x60/0x80 [ 326.544125][ T9267] free_ioctx_users+0x2d/0x4a0 [ 326.544138][ T9267] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 326.544149][ T9267] rcu_core+0x928/0x1390 [ 326.544162][ T9267] __do_softirq+0x266/0x95a [ 326.544181][ T9267] irq_exit+0x180/0x1d0 [ 326.557763][ T9265] kobject: 'loop0' (00000000161ddf54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 326.559344][ T9267] smp_apic_timer_interrupt+0x14a/0x570 [ 326.559356][ T9267] apic_timer_interrupt+0xf/0x20 [ 326.559370][ T9267] write_comp_data+0x0/0x70 [ 326.559385][ T9267] batadv_nc_worker+0x4d9/0x760 [ 326.559440][ T9267] process_one_work+0x98e/0x1790 [ 326.570825][ T9265] kobject: 'queue' (000000003dd90f8e): kobject_add_internal: parent: 'loop0', set: '' [ 326.574576][ T9267] worker_thread+0x98/0xe40 [ 326.574588][ T9267] kthread+0x357/0x430 [ 326.574600][ T9267] ret_from_fork+0x3a/0x50 [ 326.574605][ T9267] } [ 326.574684][ T9267] ... key at: [] __key.52644+0x0/0x40 [ 326.574689][ T9267] ... acquired at: [ 326.574712][ T9267] lock_acquire+0x16f/0x3f0 [ 326.574731][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.574752][ T9267] io_submit_one+0xe35/0x1cf0 [ 326.589654][ T9265] kobject: 'mq' (00000000ba186ce0): kobject_add_internal: parent: 'loop0', set: '' [ 326.591739][ T9267] __x64_sys_io_submit+0x1bd/0x580 [ 326.591753][ T9267] do_syscall_64+0x103/0x610 [ 326.591767][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.591770][ T9267] [ 326.591773][ T9267] -> (&ctx->fd_wqh){....} { [ 326.591786][ T9267] INITIAL USE at: [ 326.591800][ T9267] lock_acquire+0x16f/0x3f0 [ 326.591811][ T9267] _raw_spin_lock_irqsave+0x95/0xcd [ 326.591822][ T9267] add_wait_queue+0x4c/0x170 [ 326.591836][ T9267] aio_poll_queue_proc+0x9e/0x110 [ 326.591848][ T9267] userfaultfd_poll+0x93/0x220 [ 326.591861][ T9267] io_submit_one+0xd94/0x1cf0 [ 326.591878][ T9267] __x64_sys_io_submit+0x1bd/0x580 [ 326.591891][ T9267] do_syscall_64+0x103/0x610 [ 326.591908][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.591911][ T9267] } [ 326.591926][ T9267] ... key at: [] __key.45453+0x0/0x40 [ 326.591929][ T9267] ... acquired at: [ 326.591941][ T9267] __lock_acquire+0x239c/0x3fb0 [ 326.591952][ T9267] lock_acquire+0x16f/0x3f0 [ 326.591980][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.591993][ T9267] userfaultfd_read+0x540/0x1940 [ 326.592009][ T9267] __vfs_read+0x8d/0x110 [ 326.592021][ T9267] vfs_read+0x194/0x3e0 [ 326.592033][ T9267] ksys_read+0xea/0x1f0 [ 326.592045][ T9267] __x64_sys_read+0x73/0xb0 [ 326.592061][ T9267] do_syscall_64+0x103/0x610 [ 326.592073][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.592075][ T9267] [ 326.592079][ T9267] [ 326.592079][ T9267] the dependencies between the lock to be acquired [ 326.592083][ T9267] and SOFTIRQ-irq-unsafe lock: [ 326.592091][ T9267] -> (&ctx->fault_pending_wqh){+.+.} { [ 326.592103][ T9267] HARDIRQ-ON-W at: [ 326.592120][ T9267] lock_acquire+0x16f/0x3f0 [ 326.592133][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.592146][ T9267] userfaultfd_release+0x48e/0x6d0 [ 326.592158][ T9267] __fput+0x2e5/0x8d0 [ 326.592168][ T9267] ____fput+0x16/0x20 [ 326.592179][ T9267] task_work_run+0x14a/0x1c0 [ 326.592195][ T9267] exit_to_usermode_loop+0x273/0x2c0 [ 326.592208][ T9267] do_syscall_64+0x52d/0x610 [ 326.592221][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.592225][ T9267] SOFTIRQ-ON-W at: [ 326.592238][ T9267] lock_acquire+0x16f/0x3f0 [ 326.592248][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.592260][ T9267] userfaultfd_release+0x48e/0x6d0 [ 326.592277][ T9267] __fput+0x2e5/0x8d0 [ 326.592287][ T9267] ____fput+0x16/0x20 [ 326.592297][ T9267] task_work_run+0x14a/0x1c0 [ 326.592311][ T9267] exit_to_usermode_loop+0x273/0x2c0 [ 326.592326][ T9267] do_syscall_64+0x52d/0x610 [ 326.592339][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.592343][ T9267] INITIAL USE at: [ 326.592357][ T9267] lock_acquire+0x16f/0x3f0 [ 326.592367][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.592382][ T9267] userfaultfd_release+0x48e/0x6d0 [ 326.592405][ T9267] __fput+0x2e5/0x8d0 [ 326.592414][ T9267] ____fput+0x16/0x20 [ 326.592423][ T9267] task_work_run+0x14a/0x1c0 [ 326.592433][ T9267] exit_to_usermode_loop+0x273/0x2c0 [ 326.592449][ T9267] do_syscall_64+0x52d/0x610 [ 326.592461][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.592464][ T9267] } [ 326.592517][ T9267] ... key at: [] __key.45450+0x0/0x40 [ 326.592523][ T9267] ... acquired at: [ 326.592540][ T9267] __lock_acquire+0x239c/0x3fb0 [ 326.592551][ T9267] lock_acquire+0x16f/0x3f0 [ 326.592561][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.592578][ T9267] userfaultfd_read+0x540/0x1940 [ 326.592592][ T9267] __vfs_read+0x8d/0x110 [ 326.592604][ T9267] vfs_read+0x194/0x3e0 [ 326.592615][ T9267] ksys_read+0xea/0x1f0 [ 326.592627][ T9267] __x64_sys_read+0x73/0xb0 [ 326.592640][ T9267] do_syscall_64+0x103/0x610 [ 326.592651][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.592654][ T9267] [ 326.592657][ T9267] [ 326.592657][ T9267] stack backtrace: [ 326.592671][ T9267] CPU: 0 PID: 9267 Comm: syz-executor.5 Not tainted 5.1.0-rc2+ #38 [ 326.592679][ T9267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.592727][ T9267] Call Trace: [ 326.592795][ T9267] dump_stack+0x172/0x1f0 [ 326.592811][ T9267] check_usage.cold+0x60f/0x940 [ 326.592832][ T9267] ? check_usage_forwards+0x360/0x360 [ 326.592848][ T9267] ? finish_task_switch+0x146/0x780 [ 326.592860][ T9267] ? find_held_lock+0x35/0x130 [ 326.592876][ T9267] ? _raw_spin_unlock_irq+0x28/0x90 [ 326.592909][ T9267] ? trace_hardirqs_on+0x67/0x230 [ 326.592925][ T9267] ? kasan_check_read+0x11/0x20 [ 326.592944][ T9267] check_prev_add.constprop.0+0x2e3/0x23c0 [ 326.592958][ T9267] ? check_prev_add.constprop.0+0x2e3/0x23c0 [ 326.592972][ T9267] ? check_usage+0x570/0x570 [ 326.592989][ T9267] ? kasan_check_write+0x14/0x20 [ 326.593001][ T9267] ? is_dynamic_key+0x1c0/0x1c0 [ 326.593013][ T9267] ? __lockdep_reset_lock+0x450/0x450 [ 326.593032][ T9267] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 326.593047][ T9267] ? find_first_zero_bit+0x9a/0xc0 [ 326.593060][ T9267] __lock_acquire+0x239c/0x3fb0 [ 326.593074][ T9267] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 326.593091][ T9267] ? mark_held_locks+0xf0/0xf0 [ 326.593111][ T9267] lock_acquire+0x16f/0x3f0 [ 326.593134][ T9267] ? userfaultfd_read+0x540/0x1940 [ 326.593149][ T9267] _raw_spin_lock+0x2f/0x40 [ 326.593165][ T9267] ? userfaultfd_read+0x540/0x1940 [ 326.593179][ T9267] userfaultfd_read+0x540/0x1940 [ 326.593200][ T9267] ? userfaultfd_event_wait_completion+0xa50/0xa50 [ 326.593215][ T9267] ? fsnotify+0xbc0/0xbc0 [ 326.593230][ T9267] ? fsnotify_first_mark+0x210/0x210 [ 326.593245][ T9267] ? __fget+0x381/0x550 [ 326.593260][ T9267] ? wake_up_q+0xf0/0xf0 [ 326.593344][ T9267] ? security_file_permission+0x94/0x380 [ 326.593364][ T9267] __vfs_read+0x8d/0x110 [ 326.593379][ T9267] ? userfaultfd_event_wait_completion+0xa50/0xa50 [ 326.593402][ T9267] vfs_read+0x194/0x3e0 [ 326.593418][ T9267] ksys_read+0xea/0x1f0 [ 326.593432][ T9267] ? kernel_write+0x120/0x120 [ 326.593446][ T9267] ? do_syscall_64+0x26/0x610 [ 326.593458][ T9267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.593470][ T9267] ? do_syscall_64+0x26/0x610 [ 326.593492][ T9267] __x64_sys_read+0x73/0xb0 [ 326.593512][ T9267] do_syscall_64+0x103/0x610 [ 326.593526][ T9267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.593543][ T9267] RIP: 0033:0x458209 [ 326.593558][ T9267] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.593565][ T9267] RSP: 002b:00007f6fbdcbac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 326.593620][ T9267] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 326.593628][ T9267] RDX: 000000000000007a RSI: 0000000020000080 RDI: 0000000000000004 [ 326.593635][ T9267] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 326.593643][ T9267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6fbdcbb6d4 [ 326.593657][ T9267] R13: 00000000004c3cbe R14: 00000000004d87e8 R15: 00000000ffffffff [ 327.863480][ T9265] kobject: 'mq' (00000000ba186ce0): kobject_uevent_env [ 327.870667][ T9265] kobject: 'mq' (00000000ba186ce0): kobject_uevent_env: filter function caused the event to drop! [ 327.885062][ T9265] kobject: '0' (0000000076ad4a2d): kobject_add_internal: parent: 'mq', set: '' [ 327.895204][ T9265] kobject: 'cpu0' (00000000bd8262ea): kobject_add_internal: parent: '0', set: '' 12:27:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 327.905363][ T9265] kobject: 'cpu1' (000000004bd7bd46): kobject_add_internal: parent: '0', set: '' [ 327.935550][ T9265] kobject: 'queue' (000000003dd90f8e): kobject_uevent_env [ 327.943053][ T9265] kobject: 'queue' (000000003dd90f8e): kobject_uevent_env: filter function caused the event to drop! [ 327.955745][ T9265] kobject: 'iosched' (00000000b1149e33): kobject_add_internal: parent: 'queue', set: '' [ 327.966502][ T9265] kobject: 'iosched' (00000000b1149e33): kobject_uevent_env [ 327.974329][ T9265] kobject: 'iosched' (00000000b1149e33): kobject_uevent_env: filter function caused the event to drop! [ 327.985618][ T9265] kobject: 'integrity' (0000000094321417): kobject_add_internal: parent: 'loop0', set: '' [ 327.996708][ T9265] kobject: 'integrity' (0000000094321417): kobject_uevent_env [ 328.004243][ T9265] kobject: 'integrity' (0000000094321417): kobject_uevent_env: filter function caused the event to drop! [ 328.025795][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 328.054594][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 328.070267][ T9279] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 328.090961][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env 12:27:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000140)='user\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 328.116967][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 328.148194][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env 12:27:43 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 12:27:43 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 328.188120][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 328.222604][ T9296] autofs4:pid:9296:autofs_fill_super: called with bogus options [ 328.236816][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 328.246602][ T9300] autofs4:pid:9300:autofs_fill_super: called with bogus options [ 328.263715][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' 12:27:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000140)='user\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 328.287182][ T9303] kobject: 'integrity' (0000000094321417): kobject_uevent_env [ 328.293328][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 328.295384][ T9303] kobject: 'integrity' (0000000094321417): kobject_uevent_env: filter function caused the event to drop! [ 328.315230][ T9303] kobject: 'integrity' (0000000094321417): kobject_cleanup, parent (null) [ 328.320565][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 328.350196][ T9303] kobject: 'integrity' (0000000094321417): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 328.357340][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 328.393848][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 328.402703][ T9303] kobject: 'integrity': free name [ 328.412709][ T9303] kobject: '7:0' (00000000cf8d502d): kobject_uevent_env [ 328.420097][ T9303] kobject: '7:0' (00000000cf8d502d): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 328.433889][ T9303] kobject: '7:0' (00000000cf8d502d): kobject_cleanup, parent (null) [ 328.443131][ T9303] kobject: '7:0' (00000000cf8d502d): calling ktype release [ 328.450601][ T9303] kobject: '7:0': free name [ 328.456105][ T9303] kobject: 'mq' (00000000ba186ce0): kobject_uevent_env [ 328.463553][ T9303] kobject: 'mq' (00000000ba186ce0): kobject_uevent_env: filter function caused the event to drop! [ 328.483713][ T9303] kobject: 'queue' (000000003dd90f8e): kobject_uevent_env [ 328.490867][ T9303] kobject: 'queue' (000000003dd90f8e): kobject_uevent_env: filter function caused the event to drop! [ 328.502866][ T9303] kobject: 'iosched' (00000000b1149e33): kobject_uevent_env [ 328.519302][ T9303] kobject: 'iosched' (00000000b1149e33): kobject_uevent_env: attempted to send uevent without kset! [ 328.530698][ T9303] kobject: 'holders' (00000000a0cec307): kobject_cleanup, parent 00000000161ddf54 [ 328.540027][ T9303] kobject: 'holders' (00000000a0cec307): auto cleanup kobject_del [ 328.548630][ T9303] kobject: 'holders' (00000000a0cec307): calling ktype release [ 328.556309][ T9303] kobject: (00000000a0cec307): dynamic_kobj_release [ 328.563168][ T9303] kobject: 'holders': free name [ 328.568052][ T9303] kobject: 'slaves' (0000000014a4ec6e): kobject_cleanup, parent 00000000161ddf54 [ 328.577288][ T9303] kobject: 'slaves' (0000000014a4ec6e): auto cleanup kobject_del [ 328.585178][ T9303] kobject: 'slaves' (0000000014a4ec6e): calling ktype release [ 328.592758][ T9303] kobject: (0000000014a4ec6e): dynamic_kobj_release [ 328.599469][ T9303] kobject: 'slaves': free name [ 328.605426][ T9303] kobject: 'loop0' (00000000161ddf54): kobject_uevent_env [ 328.612861][ T9303] kobject: 'loop0' (00000000161ddf54): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 328.713559][ T9303] kobject: 'iosched' (00000000b1149e33): kobject_cleanup, parent (null) [ 328.722947][ T9303] kobject: 'iosched' (00000000b1149e33): calling ktype release [ 328.730559][ T9303] kobject: 'iosched': free name [ 328.738113][ T9303] kobject: 'loop0' (00000000161ddf54): kobject_cleanup, parent (null) [ 328.748818][ T9303] kobject: 'loop0' (00000000161ddf54): calling ktype release [ 328.756520][ T9303] kobject: 'queue' (000000003dd90f8e): kobject_cleanup, parent (null) [ 328.765672][ T9303] kobject: 'queue' (000000003dd90f8e): calling ktype release [ 328.773205][ T12] kobject: '0' (0000000076ad4a2d): kobject_cleanup, parent (null) [ 328.774008][ T9303] kobject: 'queue': free name [ 328.781938][ T12] kobject: '0' (0000000076ad4a2d): calling ktype release [ 328.781957][ T12] kobject: '0': free name [ 328.781976][ T12] kobject: 'cpu0' (00000000bd8262ea): kobject_cleanup, parent (null) [ 328.781982][ T12] kobject: 'cpu0' (00000000bd8262ea): calling ktype release [ 328.781987][ T12] kobject: 'cpu0': free name [ 328.782001][ T12] kobject: 'cpu1' (000000004bd7bd46): kobject_cleanup, parent (null) [ 328.782007][ T12] kobject: 'cpu1' (000000004bd7bd46): calling ktype release [ 328.782012][ T12] kobject: 'cpu1': free name [ 328.782024][ T12] kobject: 'mq' (00000000ba186ce0): kobject_cleanup, parent (null) [ 328.782037][ T12] kobject: 'mq' (00000000ba186ce0): calling ktype release [ 328.782051][ T12] kobject: 'mq': free name [ 328.860751][ T9303] kobject: 'loop0': free name [ 328.873265][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 328.880423][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' 12:27:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 328.915300][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 328.926469][ T9316] autofs4:pid:9316:autofs_fill_super: called with bogus options [ 328.929271][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' 12:27:44 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 12:27:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:44 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000140)='user\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 329.027673][ T7869] kobject: '7:0' (00000000d514efdd): kobject_add_internal: parent: 'bdi', set: 'devices' [ 329.038481][ T7869] kobject: '7:0' (00000000d514efdd): kobject_uevent_env [ 329.045794][ T7869] kobject: '7:0' (00000000d514efdd): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 329.057669][ T7869] kobject: 'loop0' (0000000009b257bb): kobject_add_internal: parent: 'block', set: 'devices' [ 329.068299][ T7869] kobject: 'loop0' (0000000009b257bb): kobject_uevent_env [ 329.076953][ T7869] kobject: 'loop0' (0000000009b257bb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 329.088220][ T7869] kobject: 'holders' (00000000281d8398): kobject_add_internal: parent: 'loop0', set: '' [ 329.098574][ T7869] kobject: 'slaves' (000000007d020d38): kobject_add_internal: parent: 'loop0', set: '' [ 329.108819][ T7869] kobject: 'loop0' (0000000009b257bb): kobject_uevent_env [ 329.116372][ T7869] kobject: 'loop0' (0000000009b257bb): fill_kobj_path: path = '/devices/virtual/block/loop0' 12:27:44 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 12:27:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 329.129785][ T7869] kobject: 'queue' (00000000e137512a): kobject_add_internal: parent: 'loop0', set: '' [ 329.141002][ T7869] kobject: 'mq' (00000000b9295551): kobject_add_internal: parent: 'loop0', set: '' [ 329.161384][ T7869] kobject: 'mq' (00000000b9295551): kobject_uevent_env [ 329.168283][ T7869] kobject: 'mq' (00000000b9295551): kobject_uevent_env: filter function caused the event to drop! 12:27:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 329.179357][ T7869] kobject: '0' (0000000030ebd237): kobject_add_internal: parent: 'mq', set: '' [ 329.189221][ T7869] kobject: 'cpu0' (00000000bd8262ea): kobject_add_internal: parent: '0', set: '' [ 329.199997][ T7869] kobject: 'cpu1' (000000004bd7bd46): kobject_add_internal: parent: '0', set: '' [ 329.214664][ T7869] kobject: 'queue' (00000000e137512a): kobject_uevent_env [ 329.221926][ T7869] kobject: 'queue' (00000000e137512a): kobject_uevent_env: filter function caused the event to drop! [ 329.233200][ T7869] kobject: 'iosched' (00000000b7ab2657): kobject_add_internal: parent: 'queue', set: '' [ 329.243551][ T7869] kobject: 'iosched' (00000000b7ab2657): kobject_uevent_env [ 329.250837][ T7869] kobject: 'iosched' (00000000b7ab2657): kobject_uevent_env: filter function caused the event to drop! [ 329.261943][ T7869] kobject: 'integrity' (00000000f71ee31d): kobject_add_internal: parent: 'loop0', set: '' [ 329.272506][ T7869] kobject: 'integrity' (00000000f71ee31d): kobject_uevent_env [ 329.279960][ T7869] kobject: 'integrity' (00000000f71ee31d): kobject_uevent_env: filter function caused the event to drop! [ 329.294507][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 329.328651][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 329.334189][ T9332] autofs4:pid:9332:autofs_fill_super: called with bogus options [ 329.345241][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 329.364289][ T9335] kobject: 'integrity' (00000000f71ee31d): kobject_uevent_env 12:27:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) mount(&(0x7f0000000000)=@sg0='/dev/sg0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, &(0x7f0000000140)='user\x00') umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 329.373333][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 329.384145][ T9335] kobject: 'integrity' (00000000f71ee31d): kobject_uevent_env: filter function caused the event to drop! [ 329.396814][ T9335] kobject: 'integrity' (00000000f71ee31d): kobject_cleanup, parent (null) [ 329.398903][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 329.413708][ T9335] kobject: 'integrity' (00000000f71ee31d): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 329.431065][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 329.444885][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 329.452128][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 329.456712][ T9335] kobject: 'integrity': free name 12:27:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) [ 329.475665][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 329.478306][ T9335] kobject: '7:0' (00000000d514efdd): kobject_uevent_env [ 329.485462][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 329.499634][ T9335] kobject: '7:0' (00000000d514efdd): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 329.506777][ T3878] kobject: 'loop0' (0000000009b257bb): kobject_uevent_env [ 329.517933][ T3878] kobject: 'loop0' (0000000009b257bb): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 329.540928][ T9335] kobject: '7:0' (00000000d514efdd): kobject_cleanup, parent (null) [ 329.556354][ T9335] kobject: '7:0' (00000000d514efdd): calling ktype release [ 329.566597][ T9335] kobject: '7:0': free name [ 329.577563][ T9335] kobject: 'mq' (00000000b9295551): kobject_uevent_env [ 329.586061][ T9335] kobject: 'mq' (00000000b9295551): kobject_uevent_env: filter function caused the event to drop! [ 329.602675][ T9335] kobject: 'queue' (00000000e137512a): kobject_uevent_env [ 329.610066][ T9335] kobject: 'queue' (00000000e137512a): kobject_uevent_env: filter function caused the event to drop! [ 329.623720][ T9335] kobject: 'iosched' (00000000b7ab2657): kobject_uevent_env [ 329.631657][ T9335] kobject: 'iosched' (00000000b7ab2657): kobject_uevent_env: attempted to send uevent without kset! [ 329.643216][ T9335] kobject: 'holders' (00000000281d8398): kobject_cleanup, parent 0000000009b257bb [ 329.652683][ T9335] kobject: 'holders' (00000000281d8398): auto cleanup kobject_del [ 329.660637][ T9335] kobject: 'holders' (00000000281d8398): calling ktype release [ 329.668319][ T9335] kobject: (00000000281d8398): dynamic_kobj_release [ 329.675289][ T9335] kobject: 'holders': free name [ 329.680227][ T9335] kobject: 'slaves' (000000007d020d38): kobject_cleanup, parent 0000000009b257bb [ 329.689533][ T9335] kobject: 'slaves' (000000007d020d38): auto cleanup kobject_del [ 329.697457][ T9335] kobject: 'slaves' (000000007d020d38): calling ktype release [ 329.705070][ T9335] kobject: (000000007d020d38): dynamic_kobj_release [ 329.711838][ T9335] kobject: 'slaves': free name [ 329.717406][ T9335] kobject: 'loop0' (0000000009b257bb): kobject_uevent_env [ 329.724980][ T9335] kobject: 'loop0' (0000000009b257bb): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 329.812648][ T9335] kobject: 'iosched' (00000000b7ab2657): kobject_cleanup, parent (null) [ 329.823095][ T9335] kobject: 'iosched' (00000000b7ab2657): calling ktype release [ 329.830784][ T9335] kobject: 'iosched': free name [ 329.838766][ T9335] kobject: 'loop0' (0000000009b257bb): kobject_cleanup, parent (null) [ 329.847866][ T9335] kobject: 'loop0' (0000000009b257bb): calling ktype release [ 329.855558][ T9335] kobject: 'queue' (00000000e137512a): kobject_cleanup, parent (null) [ 329.864705][ T9335] kobject: 'queue' (00000000e137512a): calling ktype release [ 329.875032][ T3262] kobject: '0' (0000000030ebd237): kobject_cleanup, parent (null) [ 329.878738][ T9335] kobject: 'queue': free name [ 329.884080][ T3262] kobject: '0' (0000000030ebd237): calling ktype release [ 329.889375][ T9335] kobject: 'loop0': free name [ 329.896053][ T3262] kobject: '0': free name [ 329.928331][ T3262] kobject: 'cpu0' (00000000bd8262ea): kobject_cleanup, parent (null) [ 329.939199][ T3262] kobject: 'cpu0' (00000000bd8262ea): calling ktype release [ 329.948674][ T9359] autofs4:pid:9359:autofs_fill_super: called with bogus options [ 329.957237][ T3262] kobject: 'cpu0': free name [ 329.963029][ T3262] kobject: 'cpu1' (000000004bd7bd46): kobject_cleanup, parent (null) 12:27:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 329.975245][ T3262] kobject: 'cpu1' (000000004bd7bd46): calling ktype release [ 329.982878][ T3262] kobject: 'cpu1': free name [ 329.987898][ T3262] kobject: 'mq' (00000000b9295551): kobject_cleanup, parent (null) [ 329.997059][ T3262] kobject: 'mq' (00000000b9295551): calling ktype release [ 330.004520][ T3262] kobject: 'mq': free name [ 330.023173][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 330.030328][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 330.059310][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 330.066738][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 330.094991][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 330.102271][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 330.143181][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 330.161597][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 330.181835][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env 12:27:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:45 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:45 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 12:27:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 330.201257][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 330.227292][ T7869] kobject: '7:0' (0000000043cdb213): kobject_add_internal: parent: 'bdi', set: 'devices' 12:27:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 330.249866][ T7869] kobject: '7:0' (0000000043cdb213): kobject_uevent_env [ 330.257587][ T7869] kobject: '7:0' (0000000043cdb213): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 330.270721][ T7869] kobject: 'loop0' (000000005d1cb3b4): kobject_add_internal: parent: 'block', set: 'devices' [ 330.281580][ T7869] kobject: 'loop0' (000000005d1cb3b4): kobject_uevent_env [ 330.288730][ T7869] kobject: 'loop0' (000000005d1cb3b4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 330.300251][ T7869] kobject: 'holders' (000000003b76ccc9): kobject_add_internal: parent: 'loop0', set: '' [ 330.310993][ T7869] kobject: 'slaves' (00000000d2af287b): kobject_add_internal: parent: 'loop0', set: '' [ 330.321547][ T7869] kobject: 'loop0' (000000005d1cb3b4): kobject_uevent_env [ 330.328749][ T7869] kobject: 'loop0' (000000005d1cb3b4): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 330.339154][ T7869] kobject: 'queue' (00000000aefe1121): kobject_add_internal: parent: 'loop0', set: '' [ 330.349965][ T7869] kobject: 'mq' (0000000086f81d38): kobject_add_internal: parent: 'loop0', set: '' [ 330.360598][ T7869] kobject: 'mq' (0000000086f81d38): kobject_uevent_env [ 330.367553][ T7869] kobject: 'mq' (0000000086f81d38): kobject_uevent_env: filter function caused the event to drop! [ 330.378192][ T7869] kobject: '0' (00000000baa7e9d0): kobject_add_internal: parent: 'mq', set: '' [ 330.387791][ T7869] kobject: 'cpu0' (00000000bd8262ea): kobject_add_internal: parent: '0', set: '' [ 330.398298][ T7869] kobject: 'cpu1' (000000004bd7bd46): kobject_add_internal: parent: '0', set: '' [ 330.410379][ T7869] kobject: 'queue' (00000000aefe1121): kobject_uevent_env [ 330.418386][ T7869] kobject: 'queue' (00000000aefe1121): kobject_uevent_env: filter function caused the event to drop! [ 330.429884][ T7869] kobject: 'iosched' (00000000d814bbd3): kobject_add_internal: parent: 'queue', set: '' [ 330.441495][ T7869] kobject: 'iosched' (00000000d814bbd3): kobject_uevent_env [ 330.448853][ T7869] kobject: 'iosched' (00000000d814bbd3): kobject_uevent_env: filter function caused the event to drop! [ 330.460206][ T7869] kobject: 'integrity' (0000000005e0174f): kobject_add_internal: parent: 'loop0', set: '' [ 330.470881][ T7869] kobject: 'integrity' (0000000005e0174f): kobject_uevent_env [ 330.478392][ T7869] kobject: 'integrity' (0000000005e0174f): kobject_uevent_env: filter function caused the event to drop! [ 330.490121][ T9374] kobject: 'integrity' (0000000005e0174f): kobject_uevent_env [ 330.499365][ T9374] kobject: 'integrity' (0000000005e0174f): kobject_uevent_env: filter function caused the event to drop! [ 330.514094][ T9374] kobject: 'integrity' (0000000005e0174f): kobject_cleanup, parent (null) [ 330.524097][ T9374] kobject: 'integrity' (0000000005e0174f): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 330.541195][ T9374] kobject: 'integrity': free name [ 330.549164][ T9374] kobject: '7:0' (0000000043cdb213): kobject_uevent_env [ 330.556758][ T9374] kobject: '7:0' (0000000043cdb213): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 330.567315][ T9374] kobject: '7:0' (0000000043cdb213): kobject_cleanup, parent (null) [ 330.577883][ T9374] kobject: '7:0' (0000000043cdb213): calling ktype release [ 330.585577][ T9374] kobject: '7:0': free name [ 330.590709][ T9374] kobject: 'mq' (0000000086f81d38): kobject_uevent_env [ 330.598353][ T9374] kobject: 'mq' (0000000086f81d38): kobject_uevent_env: filter function caused the event to drop! [ 330.620631][ T9374] kobject: 'queue' (00000000aefe1121): kobject_uevent_env [ 330.630452][ T9374] kobject: 'queue' (00000000aefe1121): kobject_uevent_env: filter function caused the event to drop! [ 330.644131][ T9374] kobject: 'iosched' (00000000d814bbd3): kobject_uevent_env [ 330.651928][ T9374] kobject: 'iosched' (00000000d814bbd3): kobject_uevent_env: attempted to send uevent without kset! [ 330.664165][ T9374] kobject: 'holders' (000000003b76ccc9): kobject_cleanup, parent 000000005d1cb3b4 [ 330.673761][ T9374] kobject: 'holders' (000000003b76ccc9): auto cleanup kobject_del [ 330.682408][ T9374] kobject: 'holders' (000000003b76ccc9): calling ktype release [ 330.690006][ T9374] kobject: (000000003b76ccc9): dynamic_kobj_release [ 330.696804][ T9374] kobject: 'holders': free name [ 330.702211][ T9374] kobject: 'slaves' (00000000d2af287b): kobject_cleanup, parent 000000005d1cb3b4 [ 330.711447][ T9374] kobject: 'slaves' (00000000d2af287b): auto cleanup kobject_del [ 330.719348][ T9374] kobject: 'slaves' (00000000d2af287b): calling ktype release [ 330.727048][ T9374] kobject: (00000000d2af287b): dynamic_kobj_release [ 330.733794][ T9374] kobject: 'slaves': free name [ 330.743121][ T9374] kobject: 'loop0' (000000005d1cb3b4): kobject_uevent_env 12:27:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) [ 330.750738][ T9374] kobject: 'loop0' (000000005d1cb3b4): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 330.863883][ T9374] kobject: 'iosched' (00000000d814bbd3): kobject_cleanup, parent (null) [ 330.873472][ T9374] kobject: 'iosched' (00000000d814bbd3): calling ktype release [ 330.881320][ T9374] kobject: 'iosched': free name [ 330.895733][ T7869] kobject: 'loop0' (000000005d1cb3b4): kobject_cleanup, parent (null) [ 330.905395][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 330.921861][ T7869] kobject: 'loop0' (000000005d1cb3b4): calling ktype release [ 330.925357][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 330.929312][ T7869] kobject: 'queue' (00000000aefe1121): kobject_cleanup, parent (null) [ 330.929326][ T7869] kobject: 'queue' (00000000aefe1121): calling ktype release [ 330.941166][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env 12:27:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 330.965139][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 331.005242][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 331.014712][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' 12:27:46 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 331.046234][ T7869] kobject: 'queue': free name [ 331.051014][ T12] kobject: '0' (00000000baa7e9d0): kobject_cleanup, parent (null) [ 331.072204][ T12] kobject: '0' (00000000baa7e9d0): calling ktype release [ 331.079441][ T7869] kobject: 'loop0': free name [ 331.085432][ T12] kobject: '0': free name 12:27:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 331.092560][ T12] kobject: 'cpu0' (00000000bd8262ea): kobject_cleanup, parent (null) [ 331.098441][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 331.109091][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 331.118228][ T12] kobject: 'cpu0' (00000000bd8262ea): calling ktype release [ 331.138318][ T12] kobject: 'cpu0': free name 12:27:46 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:46 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) [ 331.143441][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 331.163231][ T12] kobject: 'cpu1' (000000004bd7bd46): kobject_cleanup, parent (null) [ 331.180026][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 331.203939][ T12] kobject: 'cpu1' (000000004bd7bd46): calling ktype release [ 331.221598][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 331.232198][ T12] kobject: 'cpu1': free name [ 331.235446][ T9400] kobject: '7:0' (00000000c418c91f): kobject_add_internal: parent: 'bdi', set: 'devices' [ 331.241382][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 331.257266][ T12] kobject: 'mq' (0000000086f81d38): kobject_cleanup, parent (null) [ 331.264608][ T9400] kobject: '7:0' (00000000c418c91f): kobject_uevent_env [ 331.279694][ T9400] kobject: '7:0' (00000000c418c91f): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 331.280564][ T12] kobject: 'mq' (0000000086f81d38): calling ktype release [ 331.292472][ T9400] kobject: 'loop0' (00000000cdb23d5d): kobject_add_internal: parent: 'block', set: 'devices' [ 331.318547][ T9400] kobject: 'loop0' (00000000cdb23d5d): kobject_uevent_env [ 331.324254][ T12] kobject: 'mq': free name [ 331.329077][ T9400] kobject: 'loop0' (00000000cdb23d5d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 331.345838][ T9400] kobject: 'holders' (00000000a9e1d84b): kobject_add_internal: parent: 'loop0', set: '' [ 331.357455][ T9400] kobject: 'slaves' (000000003f400193): kobject_add_internal: parent: 'loop0', set: '' [ 331.371083][ T9400] kobject: 'loop0' (00000000cdb23d5d): kobject_uevent_env [ 331.378691][ T9400] kobject: 'loop0' (00000000cdb23d5d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 331.395296][ T9400] kobject: 'queue' (000000003c7e5fb0): kobject_add_internal: parent: 'loop0', set: '' [ 331.410039][ T9400] kobject: 'mq' (00000000c8c517a2): kobject_add_internal: parent: 'loop0', set: '' [ 331.420169][ T9400] kobject: 'mq' (00000000c8c517a2): kobject_uevent_env [ 331.427512][ T9400] kobject: 'mq' (00000000c8c517a2): kobject_uevent_env: filter function caused the event to drop! [ 331.438851][ T9400] kobject: '0' (00000000ce30b876): kobject_add_internal: parent: 'mq', set: '' [ 331.449275][ T9400] kobject: 'cpu0' (00000000654adf4a): kobject_add_internal: parent: '0', set: '' [ 331.459408][ T9400] kobject: 'cpu1' (00000000855424e8): kobject_add_internal: parent: '0', set: '' [ 331.475303][ T9400] kobject: 'queue' (000000003c7e5fb0): kobject_uevent_env [ 331.482650][ T9400] kobject: 'queue' (000000003c7e5fb0): kobject_uevent_env: filter function caused the event to drop! [ 331.495290][ T9400] kobject: 'iosched' (0000000042c68e05): kobject_add_internal: parent: 'queue', set: '' [ 331.506460][ T9400] kobject: 'iosched' (0000000042c68e05): kobject_uevent_env [ 331.513911][ T9400] kobject: 'iosched' (0000000042c68e05): kobject_uevent_env: filter function caused the event to drop! [ 331.525259][ T9400] kobject: 'integrity' (00000000a9a5a58e): kobject_add_internal: parent: 'loop0', set: '' [ 331.536632][ T9400] kobject: 'integrity' (00000000a9a5a58e): kobject_uevent_env [ 331.544340][ T9400] kobject: 'integrity' (00000000a9a5a58e): kobject_uevent_env: filter function caused the event to drop! [ 331.559799][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 331.570755][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 331.635974][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 331.643736][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 331.710797][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 331.718209][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 331.914802][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 331.922097][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' 12:27:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:47 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:47 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) 12:27:47 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 331.961917][ T3878] kobject: 'loop0' (00000000cdb23d5d): kobject_uevent_env [ 331.978769][ T3878] kobject: 'loop0' (00000000cdb23d5d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 331.999866][ T9415] kobject: 'integrity' (00000000a9a5a58e): kobject_uevent_env 12:27:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:47 executing program 4: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 332.008749][ T9415] kobject: 'integrity' (00000000a9a5a58e): kobject_uevent_env: filter function caused the event to drop! [ 332.030016][ T9415] kobject: 'integrity' (00000000a9a5a58e): kobject_cleanup, parent (null) [ 332.047865][ T9415] kobject: 'integrity' (00000000a9a5a58e): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. 12:27:47 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) close(r0) [ 332.065849][ T9415] kobject: 'integrity': free name [ 332.074011][ T9415] kobject: '7:0' (00000000c418c91f): kobject_uevent_env [ 332.082126][ T9415] kobject: '7:0' (00000000c418c91f): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 332.093629][ T9415] kobject: '7:0' (00000000c418c91f): kobject_cleanup, parent (null) [ 332.106753][ T9415] kobject: '7:0' (00000000c418c91f): calling ktype release [ 332.115221][ T9415] kobject: '7:0': free name [ 332.120310][ T9415] kobject: 'mq' (00000000c8c517a2): kobject_uevent_env [ 332.127919][ T9415] kobject: 'mq' (00000000c8c517a2): kobject_uevent_env: filter function caused the event to drop! [ 332.139920][ T9415] kobject: 'queue' (000000003c7e5fb0): kobject_uevent_env [ 332.147707][ T9415] kobject: 'queue' (000000003c7e5fb0): kobject_uevent_env: filter function caused the event to drop! [ 332.161944][ T9415] kobject: 'iosched' (0000000042c68e05): kobject_uevent_env [ 332.169536][ T9415] kobject: 'iosched' (0000000042c68e05): kobject_uevent_env: attempted to send uevent without kset! [ 332.181010][ T9415] kobject: 'holders' (00000000a9e1d84b): kobject_cleanup, parent 00000000cdb23d5d [ 332.190689][ T9415] kobject: 'holders' (00000000a9e1d84b): auto cleanup kobject_del [ 332.198824][ T9415] kobject: 'holders' (00000000a9e1d84b): calling ktype release [ 332.206660][ T9415] kobject: (00000000a9e1d84b): dynamic_kobj_release [ 332.213670][ T9415] kobject: 'holders': free name [ 332.218593][ T9415] kobject: 'slaves' (000000003f400193): kobject_cleanup, parent 00000000cdb23d5d [ 332.228280][ T9415] kobject: 'slaves' (000000003f400193): auto cleanup kobject_del [ 332.236172][ T9415] kobject: 'slaves' (000000003f400193): calling ktype release [ 332.243807][ T9415] kobject: (000000003f400193): dynamic_kobj_release [ 332.250464][ T9415] kobject: 'slaves': free name [ 332.256357][ T9415] kobject: 'loop0' (00000000cdb23d5d): kobject_uevent_env [ 332.263829][ T9415] kobject: 'loop0' (00000000cdb23d5d): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 332.353094][ T9415] kobject: 'iosched' (0000000042c68e05): kobject_cleanup, parent (null) [ 332.362652][ T9415] kobject: 'iosched' (0000000042c68e05): calling ktype release [ 332.370268][ T9415] kobject: 'iosched': free name [ 332.378084][ T9422] kobject: 'loop0' (00000000cdb23d5d): kobject_cleanup, parent (null) [ 332.387627][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env 12:27:47 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 332.395115][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 332.423045][ T9422] kobject: 'loop0' (00000000cdb23d5d): calling ktype release 12:27:47 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 332.451934][ T9422] kobject: 'queue' (000000003c7e5fb0): kobject_cleanup, parent (null) [ 332.462028][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 332.483332][ T9422] kobject: 'queue' (000000003c7e5fb0): calling ktype release [ 332.490880][ T9422] kobject: 'queue': free name 12:27:47 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) close(r0) [ 332.495648][ T12] kobject: '0' (00000000ce30b876): kobject_cleanup, parent (null) [ 332.504080][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 332.516841][ T12] kobject: '0' (00000000ce30b876): calling ktype release [ 332.561428][ T9422] kobject: 'loop0': free name [ 332.566084][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 332.567582][ T12] kobject: '0': free name [ 332.592593][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 332.597549][ T12] kobject: 'cpu0' (00000000654adf4a): kobject_cleanup, parent (null) [ 332.614791][ T12] kobject: 'cpu0' (00000000654adf4a): calling ktype release [ 332.622743][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 332.630008][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 332.640426][ T12] kobject: 'cpu0': free name [ 332.646564][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 332.647804][ T12] kobject: 'cpu1' (00000000855424e8): kobject_cleanup, parent (null) [ 332.656288][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 332.664993][ T12] kobject: 'cpu1' (00000000855424e8): calling ktype release [ 332.679395][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 332.683607][ T12] kobject: 'cpu1': free name [ 332.690482][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 332.695339][ T12] kobject: 'mq' (00000000c8c517a2): kobject_cleanup, parent (null) [ 332.712652][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 332.721878][ T12] kobject: 'mq' (00000000c8c517a2): calling ktype release [ 332.724272][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 332.733314][ T12] kobject: 'mq': free name [ 332.760219][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 332.774564][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' 12:27:47 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:47 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:47 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:47 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) close(r0) 12:27:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = dup(r0) ioctl$TCSBRK(r2, 0x5409, 0x3) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 332.859530][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 332.869215][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' 12:27:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 332.919899][ T7869] kobject: '7:0' (000000004d8f5e09): kobject_add_internal: parent: 'bdi', set: 'devices' [ 332.936006][ T7869] kobject: '7:0' (000000004d8f5e09): kobject_uevent_env [ 332.943769][ T7869] kobject: '7:0' (000000004d8f5e09): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 332.955372][ T7869] kobject: 'loop0' (0000000017461c99): kobject_add_internal: parent: 'block', set: 'devices' [ 332.966077][ T7869] kobject: 'loop0' (0000000017461c99): kobject_uevent_env [ 332.974193][ T7869] kobject: 'loop0' (0000000017461c99): kobject_uevent_env: uevent_suppress caused the event to drop! [ 332.985767][ T7869] kobject: 'holders' (0000000025e73b87): kobject_add_internal: parent: 'loop0', set: '' [ 332.996631][ T7869] kobject: 'slaves' (00000000052567c9): kobject_add_internal: parent: 'loop0', set: '' [ 333.007071][ T7869] kobject: 'loop0' (0000000017461c99): kobject_uevent_env 12:27:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) dup(r0) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 333.014305][ T7869] kobject: 'loop0' (0000000017461c99): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 333.025033][ T7869] kobject: 'queue' (00000000258f1a43): kobject_add_internal: parent: 'loop0', set: '' [ 333.039954][ T7869] kobject: 'mq' (0000000057e98815): kobject_add_internal: parent: 'loop0', set: '' [ 333.050228][ T7869] kobject: 'mq' (0000000057e98815): kobject_uevent_env [ 333.057189][ T7869] kobject: 'mq' (0000000057e98815): kobject_uevent_env: filter function caused the event to drop! 12:27:48 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 12:27:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) dup(r0) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 333.070954][ T7869] kobject: '0' (000000004d343e26): kobject_add_internal: parent: 'mq', set: '' [ 333.081433][ T7869] kobject: 'cpu0' (00000000654adf4a): kobject_add_internal: parent: '0', set: '' [ 333.092246][ T7869] kobject: 'cpu1' (00000000855424e8): kobject_add_internal: parent: '0', set: '' [ 333.103351][ T7869] kobject: 'queue' (00000000258f1a43): kobject_uevent_env [ 333.110516][ T7869] kobject: 'queue' (00000000258f1a43): kobject_uevent_env: filter function caused the event to drop! [ 333.122117][ T7869] kobject: 'iosched' (0000000098fd496d): kobject_add_internal: parent: 'queue', set: '' [ 333.132445][ T7869] kobject: 'iosched' (0000000098fd496d): kobject_uevent_env [ 333.139731][ T7869] kobject: 'iosched' (0000000098fd496d): kobject_uevent_env: filter function caused the event to drop! [ 333.151157][ T7869] kobject: 'integrity' (000000008622525d): kobject_add_internal: parent: 'loop0', set: '' [ 333.161830][ T7869] kobject: 'integrity' (000000008622525d): kobject_uevent_env [ 333.169295][ T7869] kobject: 'integrity' (000000008622525d): kobject_uevent_env: filter function caused the event to drop! [ 333.180725][ T9463] kobject: 'integrity' (000000008622525d): kobject_uevent_env [ 333.188348][ T9463] kobject: 'integrity' (000000008622525d): kobject_uevent_env: filter function caused the event to drop! [ 333.200411][ T9463] kobject: 'integrity' (000000008622525d): kobject_cleanup, parent (null) [ 333.210806][ T9463] kobject: 'integrity' (000000008622525d): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 333.225367][ T9463] kobject: 'integrity': free name [ 333.231824][ T9463] kobject: '7:0' (000000004d8f5e09): kobject_uevent_env [ 333.238925][ T9463] kobject: '7:0' (000000004d8f5e09): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 333.249439][ T9463] kobject: '7:0' (000000004d8f5e09): kobject_cleanup, parent (null) [ 333.258446][ T9463] kobject: '7:0' (000000004d8f5e09): calling ktype release [ 333.265943][ T9463] kobject: '7:0': free name [ 333.270722][ T9463] kobject: 'mq' (0000000057e98815): kobject_uevent_env [ 333.278277][ T9463] kobject: 'mq' (0000000057e98815): kobject_uevent_env: filter function caused the event to drop! [ 333.289188][ T9463] kobject: 'queue' (00000000258f1a43): kobject_uevent_env [ 333.296515][ T9463] kobject: 'queue' (00000000258f1a43): kobject_uevent_env: filter function caused the event to drop! [ 333.308382][ T9463] kobject: 'iosched' (0000000098fd496d): kobject_uevent_env [ 333.315793][ T9463] kobject: 'iosched' (0000000098fd496d): kobject_uevent_env: attempted to send uevent without kset! [ 333.326997][ T9463] kobject: 'holders' (0000000025e73b87): kobject_cleanup, parent 0000000017461c99 [ 333.336674][ T9463] kobject: 'holders' (0000000025e73b87): auto cleanup kobject_del [ 333.344761][ T9463] kobject: 'holders' (0000000025e73b87): calling ktype release [ 333.352441][ T9463] kobject: (0000000025e73b87): dynamic_kobj_release [ 333.359661][ T9463] kobject: 'holders': free name [ 333.364671][ T9463] kobject: 'slaves' (00000000052567c9): kobject_cleanup, parent 0000000017461c99 [ 333.373974][ T9463] kobject: 'slaves' (00000000052567c9): auto cleanup kobject_del [ 333.383042][ T9463] kobject: 'slaves' (00000000052567c9): calling ktype release [ 333.390562][ T9463] kobject: (00000000052567c9): dynamic_kobj_release [ 333.398119][ T9463] kobject: 'slaves': free name [ 333.404130][ T9463] kobject: 'loop0' (0000000017461c99): kobject_uevent_env [ 333.411666][ T9463] kobject: 'loop0' (0000000017461c99): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 333.513556][ T9463] kobject: 'iosched' (0000000098fd496d): kobject_cleanup, parent (null) [ 333.523325][ T9463] kobject: 'iosched' (0000000098fd496d): calling ktype release [ 333.530925][ T9463] kobject: 'iosched': free name [ 333.541642][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 333.547382][ T7869] kobject: 'loop0' (0000000017461c99): kobject_cleanup, parent (null) [ 333.568932][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 333.587711][ T7869] kobject: 'loop0' (0000000017461c99): calling ktype release [ 333.596442][ T7869] kobject: 'queue' (00000000258f1a43): kobject_cleanup, parent (null) [ 333.607688][ T7869] kobject: 'queue' (00000000258f1a43): calling ktype release 12:27:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 333.617221][ T7869] kobject: 'queue': free name [ 333.621838][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 333.622153][ T3262] kobject: '0' (000000004d343e26): kobject_cleanup, parent (null) [ 333.650057][ T7869] kobject: 'loop0': free name 12:27:48 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) [ 333.665283][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 333.683079][ T3262] kobject: '0' (000000004d343e26): calling ktype release [ 333.709548][ T3262] kobject: '0': free name [ 333.719733][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 333.738976][ T3262] kobject: 'cpu0' (00000000654adf4a): kobject_cleanup, parent (null) [ 333.758596][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 333.776858][ T3262] kobject: 'cpu0' (00000000654adf4a): calling ktype release [ 333.782577][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 333.784562][ T3262] kobject: 'cpu0': free name [ 333.799053][ T3262] kobject: 'cpu1' (00000000855424e8): kobject_cleanup, parent (null) [ 333.801359][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 333.808805][ T3262] kobject: 'cpu1' (00000000855424e8): calling ktype release [ 333.829060][ T3262] kobject: 'cpu1': free name [ 333.831883][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 333.834135][ T3262] kobject: 'mq' (0000000057e98815): kobject_cleanup, parent (null) [ 333.851335][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 333.852968][ T3262] kobject: 'mq' (0000000057e98815): calling ktype release [ 333.870196][ T3262] kobject: 'mq': free name [ 333.871988][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 333.881965][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 333.896527][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 333.903948][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 333.923575][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 333.931039][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 333.942441][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 333.950286][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 333.960899][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 333.969361][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' 12:27:49 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:49 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) rt_sigprocmask(0x2, 0x0, &(0x7f0000000080), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:49 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x298) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 12:27:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:49 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) [ 334.565241][ T7869] kobject: '7:0' (0000000095bfbe54): kobject_add_internal: parent: 'bdi', set: 'devices' [ 334.590446][ T7869] kobject: '7:0' (0000000095bfbe54): kobject_uevent_env [ 334.600180][ T7869] kobject: '7:0' (0000000095bfbe54): fill_kobj_path: path = '/devices/virtual/bdi/7:0' 12:27:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 334.617615][ T7869] kobject: 'loop0' (00000000e72499c5): kobject_add_internal: parent: 'block', set: 'devices' [ 334.628530][ T7869] kobject: 'loop0' (00000000e72499c5): kobject_uevent_env [ 334.641343][ T7869] kobject: 'loop0' (00000000e72499c5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 334.656153][ T7869] kobject: 'holders' (00000000b26dde7d): kobject_add_internal: parent: 'loop0', set: '' 12:27:49 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 334.667763][ T7869] kobject: 'slaves' (0000000059052119): kobject_add_internal: parent: 'loop0', set: '' [ 334.678676][ T7869] kobject: 'loop0' (00000000e72499c5): kobject_uevent_env [ 334.691350][ T7869] kobject: 'loop0' (00000000e72499c5): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 334.702673][ T7869] kobject: 'queue' (00000000a3a92fa5): kobject_add_internal: parent: 'loop0', set: '' 12:27:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 334.713849][ T7869] kobject: 'mq' (000000001b0fdbd2): kobject_add_internal: parent: 'loop0', set: '' [ 334.731290][ T7869] kobject: 'mq' (000000001b0fdbd2): kobject_uevent_env [ 334.738668][ T7869] kobject: 'mq' (000000001b0fdbd2): kobject_uevent_env: filter function caused the event to drop! [ 334.749452][ T7869] kobject: '0' (00000000990f5cff): kobject_add_internal: parent: 'mq', set: '' [ 334.759109][ T7869] kobject: 'cpu0' (00000000654adf4a): kobject_add_internal: parent: '0', set: '' [ 334.769327][ T7869] kobject: 'cpu1' (00000000855424e8): kobject_add_internal: parent: '0', set: '' [ 334.779781][ T7869] kobject: 'queue' (00000000a3a92fa5): kobject_uevent_env [ 334.787011][ T7869] kobject: 'queue' (00000000a3a92fa5): kobject_uevent_env: filter function caused the event to drop! [ 334.798238][ T7869] kobject: 'iosched' (0000000086b38e91): kobject_add_internal: parent: 'queue', set: '' [ 334.809908][ T7869] kobject: 'iosched' (0000000086b38e91): kobject_uevent_env [ 334.817287][ T7869] kobject: 'iosched' (0000000086b38e91): kobject_uevent_env: filter function caused the event to drop! [ 334.828691][ T7869] kobject: 'integrity' (000000000d0c871c): kobject_add_internal: parent: 'loop0', set: '' [ 334.840176][ T7869] kobject: 'integrity' (000000000d0c871c): kobject_uevent_env [ 334.848354][ T7869] kobject: 'integrity' (000000000d0c871c): kobject_uevent_env: filter function caused the event to drop! [ 334.859971][ T9515] kobject: 'integrity' (000000000d0c871c): kobject_uevent_env [ 334.867672][ T9515] kobject: 'integrity' (000000000d0c871c): kobject_uevent_env: filter function caused the event to drop! [ 334.880564][ T9515] kobject: 'integrity' (000000000d0c871c): kobject_cleanup, parent (null) [ 334.890440][ T9515] kobject: 'integrity' (000000000d0c871c): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 334.905283][ T9515] kobject: 'integrity': free name [ 334.912697][ T9515] kobject: '7:0' (0000000095bfbe54): kobject_uevent_env [ 334.919832][ T9515] kobject: '7:0' (0000000095bfbe54): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 334.930764][ T9515] kobject: '7:0' (0000000095bfbe54): kobject_cleanup, parent (null) [ 334.940113][ T9515] kobject: '7:0' (0000000095bfbe54): calling ktype release [ 334.947669][ T9515] kobject: '7:0': free name [ 334.952691][ T9515] kobject: 'mq' (000000001b0fdbd2): kobject_uevent_env [ 334.959630][ T9515] kobject: 'mq' (000000001b0fdbd2): kobject_uevent_env: filter function caused the event to drop! [ 334.970521][ T9515] kobject: 'queue' (00000000a3a92fa5): kobject_uevent_env [ 334.977771][ T9515] kobject: 'queue' (00000000a3a92fa5): kobject_uevent_env: filter function caused the event to drop! [ 334.990303][ T9515] kobject: 'iosched' (0000000086b38e91): kobject_uevent_env [ 334.997781][ T9515] kobject: 'iosched' (0000000086b38e91): kobject_uevent_env: attempted to send uevent without kset! [ 335.008878][ T9515] kobject: 'holders' (00000000b26dde7d): kobject_cleanup, parent 00000000e72499c5 [ 335.018165][ T9515] kobject: 'holders' (00000000b26dde7d): auto cleanup kobject_del [ 335.026312][ T9515] kobject: 'holders' (00000000b26dde7d): calling ktype release [ 335.034032][ T9515] kobject: (00000000b26dde7d): dynamic_kobj_release [ 335.040708][ T9515] kobject: 'holders': free name [ 335.045735][ T9515] kobject: 'slaves' (0000000059052119): kobject_cleanup, parent 00000000e72499c5 [ 335.055112][ T9515] kobject: 'slaves' (0000000059052119): auto cleanup kobject_del [ 335.063539][ T9515] kobject: 'slaves' (0000000059052119): calling ktype release [ 335.071055][ T9515] kobject: (0000000059052119): dynamic_kobj_release [ 335.077863][ T9515] kobject: 'slaves': free name [ 335.083927][ T9515] kobject: 'loop0' (00000000e72499c5): kobject_uevent_env [ 335.091849][ T9515] kobject: 'loop0' (00000000e72499c5): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 335.183566][ T9515] kobject: 'iosched' (0000000086b38e91): kobject_cleanup, parent (null) [ 335.193313][ T9515] kobject: 'iosched' (0000000086b38e91): calling ktype release [ 335.200971][ T9515] kobject: 'iosched': free name [ 335.211599][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 335.218950][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 335.228837][ T7869] kobject: 'loop0' (00000000e72499c5): kobject_cleanup, parent (null) 12:27:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:50 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 335.265452][ T7869] kobject: 'loop0' (00000000e72499c5): calling ktype release [ 335.287392][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 335.304913][ T7869] kobject: 'queue' (00000000a3a92fa5): kobject_cleanup, parent (null) [ 335.305208][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 335.338775][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 335.346151][ T7869] kobject: 'queue' (00000000a3a92fa5): calling ktype release [ 335.356537][ T7869] kobject: 'queue': free name [ 335.361482][ T3262] kobject: '0' (00000000990f5cff): kobject_cleanup, parent (null) [ 335.370161][ T3262] kobject: '0' (00000000990f5cff): calling ktype release [ 335.379315][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 335.393552][ T7869] kobject: 'loop0': free name [ 335.399508][ T3262] kobject: '0': free name [ 335.411036][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 335.418581][ T3262] kobject: 'cpu0' (00000000654adf4a): kobject_cleanup, parent (null) [ 335.429448][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 335.440230][ T3262] kobject: 'cpu0' (00000000654adf4a): calling ktype release [ 335.448268][ T3262] kobject: 'cpu0': free name [ 335.453731][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env 12:27:50 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x0) 12:27:50 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) 12:27:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 12:27:50 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) [ 335.461367][ T3262] kobject: 'cpu1' (00000000855424e8): kobject_cleanup, parent (null) [ 335.474201][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 335.480074][ T7869] kobject: '7:0' (00000000b08b8bee): kobject_add_internal: parent: 'bdi', set: 'devices' [ 335.496087][ T3878] kobject: 'loop3' (00000000961ea910): kobject_uevent_env [ 335.510109][ T3878] kobject: 'loop3' (00000000961ea910): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 335.529754][ T7869] kobject: '7:0' (00000000b08b8bee): kobject_uevent_env [ 335.537787][ T3262] kobject: 'cpu1' (00000000855424e8): calling ktype release [ 335.542782][ T7869] kobject: '7:0' (00000000b08b8bee): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 335.559060][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env 12:27:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:50 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 335.572573][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 335.576235][ T3262] kobject: 'cpu1': free name [ 335.583118][ T7869] kobject: 'loop0' (0000000018c054ff): kobject_add_internal: parent: 'block', set: 'devices' [ 335.600367][ T3878] kobject: 'loop1' (0000000039d1f520): kobject_uevent_env [ 335.605274][ T3262] kobject: 'mq' (000000001b0fdbd2): kobject_cleanup, parent (null) 12:27:50 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80000) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x298) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x3b, &(0x7f0000000040)={'H\x00', 0x2, [{}, {}]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 335.608142][ T7869] kobject: 'loop0' (0000000018c054ff): kobject_uevent_env [ 335.624463][ T3878] kobject: 'loop1' (0000000039d1f520): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 335.630423][ T3262] kobject: 'mq' (000000001b0fdbd2): calling ktype release [ 335.643372][ T7869] kobject: 'loop0' (0000000018c054ff): kobject_uevent_env: uevent_suppress caused the event to drop! [ 335.655888][ T3262] kobject: 'mq': free name [ 335.663939][ T7869] kobject: 'holders' (000000007fa255cb): kobject_add_internal: parent: 'loop0', set: '' [ 335.674283][ T7869] kobject: 'slaves' (00000000783b2830): kobject_add_internal: parent: 'loop0', set: '' [ 335.684565][ T7869] kobject: 'loop0' (0000000018c054ff): kobject_uevent_env [ 335.691763][ T7869] kobject: 'loop0' (0000000018c054ff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 335.702363][ T7869] kobject: 'queue' (0000000017d5c683): kobject_add_internal: parent: 'loop0', set: '' [ 335.712933][ T7869] kobject: 'mq' (000000009a5abf8b): kobject_add_internal: parent: 'loop0', set: '' [ 335.723150][ T7869] kobject: 'mq' (000000009a5abf8b): kobject_uevent_env [ 335.730013][ T7869] kobject: 'mq' (000000009a5abf8b): kobject_uevent_env: filter function caused the event to drop! [ 335.740673][ T7869] kobject: '0' (0000000098328379): kobject_add_internal: parent: 'mq', set: '' [ 335.750229][ T7869] kobject: 'cpu0' (00000000ffe1fbce): kobject_add_internal: parent: '0', set: '' [ 335.759938][ T7869] kobject: 'cpu1' (00000000887fee2e): kobject_add_internal: parent: '0', set: '' [ 335.770592][ T7869] kobject: 'queue' (0000000017d5c683): kobject_uevent_env [ 335.777778][ T7869] kobject: 'queue' (0000000017d5c683): kobject_uevent_env: filter function caused the event to drop! [ 335.788910][ T7869] kobject: 'iosched' (000000002c938036): kobject_add_internal: parent: 'queue', set: '' [ 335.799537][ T7869] kobject: 'iosched' (000000002c938036): kobject_uevent_env [ 335.806877][ T7869] kobject: 'iosched' (000000002c938036): kobject_uevent_env: filter function caused the event to drop! [ 335.818040][ T7869] kobject: 'integrity' (00000000d67dad4b): kobject_add_internal: parent: 'loop0', set: '' [ 335.828556][ T7869] kobject: 'integrity' (00000000d67dad4b): kobject_uevent_env [ 335.836044][ T7869] kobject: 'integrity' (00000000d67dad4b): kobject_uevent_env: filter function caused the event to drop! [ 335.847725][ T9546] kobject: 'integrity' (00000000d67dad4b): kobject_uevent_env [ 335.855577][ T9546] kobject: 'integrity' (00000000d67dad4b): kobject_uevent_env: filter function caused the event to drop! [ 335.868234][ T9546] kobject: 'integrity' (00000000d67dad4b): kobject_cleanup, parent (null) [ 335.877961][ T9546] kobject: 'integrity' (00000000d67dad4b): does not have a release() function, it is broken and must be fixed. See Documentation/kobject.txt. [ 335.892829][ T9546] kobject: 'integrity': free name [ 335.898905][ T9546] kobject: '7:0' (00000000b08b8bee): kobject_uevent_env [ 335.906356][ T9546] kobject: '7:0' (00000000b08b8bee): fill_kobj_path: path = '/devices/virtual/bdi/7:0' [ 335.916780][ T9546] kobject: '7:0' (00000000b08b8bee): kobject_cleanup, parent (null) [ 335.926053][ T9546] kobject: '7:0' (00000000b08b8bee): calling ktype release [ 335.933359][ T9546] kobject: '7:0': free name [ 335.938133][ T9546] kobject: 'mq' (000000009a5abf8b): kobject_uevent_env [ 335.945079][ T9546] kobject: 'mq' (000000009a5abf8b): kobject_uevent_env: filter function caused the event to drop! [ 335.956161][ T9546] kobject: 'queue' (0000000017d5c683): kobject_uevent_env [ 335.963777][ T9546] kobject: 'queue' (0000000017d5c683): kobject_uevent_env: filter function caused the event to drop! [ 335.975502][ T9546] kobject: 'iosched' (000000002c938036): kobject_uevent_env [ 335.982885][ T9546] kobject: 'iosched' (000000002c938036): kobject_uevent_env: attempted to send uevent without kset! [ 335.993832][ T9546] kobject: 'holders' (000000007fa255cb): kobject_cleanup, parent 0000000018c054ff [ 336.003096][ T9546] kobject: 'holders' (000000007fa255cb): auto cleanup kobject_del [ 336.011053][ T9546] kobject: 'holders' (000000007fa255cb): calling ktype release [ 336.018766][ T9546] kobject: (000000007fa255cb): dynamic_kobj_release [ 336.025534][ T9546] kobject: 'holders': free name [ 336.030396][ T9546] kobject: 'slaves' (00000000783b2830): kobject_cleanup, parent 0000000018c054ff [ 336.039778][ T9546] kobject: 'slaves' (00000000783b2830): auto cleanup kobject_del [ 336.047927][ T9546] kobject: 'slaves' (00000000783b2830): calling ktype release [ 336.055790][ T9546] kobject: (00000000783b2830): dynamic_kobj_release [ 336.062695][ T9546] kobject: 'slaves': free name [ 336.068397][ T9546] kobject: 'loop0' (0000000018c054ff): kobject_uevent_env 12:27:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)) read(r1, &(0x7f0000000080)=""/122, 0x7a) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) [ 336.076059][ T9546] kobject: 'loop0' (0000000018c054ff): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 336.163855][ T9546] kobject: 'iosched' (000000002c938036): kobject_cleanup, parent (null) [ 336.173196][ T9546] kobject: 'iosched' (000000002c938036): calling ktype release [ 336.180830][ T9546] kobject: 'iosched': free name [ 336.190900][ T3878] kobject: 'loop4' (000000006139c883): kobject_uevent_env [ 336.203923][ T7869] kobject: 'loop0' (0000000018c054ff): kobject_cleanup, parent (null) 12:27:51 executing program 2: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe(&(0x7f0000000200)) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') r0 = syz_open_procfs(0x0, 0x0) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f00000006c0)='id_resolver\x00', 0x0, &(0x7f0000000740)="64de722a130235e7464ba99c7cb8b48ff9b2ca0feb609a0d2859", 0x1a, 0xfffffffffffffff8) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs, 0x6e) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in=@local}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, 0x0) signalfd4(r3, &(0x7f0000000000)={0x5}, 0x8, 0x80800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fremovexattr(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYBLOB='sysxem.posiaccesvppp0']) [ 336.225607][ T3878] kobject: 'loop4' (000000006139c883): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 336.231625][ T7869] kobject: 'loop0' (0000000018c054ff): calling ktype release [ 336.264531][ T7869] kobject: 'queue' (0000000017d5c683): kobject_cleanup, parent (null) 12:27:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) read(r0, &(0x7f0000465f8e)=""/114, 0x37) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000240)={&(0x7f000001d000/0xc00000)=nil, 0xc00000}) 12:27:51 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) umount2(0x0, 0x0) [ 336.300239][ T3878] kobject: 'loop5' (0000000030af9c56): kobject_uevent_env [ 336.308139][ T7869] kobject: 'queue' (0000000017d5c683): calling ktype release [ 336.329353][ T3878] kobject: 'loop5' (0000000030af9c56): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 336.332685][ T7869] kobject: 'queue': free name [ 336.344561][ T7883] kobject: '0' (0000000098328379): kobject_cleanup, parent (null) [ 336.365831][ T3878] kobject: 'loop2' (00000000a10fcf7a): kobject_uevent_env [ 336.370273][ T9565] kobject: '7:0' (00000000874fd566): kobject_add_internal: parent: 'bdi', set: 'devices' [ 336.381129][ T3878] kobject: 'loop2' (00000000a10fcf7a): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 336.384080][ T7883] kobject: '0' (0000000098328379): calling ktype release