0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:13 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./bus\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="eb3c906d6b66732e766174000204010002000270fff844b22823600dd7a9270f46e881f2914cd409d53e0a55b9e25fbda0ab4b19634d5090ddb96ff1fed81949829e9e9dfb8a10c62f3a19", 0xffffffffffffff8b, 0x1}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x8) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) dup(r3) write$P9_RREADLINK(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="3a258211f663a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f507000000000000007bc2fdffe8cd918b0350412915d8a5c51817c3ff01a1f62ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee"], 0x6c) perf_event_open(&(0x7f0000000800)={0x127ca20ebee0e22c, 0x319, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) [ 396.384651] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) unlink(&(0x7f0000000240)='./file0\x00') ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000140)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000a1d33094e61fd7a5c2a22a2077f850a0e94d3c3b5f9c249d36126895d7603054d021cbc8d5a9075229a622bad88dffd1ebc03e00aed9d17f7a599c622e6c36503a6705c522a2909a4d63376adf3930d16ff11b3739b44e4a16176fd956f3fd5abb48b3087aecd335213c98c93caa70bd17652feffe87b697366629b2ad0082d31bba5fe7b7258805b112045ed2347898bf761546519fb88459", @ANYRES16=0x0, @ANYBLOB="0000000000000000000002000000"], 0x14}}, 0x0) r3 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xabb, &(0x7f0000000100)=[{&(0x7f00000000c0)="100000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x4db, 0x400}], 0x4801, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000040)=0x3) 17:56:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 396.655460] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 396.751801] EXT4-fs (loop3): Unrecognized mount option "/d" or missing value [ 396.785638] EXT4-fs (loop3): failed to parse options in superblock: /d 17:56:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 396.980984] EXT4-fs (loop3): bad geometry: block count 580964351930795064 exceeds size of device (66048 blocks) [ 396.987007] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:14 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:14 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffef3) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) mkdirat(r1, &(0x7f00000004c0)='./bus\x00', 0x6) setns(r1, 0x8000000) fchdir(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x2, 0x0, {0x2, 0x0, 0x0, 0x1d, 0x6, 0x64}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40040}, 0x4000080) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/exec\x00', 0x2, 0x0) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141046, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000940)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)=ANY=[]) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r4, &(0x7f0000000740)={&(0x7f0000000040), 0xc, &(0x7f0000000700)={&(0x7f00000009c0)=ANY=[@ANYBLOB="64000000f501e2a7334f450b53a86b544fc9aa77dbab2c18af528bece978ebad1256ea000000808b76cc0aaf77a8e29f6bec87cad295bd816add1beb86d6deb4ad47016029f75d028fbfa39bc2dab32e517a54d7b426a20f8d5e8e1b104e270fffc1f92a51df347765d916c6db", @ANYRES16=r5, @ANYBLOB="10002cbd7000fcdbdf2515000000440009080800020000000000080001000065d900000008000200e55d0000080002009104000008000200a800000008000100f7ffffff080002009801040008000200040000000c00060008000100090000ffc2ac1490be9197db688dfbdc4ca526c241932f2c30fc10233b32ec2696651487e0045ef38571ca0ae3cdd41cfc3e69463f8d2d8d72a6ac53cc9e6f7c7669c858b10956f4feab4e7e38ed61b9b52367e62e93a24412d644a8a3e72095ad4bca66e7e6620254"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000894) sched_setparam(0x0, &(0x7f0000000480)) writev(0xffffffffffffffff, &(0x7f00000a8000)=[{&(0x7f00000000c0)="580000001200192300bb4b80040d8c56286932324ba7e680129643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004000000005e0000001d30221f1000010007008a96ff0000ec6b0f536e", 0x58}], 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/checkreqprot\x00', 0x200000, 0x0) 17:56:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 397.249900] FAT-fs (loop5): count of clusters too big (11682814) [ 397.350977] FAT-fs (loop5): Can't find a valid FAT filesystem 17:56:14 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ppoll(&(0x7f0000002080)=[{r0}], 0x1, 0x0, 0x0, 0x0) 17:56:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:14 executing program 5: r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x6f}, 0x0) 17:56:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x21000a}}, 0x50) 17:56:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) futimesat(r1, &(0x7f0000000180)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) open(&(0x7f00000001c0)='./file0/file0\x00', 0x4000, 0x102) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000240)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$set_timeout(0xf, r3, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) open(0x0, 0x0, 0x0) lstat(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) ioctl$ASHMEM_SET_PROT_MASK(0xffffffffffffffff, 0x40087705, 0x0) 17:56:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:15 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:15 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3}]}}}], 0x18}, 0x0) 17:56:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:15 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x6ed2de130fbea547) 17:56:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:15 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x1f, 0x0, &(0x7f0000000080)="b9ff0300000d698cb89e14f04305000fffff00004000638877fbac141421e9", 0x0, 0x100, 0x0, 0xcb, 0x1d5}, 0x40) 17:56:15 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x20005f) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7f454c460080000000eebf000004000002000600ca3f8bca0000004038000000000400f70400000000000000020000020000009226529a0001000000000000000000f8fb66ff000cef000004"], 0x4c) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="7f454c460000000147694e7ea829c1000000000000000000000400000200"/44], 0x2c) close(r0) uselib(&(0x7f0000000180)='./file0\x00') 17:56:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:15 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) write$FUSE_INIT(r1, &(0x7f0000000180)={0x50}, 0x50) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d9189) socket(0x0, 0x0, 0x0) mkdir(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) r5 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x8000fffffffe) 17:56:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:15 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f000000ff80)=[{{&(0x7f0000000500)=@generic={0x0, "c1f89a18f70f4c049490ba2cdfdcd0ddf3fe1737f593a1f7a720708598e01bf1ad37284e3123547d63f9b099b892c5cd01b7bacf990120c88220d62892d6d4ae22c903f405864ceaada44ef8e50ae922d4aaa120915477325c25ad139a4d7352106df997faae6edfcec2c2b0db4c4b92c72a7ac1ff1156e5e31b69fa1bb8"}, 0x80, 0x0}}], 0x1, 0x0) 17:56:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:16 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capget(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) 17:56:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0xe}, {0x1}]}]}}, &(0x7f0000000680)=""/170, 0x3e, 0xaa, 0x1}, 0x20) 17:56:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:16 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000640)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f00000001c0)={0x0, 0x0, 0x1000200000000}) ftruncate(r0, 0x8200) ftruncate(r0, 0x1c08) 17:56:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:16 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) clone(0xa102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000002c0)={@ipv4, 0x0, 0x0, 0x0, 0xf}, 0x20) write$cgroup_type(r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, 0x0, 0x0) 17:56:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, 0x0, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:16 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000440)='\x00\x81\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0x407012ef, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) dup3(r2, r0, 0x0) [ 399.399264] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 399.408117] nla_parse: 8 callbacks suppressed [ 399.408127] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:16 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f0000000440)='\x00\x81\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="16", 0x1}], 0x1, 0x401081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f8ca781d5f7e93117b52fa936f014929d175a4e80426585243b392f26e839018d8343d49d4273cc82ed2a2ef63524fc21d71047600", "92ef27daf4634f9065ecbc04c983083f390c3d7bf9ac5c11d0b60f5d070e9826557914da1567ee4534b1192353f3f801223d563be035c7fb302fe546973e9c78", "f1a55947f83b5a8a1bd0d7e25a30c2c9d78038891de2ae1c3c5b7be4da2a17da", [0x0, 0x20]}) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 17:56:17 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) setgid(r1) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, &(0x7f00000003c0)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000900)="120000001200e7ef077b1a3fcd000002", 0x10, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) creat(&(0x7f0000000000)='./file0\x00', 0x110) dup2(0xffffffffffffffff, 0xffffffffffffffff) fchdir(r0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000000100)=@hopopts={0x62}, 0x8) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x779775f8ef39a7b0, 0x101, 0x0) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r4, 0x0) writev(0xffffffffffffffff, &(0x7f00000019c0)=[{&(0x7f0000000300)="bc3ec8b1240d607dbaed0d5b24fd16ad2aa47d1c9a128c97b38c687b552f6e6c2e8af23f830ff5547e2cb6c3b485262803ef539439e9fac547aa57f668b7229ff9d81d0c5cead6b2cb4ede8cfee1d591f7df3dc92124e1830b33bf94a4de24779f6aeef21c6ed30b901777c94d11414a3855ce8223", 0x75}, {&(0x7f0000000500)="a406cee1c1d9d961a785ed23b3a904661c0fccfbaacc6e2a1b9b3b993774431a08357e9a612cbe46364a770a8b06251b562ca3fa1456ae0c69ce14c9347e527baa1d62e773209eea9db3c79f2b4f6d825a236209621347ad1c62f9013b3a4b73e7b17042ba9ede6e9856607a3539a96bd8e10a51382101d433e5446692ffcba73691e70785148993dfca8deb2c40740ff40755c4e26ca008477a4f", 0x9b}, {&(0x7f0000000600)="0713435c95bd0d95918d5b4ea3df322ec102df5abbde682a79be59618dbce967761e0a057c7e9dc2c80edc5a845184d3f34b7a5584c22fe0c03d9d30293bc565a5b3f1adee758780c0cc62132e5d53e1c05a4bd121ff16451151620b3921d36363b800b13268b6ad21cc1a3bbfe01d0874ac0e905a9988c1e60f7a23b5676a46dc192ff3269c3d44fd65189cbe8b492a1d4e913e6195aaa66f137626602175ef093885226ef6f0d4d59cd6fac5eb7d1043733578cd4d7c272bf79e6b1c78a57eb7e642cfaa1d5d93d94642638d75ea6527e98d33ac4b183d", 0xd8}, {&(0x7f0000000700)="8fb753364cc8016c05dbe09d6910df175f6ce24c7337c1998d2876e2157ad55ea5e3c4fb939b5963547a5e51120f3b582c9ed452c8e56237407343e8b213ae286ddb3b92bf963d580fc8270df21cb9416856e13a151d39d3902ca4828d165c47c5544a982f2aeab3317824bb07fecd9a8706dc06144331b2d3837f6d67bd89ee86f5b16887a154ff2af6989e8034036ed1de44b1ebdb2d0512f27ca00b7ba4f0cc68099fb0c05af496aac29dcf898d6e3717830c7114beda08cd8743c3312019c1a125a758f618f95ead8cb145e1094bea6a7b29ab6ea39ab2e0b42c3a4cdf", 0xdf}, {0x0}, {&(0x7f00000009c0)="d78eacde403b501b4520432d2a00d31e4e90a085da3c86e8fea1b302c7080c24d4bef74c84d61609b274bd7289963ba21662e25ef50e8b13f043abddf0f0f9b83f07e17aa0c2c253287d9883f06cd407d79ad8836abaf3e0a89de1817a82eb08a4a355a936789c8266a836c564ea175f7a819349a9c472a999705ec7018a7a4229ac1d86b3cdf8e77667e29077e21651e0d180f6bbdec8ddc962dd756026141e56c5611e53bfb61c077daf6c289d14e2a12aa7afc47479f12de2d6d9ee49eabcc58d7d1a29f8877ca8bdb26ce0b3fb4405c70616f3c9be29b9ba69824849bba2def2f73482f05cedaa104b5879a4c27f252ac9ed2f649199f2beb6185f08426e0bda9036b656c572300656b81c39e96be2e1d99748bb64fc89e9baf50ddf2c0e6b2db87ca5bc7d319c3c293e29a1c05760c9e914091cf9d8ea50ce20e01f514cfe8fd4742f05de99dc218f4d584a5874eff6e7fb55ccfdaa113339a2673ae5c8d162af298b4275215e32979c10782cb362850bb31ac17329fe0887afa2732833ff75e92cea588eccc743b403a97c14dd4414958c12bb2c7413f47c6ec714a9d01204cf599d284fa424bdb4e97e534fe214591915be428a05ee77673b327409591dbe3698cfa5288718b4701e6b7f5fe9b1dd650f8051d8b207296b6d743f761383932c02a3bb75e7339fedeb13d88924bc36f16c526fccefe8e4bfc4b15347208d4ce861600d4d43bef9297f96b41046fea00ed755ab5d2d2573f07016e00bac0227f65ea4879af160f83e870fa5417a15d2489f39e2a633885e0a0b64d93d5db116e1ca9932faf9b3fae24f1f8cf90bc372a40591493fccf636903c847e4b2f039cd42737a6e743ca546064a23b58335871e88966122b74c311345fa51c9c00725ad1908931ca259dbb7a1145de163f95e2d3df3b766b7e107321a5f4a23454e4268e364fd50f55f1ab786ddb9b1c806aeb8739149009f841053e2f6c6a5bf4866a02508d5bc5f0ae253ccc254ad383dab108df5d424fc2f8777c72a8e5c18895cf6419dc78394e19eab9e3508b9057e50489e7e06b983f4a10154d1127f6dfe91d54452b098bd36d9850e762c536e94b34fcadd5dafe7b2694d318c98070d6d37bba38d0dd2806ebd8dfd12412241174083de92763b053acc97a86d1cb471f6d0c07cb8f95d05044d4b784af265962887b04102f2acbecb76912425861fb05e553a95a5c57bc70d24ceead766ee92d11dd331de29ba2702c85496e44ce49c36111ee8d45e343c7b0ed505d006573fdc95c6edbac830ab4766cdc5b30972a14ce695603e4190f479fa0c17af04c17244bcc21e3024d8020882b4ddfa7c063ede21915137b8ab2672ad8a24ea7981dbe79921d1d110184c3f936d4df404d7dd3f8c4def238eb0f1705ad7a25eebdc2069d2b5c77d409ed4c43965880f8f95ba25bb45e2610300fbdfcfefa94a0610a0b3902321387b60f7a4bd5d3835c6b1f54a781cdcc53fd62172f97b23e97286a22b4388b3b8aa98f302f574554109b25a8a4a00be1a49d4be4f39ab48e5f5bef04555f79593a5c85b935039968d8f747e6af70dc651d7d6e89e6e1e9a8f669a7f9a5f42bfe06ba85e2e3c3bd048d821beb55073cd8a47c8d02696a0d591385495e96a9b12770ec17cc26bbf8b4373dc22513ab26080da67cbeaf59bcfbe72aa2ee87726fe84d23e6067e30dc46f83b7c1bc01ff35989ea904b74e890f01b00f4bc5fcba37b25a7fe76795e37476b44988f184a22a74fdc27227f73471abd568c12b5cca31968a3691f8b26526ec72312a72c2b62ab4de35edef8bb03331c1479c68ee3ed72b7192851c33a2e66fefc5590753c52c06e4ca6bea088a2f8cd30effa05af612a0ea2c05b8eab095b2359b1fff1185267b4c3f7a91ae83a95dfa1f20bac2e88ec4c3ddc95f508e7c6b6563ad922aaa4a563c630f25185ebfc2e0ee0931bab1db2401cf8941eb9fab229673f7b75602cfcdb2fc070bac294e116b2938ff492f0633c55d03acce4f1de245ba5b76b9e7440bd403c5ba0dd3fa7db91a04ba018bc5633d8933428c19c145de32f884230cdcb400994b8536cde53b4e2698df8f43cd6f42c5bbcd0be57d4be64c455ce4d58e95f686faf63c9bc38acdf4162ec8725ce2a59909e8f5bcf78b1e86b5a7c0cd0883378eb09bf4ca043bbdf475d734e0e65f8cd03e70a469babf480025ce0a4f669fd6981532a6588d5ff1cbacf23935964c2f3109ff47567e2464a03e8bee4a299151dbac50809d0f719e65f4e2b4d902771a1103b407369328f3b444ebf0a55991c5cfad893ef9d8828c06174db55bd2c5b72417cc8250848684e628815e87870b0a233272bd1f791da938af4b3009bb7a56b5fefc70017a57c3c5b3830ff7395018739c3d481735039145ffb16e4f8af9d42f9715f3a46179f23784fbb7d7dd9d3a1627916116a937e05ddd47c6d2fd386c5ec777b10716cd5cfcebe9435cce152822fc427de176a5a08c35bff7f75c9d57734956a5b7ef4766f05550e128f3375a7173ff84b57b7a254d7f2cdecf51dac197f693a9c93997e37fb077d66a7984f891878d09a36b6abe93c6127841f1c11fce0fab262acf41a98acd219453aa840ea158f133c8f2538d25db9b461fd0a3d7f3d46ec5b78981b2b8d8b798df9dd0ad08009f643a785470802d231ad7d0cb345aebd12c1569c857e51d7b02e152b790230e2046a1ed678574868377613861370fdc1d3342d1aea8c937c0d0668507a9c1579d80196f7476f470767b9ecc0d2dd1c2eccbc4829a674ed81a5bb895b76ce354bf74b3675267fb693fbd92fbdf6cb36813210c494fabe805234a9690a024635a63a10f2881e695fc2518598093623bcfba918bc3cc500bf2ef973c0320912d3d573aa03598516baa56dca69c20c08dc40019460b59ad1dc19239ab8352740d1d2d618f0477be8c5f3fbba3d9cc5aa46e936276ff51b6f3e0baf806d7f8580ab43c46f9a59d45bfb985a3f146502d188a5ebe3b5400ea42ddac584ea30832988fd938c9e3378628901da88f2f2aa0eb78a4f92ee9b054965e27628177a763499d8239b9755b8404d746b0a93d81e89a125576c4c64217c3f064cd91028a4ce3506cba32c47004adabfc99d2dd9f18bd855ec423425328bbd0712bc52081dcdb5b01d694570e908e8c9d662e8e5ceb84afd7000949ec38807cb7c734adf6029f3615329a29f2885b23453cf600f766236fca752b66ec479a18fc2c51a999070e6917c1c68f65124fbd612f1235d740383330fb9c2a27cfd667622eba43c646f81f2516c27deba77a65987526e3efa13b84de24784c51749a75a28c89b8f1ff46f6dc74e91c9fddfca3d8a244942f6ba15159f426311c8d9b009abe9738a0c1a1180f0429a5795e597fbc6bba2964a0293c39a26261d6b736a06688121427bc387872486499a8442aa8c6796452877562f4b3acf90b1ed651367baa6b3d3c23418b561e69285377f35f4684ae44ea7e2142161433c48738ed6534cc37a38aa7194cf9893c77b2d345eefb590c8064ecb8bc8727305caee3bdf99f8ec8e61e7fe9a4e678ed70cf60cf13f428ffa5e4f5eebc69680448c2bbb01bf3abc20daac8bdb0ffd3d49fede0c810848ae85ed77ad9eb34dc4450e6b3fa6a1919c4d992ba94e7b7e462fe8223291614f51a89a089af0b4031600229c3bcada02f15d71852fb9f35ed4d0a32e760cf8dfc1d1d1b2dcef1885848a56c9bd0dc3b14a565354c98f89c0a39be827837e1ed314ac7f92e95a121550f7352972feba967ef0c9d61cd469db8a6da105316766c0a51de6ecc1adbdaf947b6509c34d5a0dd415caa82299f3bad529640de8fe6da7cf0bb5a54bd903981727a0296559fb79537a677730e0a8aeff77b4abfc8fb0dc3fb5254661fce461872fcdc49317d518cc0b3e3ae7a4ae630ac9be0a3cb04ba38bc5acea8924f1bab4f3f88935133d1952b89f2c8564b76ac3c745d7057aca5c6896116684e0c85131627c899b1494c59bb7a3bb2c5ebc1c92352f1753087d0479821b5275a7bf7c12e4f27129fe0ed59a3109c4fbfb44dea5b528a74f6f1eaa6200d4d3bc2b61451543951dd005cebdfa5b6242996d6b35ee7bdc7bc59320b5d4a8cb56d8fc9f42824618e68df9a109775110ee14dbac7f3c2eb2accfcb860d04bdeadc8f69b6b1605084ebac8b902e5b343dda5b2e750c405d7844d401d87e56170c84be3839351ee6f13dbef1aa571a5a18d0b6ccca46336fbc86c06020b61be9c5690bf47aced51de3271502f731fd8130e9cee9216aab22b4106f1f7e6b5df482956933df7ef3bcb6241ea36af1575f88e1033e86d84d392a77be2a7b87fda1608241a6c5fba60b3ad3ad59c78ed7a04083fb53795b19ac90b0e78bc9248da1066f46f4d130225d236af7ed016a92db691aecc40f4d531fdafe6269409ed0f88067b0c292c42332e1e4a80eaadaca3dac5faecb299e8e1321a29fd94e7d43e8d20fe04cbb307bfde61b226625bd026ed475a5547be5716b684b77ef49f3b2115aabdfc9dec27f5fcbed77aacd776b76421a9682c88b81047ffbf7a56a51002de719c974b4fa969727365198b323d5a96cd61447f8dcd1070e74bcdcc4be0399ec012ac9e11a3e68992e847bf69fa6e5c0e13e74d0053c7622148e7cc39d4fe36ef2968b98b5e5102b785ec92d5381279da42e5dedb5a757c99f228b4a3afc0c05d3ba07d79dffed638fd1baa3ce0265199162e955c5735ab637635d350743fce7a280dfb4018be67023c8bda39630ccdced14f558dbf9e1685f1b42918d2f3fc6f23ede7fc3404ba81011a08292566f2505cc672c558c6809e65f736b1270dca33040771d5b010a9dbdb6339eea34e7a3ff6e9d694d65aa143a249f6b9e3f1ec04a1c64d08eca64dd924985c4e324bbd556a723a78478a8061a5d955430773f49ff46f7c7decf16214f00c56364ad626f818635a9a2757313edc9724d88cca00045d2b48a7b22e9ed9c6e5de63b10148801ddd6481e49f01468fa0b88fb5c91c14f4bf5263056c162cfa01eaa1ed28cbdc9210c98d9135e54007a3647836a8dac5bdd67920b9c99958790cde2649415dcbb9f844d0a0cbc7323f0f170bfb8c7ce2485ddb82be25682cc3a5b8f328974e5b58ba14a60233ff7e0434728018ab2614620f3734c97af0586038533e8edb820ca31c4b6ccfd6bc3673a8d287f34b7f267ac9162d261c73cb640260142b2b05f9e83bad2370891bb854880582c8c3b56eaf43fcd8bab89150b27250afd7aa838ad0e2bb224aea56340fb892494dca523861839e8cab6598caf29076f1f6e239ff8cb6f9656f1f0b9c0284f43a64c807250cd4165249f5b8e3554ee2f50f7a015a5994e99fbe68a34658bb751984d6abf67cabb98c87d15de8c13c882f3729fac58d11380a834d5bc59740a70ab4cb9a5863ed5062e713b94a6982d5a1d2dd763c0a2d5446312aa0e5164558be6fd81160784819f8c73a5ebf89ee79017a478a90d9955e3f4a2056b1048fdf8de15f7667c4124562f704fb855a9709aaa28275790a30ea91ba3614f28124dc030f5f28bdbd10961b5b960fb9421de5c2be44d4855510257d52d18fe9f14752e453f9a52df7e38bb5e1e78b58442ec1689f868286bdf4c1ac66d13e8304db8b23a3d409b768b8eeff36f56b575e07d1c7a0402abefed458f7433bf3feb22951adffb1253e06fe8cb97618eae6ff4c739788ef080e0ed378fcacfb495b2d5bf8d6e6eb7eb320a6adc6460c31d7deb", 0xffe}], 0x6) 17:56:17 executing program 5: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) fcntl$dupfd(r1, 0x0, r1) [ 399.932771] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:17 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x0, {0x0, 0x94}}) 17:56:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 400.164063] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) open(0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002b40)={@loopback}, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000002e00), 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@empty}}, {{@in6=@remote}, 0x0, @in6=@local}}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='mem\x00\x01y/\x06\xea\xe847G\xa8\xff\xff\x15\xd4B\xab\xe3\xfa', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003000)={{{@in6=@dev, @in=@multicast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000003840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendto$inet(r0, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000006c0)=ANY=[@ANYBLOB], 0x0) setsockopt$sock_int(r0, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 17:56:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 400.479369] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 400.797625] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 400.823050] batman_adv: batadv0: Adding interface: veth67 [ 400.836382] batman_adv: batadv0: The MTU of interface veth67 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 17:56:18 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x30}, [@ldst={0x5, 0x3}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) 17:56:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 400.945223] batman_adv: batadv0: Not using interface veth67 (retrying later): interface not active 17:56:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) setgid(r1) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, &(0x7f00000003c0)='security.selinux\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000900)="120000001200e7ef077b1a3fcd00000200a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0), 0x0, 0x0, &(0x7f0000003700)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) creat(&(0x7f0000000000)='./file0\x00', 0x110) dup2(0xffffffffffffffff, 0xffffffffffffffff) fchdir(r0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000100)=@hopopts={0x62, 0x0, [], [@enc_lim={0x4, 0x1, 0xff}]}, 0x10) write$binfmt_aout(r3, &(0x7f0000000100)=ANY=[], 0x49f) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x779775f8ef39a7b0, 0x101, 0x1000) sendfile(r3, r3, &(0x7f00000001c0), 0x8080fffffffe) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r4, &(0x7f00000019c0)=[{&(0x7f0000000400)="609f578934b9c26f3d391578bcf6d689ca7ed19700ad22cb2c9cad1e194674f07ab34f7ba44b7ed67632a81af5b6277101ad90485b828217d03cf867eb82a33133d9f8ed1d7f6a954642dab57c41665981e918cb32fccc0cb37b9f595fb150fd933cdba8c22b2f35ff8262f953b07c2525e6297c228715e0b35812663d46768090b1d4a46a912a27952b7a53f8115a058a79d9d781555ac82508d4fff97cb5786035765532e1386fcadf77356e298fb87c0d1820a318ff1d03ad759571324858274a0e5ca82067b8103c694ff689f5b8eb5821f91aa3c0", 0xd7}, {&(0x7f0000000300)="bc3ec8b1240d607dbaed0d5b24fd16ad2aa47d1c9a128c97b38c687b552f6e6c2e8af23f830ff5547e2cb6c3b485262803ef539439e9fac547aa57f668b7229ff9d81d0c5cead6b2cb4ede8cfee1d591f7df3dc92124e1830b33bf94a4de24779f6aeef21c6ed30b901777c94d11414a3855ce8223b12c4abf92b7e547881a680446c7a75f", 0x85}, {&(0x7f0000000500)="a406cee1c1d9d961a785ed23b3a904661c0fccfbaacc6e2a1b9b3b993774431a08357e9a612cbe46364a770a8b06251b562ca3fa1456ae0c69ce14c9347e527baa1d62e773209eea9db3c79f2b4f6d825a236209621347ad1c62f9013b3a4b73e7b17042ba9ede6e9856607a3539a96bd8e10a51382101d433e5446692ffcba73691e70785148993dfca8deb2c40740ff40755c4e26ca008477a4fd73b461e2b24e96ce7d83327d49faccf0644973d168fa031d5183978c6844b69edf76cda9980b6", 0xc2}, {&(0x7f0000000600)="0713435c95bd0d95918d5b4ea3df322ec102df5abbde682a79be59618dbce967761e0a057c7e9dc2c80edc5a845184d3f34b7a5584c22fe0c03d9d30293bc565a5b3f1adee758780c0cc62132e5d53e1c05a4bd121ff16451151620b3921d36363b800b13268b6ad21cc1a3bbfe01d0874ac0e905a9988c1e60f7a23b5676a46dc192ff3269c3d44fd65189cbe8b492a1d4e913e6195aaa66f137626602175ef093885226ef6f0d4d59cd6fac5eb7d1043733578cd4d7c272bf79e6b1c78a57eb7e642cfaa1d5d93d94642638d75ea6527e98d33ac4b183d", 0xd8}, {&(0x7f0000000700)="8fb753364cc8016c05dbe09d6910df175f6ce24c7337c1998d2876e2157ad55ea5e3c4fb939b5963547a5e51120f3b582c9ed452c8e56237407343e8b213ae286ddb3b92bf963d580fc8270df21cb9416856e13a151d39d3902ca4828d165c47c5544a982f2aeab3317824bb07fecd9a8706dc06144331b2d3837f6d67bd89ee86f5b16887a154ff2af6989e8034036ed1de44b1ebdb2d0512f27ca00b7ba4f0cc68099fb0c05af496aac29dcf898d6e3717830c7114beda08cd8743c3312019c1a125a758f618f95ead8cb145e1094bea6a7b29ab6ea39ab2e0b42c3a4cdf", 0xdf}, {&(0x7f0000000200)="e141aab33e878b27d9b74a3bf42b1cbd9723c2e19e5a626e95bb115b787291", 0x1f}, {&(0x7f0000000800)="0dc8304ba17b59677b36b7df1adb2b3be7bd0abc0ae34978f3ca8b145008d8ba2e7e89fabb8ffda9c759e1675d718afa8d7ba2de78dd0e3d1ba0fa6898a0aec95a1ea944a4e17b8a6301eae96e8c075f7b2c7e158b379dc6bac123fdd8a66d71db47f3510c08f329cef60353b3a0eeca4fd270ea8cc64c6b453b1d0bf020e1b40e27878e47919015fef518d8926528df2a8a80aeba085ec3173f8d64fc8dc7ac2809e5338191903f681958fe751eecdc93fb3aaf7958daa35d0d27bd9872dde9b124066bc97d5507038f9434471ff5", 0xcf}, {&(0x7f0000000940)="ea1a5dc3d1c3974415840c3ede8d636f55cc1a97624e06671a", 0x19}, {&(0x7f00000009c0)="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", 0x1000}], 0x9) [ 401.190429] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:18 executing program 5: r0 = socket$inet6(0xa, 0x20000000080002, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, @mcast1, 0x0, 0x73, 0x0, 0x0, 0x0, 0x3000010}) 17:56:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="d3d2b93c38f09c04af97ff23"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 401.526912] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 401.645729] ptrace attach of "/root/syz-executor.5"[12796] was attempted by "/root/syz-executor.5"[12798] 17:56:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:18 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00'}) [ 401.838361] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:19 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) pipe(0x0) tkill(0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x3}}, 0x50) [ 402.189808] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:19 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000880)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x4, [@loopback]}]}}}], 0x18}, 0x0) 17:56:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:19 executing program 5: ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000280)) setuid(0x0) wait4(0x0, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x2a) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'nr0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8000001b, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7,k\x1a+@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:20 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x10}}], 0x10}, 0x0) 17:56:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:21 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:21 executing program 5: 17:56:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:21 executing program 5: 17:56:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:21 executing program 5: 17:56:21 executing program 5: 17:56:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:21 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:21 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) sendmsg$sock(r0, &(0x7f0000000440)={&(0x7f0000000240)=@in={0x2, 0x4e20, @remote}, 0x80, 0x0, 0x0, &(0x7f0000000400)=[@timestamping={{0x14}}], 0x16}, 0x0) 17:56:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 404.870783] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 17:56:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:22 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="0207000902000000754d8a00008000bd5a00000021472aefe41c4301889c91ff7f000000001600aa20675d9f82d3869feeed3764860e6cb504000000cad7cb0046a6e50e067f000000000000c137461100001a430bcde80dd9a95b305170cb18df0fea6390a3911398a1f16de15d5cf7234ec3f9e8694d66ef1e49835de0fb2e98842024b745b5be9069299b1ae514fc48f76e7c475bdabaa69a42328c20fc086a222fc2c7dc327d0a793cef51c807e126ecba09bfdb3f52"], 0x10}}, 0x0) 17:56:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:22 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:22 executing program 5: 17:56:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:22 executing program 5: 17:56:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:23 executing program 5: 17:56:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:23 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:23 executing program 5: 17:56:23 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:23 executing program 5: 17:56:23 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:24 executing program 5: 17:56:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:24 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:24 executing program 5: 17:56:24 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:24 executing program 3: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:24 executing program 5: 17:56:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:24 executing program 5: 17:56:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:24 executing program 5: 17:56:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:25 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x0, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:25 executing program 5: 17:56:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:25 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000500)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000540)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000580)={r1, r2}) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r4, 0x0, 0xe607, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r4, 0x80081272, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, 0x0) r6 = getpid() sched_setscheduler(r6, 0x5, &(0x7f0000000380)) r7 = getpid() ioctl$SIOCRSACCEPT(0xffffffffffffffff, 0x89e3) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xd2, 0x0, 0x0, 0xff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x200009, 0x0, 0x0, 0x0, 0x0, 0x4000}, r7, 0x0, r3, 0x8) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='\x00\x00\x00\x00roup\x00', 0x200002, 0x0) fchdir(r8) syz_open_procfs(r6, &(0x7f0000000280)='task\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010202000270f7f8", 0x16}], 0x0, 0x0) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, &(0x7f0000000180)={0x3, 0xb9e, &(0x7f0000000080)="4891", &(0x7f0000000300)="30d025eeab20668de748eabd185906fd76841f92553772a3e935f7c819ab4e6b725d164915cb258582b627abb75ea6024ab9ad96d6ca9b0209274fc63abc6691ce3bd81b24cdfd60f9e1d39620e507aada5cbe8d72d05eb0d7b6f73e804b539089e7e426569e626f1fa4fe2c4bed723e2597da3e27", 0x2, 0x75}) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, &(0x7f00000001c0)) umount2(&(0x7f0000000140)='./file0\x00', 0x4) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000240)) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a0500000000000000422cb4963a160161b1cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4", 0xbd, 0xfffffffffffffffe) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) 17:56:25 executing program 5: 17:56:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:25 executing program 5: 17:56:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 408.757331] FAT-fs (loop2): Directory bread(block 513) failed [ 408.775871] FAT-fs (loop2): Directory bread(block 514) failed [ 408.794532] FAT-fs (loop2): Directory bread(block 515) failed 17:56:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 408.802859] FAT-fs (loop2): Directory bread(block 516) failed [ 408.825013] FAT-fs (loop2): Directory bread(block 517) failed [ 408.845810] FAT-fs (loop2): Directory bread(block 518) failed [ 408.860399] FAT-fs (loop2): Directory bread(block 519) failed [ 408.927763] FAT-fs (loop2): Directory bread(block 520) failed [ 408.935867] FAT-fs (loop2): Directory bread(block 521) failed [ 408.942454] FAT-fs (loop2): Directory bread(block 522) failed 17:56:26 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0x0, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:26 executing program 5: 17:56:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:26 executing program 2: 17:56:26 executing program 2: 17:56:26 executing program 5: 17:56:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00y'], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:26 executing program 2: 17:56:26 executing program 5: 17:56:27 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0x0, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00y'], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:27 executing program 2: 17:56:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:27 executing program 5: 17:56:27 executing program 2: 17:56:27 executing program 5: 17:56:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00y'], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:27 executing program 2: 17:56:27 executing program 5: 17:56:28 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0x0, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:28 executing program 2: 17:56:28 executing program 5: 17:56:28 executing program 5: 17:56:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:28 executing program 2: 17:56:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:28 executing program 5: 17:56:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:29 executing program 2: 17:56:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:29 executing program 5: 17:56:29 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd193"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:29 executing program 2: 17:56:29 executing program 5: 17:56:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd193"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:29 executing program 2: 17:56:29 executing program 5: 17:56:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:29 executing program 2: 17:56:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd193"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:30 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:30 executing program 5: 17:56:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:30 executing program 2: 17:56:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=']) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:30 executing program 5: 17:56:30 executing program 2: 17:56:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:30 executing program 5: 17:56:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 17:56:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:31 executing program 5: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f0000000c40)={&(0x7f0000000280)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000c00)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x10001}}], 0x18}, 0x0) 17:56:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:31 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @random="b0509b16c169", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @link_local, @multicast1, @link_local, @dev}}}}, 0x0) 17:56:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) 17:56:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:31 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0xffffffff, 0x2) 17:56:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:31 executing program 5: bpf$MAP_CREATE(0x1000000000000, &(0x7f0000000040)={0x5, 0x2, 0x8002, 0x7, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) 17:56:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:31 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000018c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000000)=0x100000) sendfile(r0, r1, 0x0, 0x102002700) 17:56:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:32 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0xf4) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x3, 0x3, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) clock_getres(0x0, &(0x7f0000000000)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r3, 0xae80, 0x0) readv(r0, &(0x7f0000001700)=[{&(0x7f0000000280)=""/236, 0xec}, {&(0x7f00000005c0)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f0000000440)=""/90, 0x5a}, {&(0x7f00000015c0)=""/118, 0x76}, {&(0x7f0000001640)=""/189, 0xbd}, {&(0x7f00000004c0)=""/19, 0x13}], 0x7) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0xfffffffffffffdd0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x6048190}, 0x0) 17:56:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:32 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0xffffffff, 0x2) 17:56:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:32 executing program 2: read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, r0, 0x0) socket$inet6(0xa, 0x805, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'rose0\x00'}) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000180)={0x0, 0xffffffffffffff7c, 0xfa00, {0xfffffffffffffffd, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f00000002c0)={0x9, 0x108, 0xfa00, {r2, 0x3, "618548", "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"}}, 0x110) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) socket$kcm(0xa, 0x3, 0x11) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x80000000) ioctl$VIDIOC_S_AUDOUT(r5, 0x40345632, &(0x7f0000000100)={0x2, "73e985cb72bcfc5e4f7c941176aa9a352cbf65b975690543ec8ad914371b8e09", 0x1, 0x775a5778b6a77305}) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'Yr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28}, {0x6}]}) clone(0x1000000210007fb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setreuid(0x0, 0xee00) r6 = geteuid() setreuid(r6, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='sT\x01', 0x0) 17:56:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:32 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r3, 0x0, 0xffffffff, 0x2) 17:56:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:32 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:32 executing program 2: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) ftruncate(r1, 0x8200) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000000c0)={0x80000001, 0x81, 0x80000001, 0x1ff, 0x1ff}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x294ad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000700000000000000003105ccc17b0000000f0000000300000f01000000040000000900000081000000020000000000010000000000000061fee85600411800"/86], &(0x7f0000001040)=""/4096, 0x56, 0x1000, 0x1}, 0x20) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{&(0x7f00000072c0)=@un=@file={0x0, './file0/file0\x00'}, 0x80, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:56:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:32 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef80514", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:33 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xc, 0x28001) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0xfffd, {0x0, 0x100000000000001}, {0x4b, 0x2}, @ramp}) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(r3, 0x0, &(0x7f0000000100)={{r4, r5+10000000}, {0x0, 0x1c9c380}}, &(0x7f0000000140)) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r6, 0xc0f85403, 0x0) fcntl$dupfd(r6, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$evdev(r0, &(0x7f0000000040), 0x1b3) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, 0x0) ioctl$TIOCMBIC(r7, 0x5417, &(0x7f0000000040)=0x3) 17:56:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:33 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:33 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:33 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYBLOB="850081008ca31d3f003b54c91df8a31be46a014d43e66871c22ee20ce70f39885b2007369348b27eceb52aec5737ca70af71bee3b7a6117929e7b1d46d38b6a6b6c3285bb01e4d5d627b0f0911da0beb35118732bb0cbf909651c8c600fbde031f3161edefb1ba0706eb9644ce21b8e89e5300004c001f00ff6a4518c96e417975eb8dbfcd05c15316132e"], 0xa1}}, 0x0) r0 = syz_open_procfs(0x0, 0x0) write$tun(r0, &(0x7f0000000180)={@val={0x0, 0x88f8}, @void, @mpls={[{0x1ff, 0x0, 0x1}], @ipv4={{0xd, 0x4, 0x2, 0x2, 0x89, 0x64, 0x2, 0x7, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, {[@cipso={0x86, 0x1d, 0xffff, [{0x3, 0xf, "23fdb31e14f7388bd7fb615aa7"}, {0x5, 0x8, "d7e6a8984eef"}]}]}}, @icmp=@source_quench={0x4, 0x0, 0x0, 0x0, {0x12, 0x4, 0x0, 0x7, 0x8, 0x68, 0x8, 0x3f, 0x78, 0x1, @dev={0xac, 0x14, 0x14, 0x14}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@generic={0x0, 0xa, "acd2918bb6ad8e78"}, @rr={0x7, 0x23, 0x5, [@multicast1, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, @local, @multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x29}]}, @generic={0x83, 0x4, "bfaa"}]}}, "cebb4147cb"}}}}, 0x3ea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmmsg(r2, &(0x7f0000000180), 0x216a8ee6aa5732f, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r2}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x898fd13755b449c, &(0x7f0000000100)=[{&(0x7f0000000040)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0xff66, 0x400}], 0x5, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x4001, 0x12d) 17:56:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef80514", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_i', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:33 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xffffffff, 0x2) 17:56:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef80514", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 416.802647] EXT4-fs (loop2): filesystem too large to mount safely on this system [ 416.920760] EXT4-fs (loop2): Unrecognized mount option "./file0" or missing value [ 416.928582] EXT4-fs (loop2): failed to parse options in superblock: ./file0 [ 416.936867] EXT4-fs (loop2): filesystem too large to mount safely on this system 17:56:36 executing program 5: r0 = socket$inet(0x2, 0x200000002, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x1000) fsetxattr$security_selinux(r1, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:unconfined_execmem_exec_t:s0\x00', 0x2f, 0xcfe21b3334148c14) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000400)=@broute={'broute\x00', 0x20, 0x2, 0x1f8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x270) r2 = dup(0xffffffffffffffff) r3 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @dev, 0x6}, 0x1c) getsockopt$sock_buf(r3, 0x1, 0x19, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x170) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000000)=0x0) wait4(r4, 0x0, 0x40000000, 0x0) r5 = getpgid(r4) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r9 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) r11 = gettid() ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x5, 0x81, 0x1, r11}) r12 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r13 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r14 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video35\x00', 0x2, 0x0) r15 = fcntl$dupfd(r13, 0x0, r14) r16 = gettid() ioctl$BLKTRACESETUP(r15, 0xc0481273, &(0x7f0000000040)={[], 0x8, 0x158, 0x40, 0x81, 0x1, r16}) r17 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) r18 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r18, 0x0, 0x0) r19 = getpgrp(0x0) waitid(0x0, r19, &(0x7f00000002c0), 0x5, 0x0) r20 = getpgid(r19) r21 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r21, 0x8904, &(0x7f0000000000)=0x0) r23 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r24 = openat$cgroup_ro(r23, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r25 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r26 = inotify_init1(0x0) r27 = gettid() fcntl$setown(r26, 0x8, r27) r28 = getpid() r29 = socket(0xa, 0x3, 0x8) r30 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r29, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r30, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r29, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r32 = gettid() waitid(0x0, r32, &(0x7f0000000780), 0x8, &(0x7f0000000800)) sendmsg$key(r29, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r31, @ANYRESDEC=r32]], 0xfffffffffffffe56}}, 0x20004850) r33 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r34 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r35 = dup2(r34, r33) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x4, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00u#c1y\x8a\xc6^\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r35, 0xc08c5334, &(0x7f0000000200)) r36 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r36) timer_create(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, @tid=r36}, 0x0) kcmp(r36, r36, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r36, 0x0, 0x0) r37 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r36, r37, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r38}, 0x30) r39 = syz_open_dev$vbi(&(0x7f00000004c0)='/dev/vbi#\x00', 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r32, r39, 0x0, 0xffffffffffffff65, &(0x7f0000001880)='bond_slave_0\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r28, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000000)='ppp0eth1]*em0\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r25, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r24, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r22, r21, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r20, r18, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000300)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r16, r17, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r11, r12, 0x0, 0xd, &(0x7f0000000040)='eth0.trusted\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r7, 0xffffffffffffffff, 0x0, 0x1a, &(0x7f0000000040)='GPLvmnet0\\]GPL&systemeth1\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)='\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, 0xffffffffffffffff, 0x0, 0x9, &(0x7f00000000c0)='*\x00\x00\x00/Ppp\x00', r38}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r5, r2, 0x0, 0x3, &(0x7f0000000100)=',)\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r38}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000140)='team0\x00', r38}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r38}, 0xc) 17:56:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000200)={'bpq0\x00', 0x100000000, 0x9}) r1 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000000c0)=@ccm_128={{0x303}, "e0210132d8fc379e", "e96307d9189d5e95a47cb70f3be37ecd", "32419a32", "f84dc0f36ee3ae2c"}, 0x28) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) ioctl$KVM_GET_IRQCHIP(0xffffffffffffffff, 0xc208ae62, &(0x7f0000000300)={0x0, 0x0, @ioapic}) r3 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) readv(r3, &(0x7f00000001c0)=[{&(0x7f00000004c0)=""/143, 0x8f}], 0x1) close(r3) syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') syz_open_procfs(r1, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) r4 = socket$can_bcm(0x1d, 0x2, 0x2) r5 = getpid() sched_setscheduler(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xd2, 0x0, 0x0, 0xff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x200009, 0x0, 0x0, 0x0, 0x0, 0x4000}, r5, 0x0, 0xffffffffffffffff, 0x8) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r5) getpid() ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000400)={0x2, 0x101, 0xb6, 0x1, 0x8000, 0x0, 0x4, 0x8, 0x1, 0x1, 0x94, 0x41, 0x100, 0x6, &(0x7f0000000580)=""/235, 0x67c0, 0xac2e, 0x8}) tkill(r1, 0x1000000000016) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:56:36 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xffffffff, 0x2) 17:56:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 419.394039] QAT: Invalid ioctl 17:56:36 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000100)=""/14) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="4000000014002101000000f40000000002000000", @ANYRES32=r2, @ANYBLOB="140002000100000000000000000000000000000114000100fe8000000000000000000000000000bb"], 0x40}}, 0x0) 17:56:36 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x8fddc6cfc5478872, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{0x1000, 0xe2, 0x1, 0x3}, {0x1, 0x1, 0x8, 0x3}, {0x4, 0x8, 0x7, 0xef}, {0x5, 0x3, 0xff, 0x8000}, {0x8000, 0x1, 0x1, 0x4}, {0x81, 0x20, 0x8, 0x1}, {0x8000, 0x1d, 0xff, 0xd6}, {0x5, 0x20, 0xf8, 0x7cb}]}) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r1, 0x80081272, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f00000000c0)) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000002c0)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000200)=0x60) readahead(r4, 0x4, 0x7) syz_emit_ethernet(0x66, &(0x7f0000000040)={@broadcast, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @remote, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @empty, @local}}}}}}}, 0x0) 17:56:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:37 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0xffffffff, 0x2) 17:56:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 420.429182] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 420.444243] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 420.467006] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 420.482578] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 17:56:37 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r0, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r0, 0x80081272, 0x0) bind$isdn(r0, &(0x7f0000000000)={0x22, 0x14, 0x49, 0x80, 0x4}, 0x6) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="000000000000010062726964676500000c00020008001400"/36], 0x3c}}, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) 17:56:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, 0x0) fstatfs(r1, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:37 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x86, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0004060000feff800000003a4288443e7f9adf5ed7750700feff162d0201008cfe6d40fedc00000075ff171f001b4f36366194335b7189fe003b40040000710e134c2a7b9db52376591a6a71e8b8e01db2e8b638096e2c582a66a2279a6f3d82dd1f2c27283c2b9fdb90109e6697fa878514e8277f16bedd18081374ea271190fdda477c053c82cf881194fae745c1a838a8edeb69fa40103c110d5535bd2d886c53250d51a6279441c1adcda2b01a51c324b9d87b206bba083a1a0fb8cffdfb48b6a6c5f10aff010000fbffffff28434eec8eca676162f77ad1478ac098f8a217924e062dbd81c4460ec487f4b0723dd071d60a69e32a19ba723161e536d880b600e7a976b5a8d2c17c1e0764e201a5546a9657191ea805dc590775526f9e911393494a1d33f1e6ce190f389d990b6f1cecf6e3801af8fe78b45cf33a64e7fdf5ddf8f1bdb9f8b558b04ae90867185c38d5446925c21aa3fcb30f5074c6392a032328fcaf1fa48e6db3e358503e4a1861f7ff1300000000000000"], 0x17b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) read(r0, &(0x7f00000000c0)=""/235, 0xeb) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000a00)=0x4) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) r2 = dup2(r1, r0) ioctl$TCXONC(r2, 0x540a, 0x3) 17:56:38 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x2) 17:56:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:38 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) r1 = getpgrp(0x0) sched_getattr(r1, &(0x7f0000000040)={0x30}, 0x30, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x380, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000380)={0x0, 0xfff, 0x3ff, 0x5, 0x81, 0x40}, &(0x7f00000003c0)=0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000400)={r4, 0xa4, "cdb16a8cb706b81f0cde8c872924909db4af9cdf95ed219c24923d375f39d4b11f77527887d648c246a2760d47c2a6f15ccae1fb08940e6b42d758e6ddaf9f9c3a2261a9cc5755ef798392c6befc06457d99ca6a647e81ffd364a4f0bb3cb3bc375d15272950e6a7448f5ec849124167b345eee16283315b88c116ed373f6741516171b38b90e338c4ee6e9382c539219610d6996ad1afca7f8d7ee1260da45797e42fce"}, &(0x7f00000004c0)=0xac) r5 = syz_open_dev$admmidi(&(0x7f0000000500)='/dev/admmidi#\x00', 0x4, 0x101000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r5, 0xc0305710, &(0x7f0000000540)={0x0, 0x800, 0x3, 0x8}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x100004, 0x0) ioctl$TCGETA(r6, 0x5405, &(0x7f00000005c0)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00'}) getpid() r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/checkreqprot\x00', 0x40800, 0x0) utimensat(r7, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={{}, {0x77359400}}, 0x0) r8 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x2, 0x281cbe14fc4eb518}, 0xc) fstatfs(r8, &(0x7f0000000740)) ioctl$sock_bt_hidp_HIDPCONNDEL(r3, 0x400448c9, &(0x7f0000000780)={{0x7f, 0xc0, 0x0, 0x81, 0xfd, 0x1}, 0xed}) r9 = syz_open_dev$sndpcmc(&(0x7f00000007c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x4c0000) ioctl$KVM_SET_LAPIC(r9, 0x4400ae8f, &(0x7f0000000800)={"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"}) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/audio\x00', 0x404000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000c40)=0x0) mq_notify(r10, &(0x7f0000000c80)={0x0, 0x1, 0x2, @tid=r11}) r12 = syz_open_dev$cec(&(0x7f0000000cc0)='/dev/cec#\x00', 0x3, 0x2) getsockopt$netrom_NETROM_T2(r12, 0x103, 0x2, &(0x7f0000000d00)=0x5, &(0x7f0000000d40)=0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000d80)=0xdc, 0x4) r13 = syz_open_dev$sndpcmp(&(0x7f0000000dc0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) ioctl$EVIOCGMASK(r13, 0x80104592, &(0x7f0000000f00)={0x17, 0xd5, &(0x7f0000000e00)="51a889829ccd4744a33c5357867430d7dce7dc490823331e16362f2758f6874b51a45dd48bc3289c875015b59580bb238d88a0ea94544b5f76b00fb228e6a0c8bb8fbd4b117aa2ea88b99e725179e3236d1e9a75ad5dd0d8ba1f47df2e31268d54ea611c1af4894068bbf72c16963ff46808b996b37662ef169ca7bd14c646df4588de95426ec8b2208d7868786f133f003a77e1573f6ca6b2a6e715cdae69a3b51edb7a520ddebc93d479ae4e6c117f59b79d7cbcfb82a7885f92b677d3b90b6cf25fa70e5c5e1b7d86c2da0dac4b2e4a52468a44"}) [ 420.931170] nla_parse: 4 callbacks suppressed [ 420.931179] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 420.961531] kauditd_printk_skb: 37 callbacks suppressed 17:56:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 420.961548] audit: type=1400 audit(1574790998.119:167): avc: denied { setopt } for pid=13562 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 420.987987] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 17:56:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0xa, 0x300) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x216000) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = accept4(r0, &(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f00000001c0)=0xfffffffffffffd8d, 0x1000) sendto$inet6(r1, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141403}}, 0x1c) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) connect(r2, &(0x7f0000000100)=@sco={0x1f, {0x8, 0x40, 0x64, 0x8, 0x9, 0x8}}, 0x80) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 17:56:38 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x3d, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6c}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0xb, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000200)) close(0xffffffffffffffff) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0884113, 0x8) recvfrom$rose(0xffffffffffffffff, &(0x7f0000000040)=""/211, 0xd3, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socket(0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x100, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000b34ff8), 0x0) setsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, &(0x7f0000000280)=0x3, 0x2) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x48, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000cfc000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x960000) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x3, 0x6, 0x6, 0x0, 0x2, 0x7fff}) r5 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) 17:56:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 421.285017] protocol 88fb is buggy, dev hsr_slave_0 [ 421.290234] protocol 88fb is buggy, dev hsr_slave_1 17:56:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:38 executing program 5: fchdir(0xffffffffffffffff) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={0x0}, 0xfffffe09) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x1) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x7, 0x4, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)={@local}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x4080, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$pptp(0xffffffffffffffff, &(0x7f0000000180)={0x18, 0x2, {0x0, @broadcast}}, 0x1e) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000180)={0x7, @vbi={0x2}}) r3 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000180)={0x5, @vbi}) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000400)=r3) connect$llc(r1, &(0x7f0000000380)={0x1a, 0x1, 0x0, 0x9, 0x4}, 0x10) sendmmsg(r1, &(0x7f0000001380), 0x40003ad, 0x2000000) creat(&(0x7f0000000000)='./bus\x00', 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000180)={0x5, @vbi}) r5 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000400)=r5) r6 = perf_event_open(&(0x7f0000000280)={0x1, 0x204, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x6c1fa27c4fd584e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3fc, 0x1, @perf_bp={&(0x7f0000000140)}, 0x8008, 0x0, 0x4, 0x8, 0x8, 0x1000}, 0x0, 0x0, r4, 0x2) fcntl$setstatus(r6, 0x4, 0x3800) r7 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x7ff, 0x36040) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000005c0)=ANY=[@ANYBLOB="99e94cbef8c7ce1025d00039", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000002cc0), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000440)=ANY=[@ANYRES32=r8, @ANYBLOB="ff070400400005004000ffffc55a616bebd6399f0daa570fb4879f9b2e185690a12f5bbab92cfec6e46ed6b06e156597a93f306b91b8cea03b723e52d9251d4d17c11077d9046680652ec02581501ef05dca"], 0x10) r9 = socket(0xa, 0x1, 0x0) close(r9) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r9, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r11}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r7, 0x84, 0x9, &(0x7f0000000500)={r11, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}}, 0x80000001, 0x23, 0x6, 0x7}, &(0x7f0000000340)=0x98) 17:56:38 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x2) 17:56:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r3, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000180)='\f', 0x1, 0x2}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x281}]) dup3(r0, r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r7, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r7, 0x80081272, 0x0) ioctl$RTC_PLL_SET(r7, 0x40207012, &(0x7f0000000300)={0x1, 0x4, 0x1ff, 0x1, 0xb74d, 0x2e2, 0x2}) r8 = creat(&(0x7f0000000000)='./bus\x00', 0x0) pwrite64(r8, &(0x7f0000000580)=';', 0x1, 0x0) r9 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r9, 0xc0f85403, 0x0) getdents64(r9, &(0x7f0000000340)=""/183, 0xb7) r10 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) dup3(r10, r8, 0x0) fcntl$setstatus(r8, 0x4, 0x44000) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r8, &(0x7f00000002c0)='c', 0x1}]) ioctl$sock_ifreq(r1, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) open$dir(&(0x7f00000001c0)='./bus\x00', 0x80, 0x80) 17:56:38 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 421.978220] audit: type=1804 audit(1574790999.139:168): pid=13623 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir851793404/syzkaller.wwgo6D/152/bus" dev="sda1" ino=17249 res=1 17:56:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000004000', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:39 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffff, 0x2) 17:56:39 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,use', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000100)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x400002200006007, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x13, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x800000000000001, 0x6aaceef7316146df) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x4280, 0x0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x1268, &(0x7f00000001c0)) 17:56:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000001b000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000040)="0f20e06635000001000f22e0660f71d300dadec4c3c5cf600b010500002e660f388209677d00640f1a070f01df65670fc79b00580000", 0x36}], 0xe34, 0x0, 0x0, 0x1cd) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f00000005c0)=ANY=[@ANYBLOB="05000000000000007bf1551f07000000bd164466000000001f00001f00000000000000000000020000000000000000002b580000070000007dfdffff7b07800058dff98d95a759eaff03000000000400000000000000000007000000000000000000005816fcdc443f371c"]) socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:56:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:40 executing program 1: open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_i', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:40 executing program 5: r0 = accept$inet6(0xffffffffffffffff, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000400)=0x1c) fallocate(r0, 0x14, 0xe91, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000300)={0x30, 0x2, 0x2, 0x0, 0x3, 0xffffffffffffffff}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) socket$inet6(0xa, 0x400000000001, 0x0) ftruncate(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8000000000006000, 0x0) write$9p(r2, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r4, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r4, 0x80081272, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) ioprio_get$uid(0x7, r5) sendfile(r2, r3, 0x0, 0x10000) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff}) r7 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r7, 0x80184132, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r7, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000426bd7000fddbdf25020000002c000200080009000700000008000700a206000008000900ff7fffff08000300828400000800030000000000080006000900000008000700000000000000040007000000fec2d3b8bd98"], 0x3}}, 0x20040080) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYRESOCT=r6], 0x17) r8 = msgget$private(0x0, 0x0) msgsnd(r8, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0], 0x1, 0x0) lseek(0xffffffffffffffff, 0x0, 0x4) 17:56:40 executing program 2: r0 = timerfd_create(0x9, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000400)=""/4096) timerfd_settime(r0, 0x0, &(0x7f0000007000)={{0x0, 0x4}, {0x0, 0x5}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r4, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r4, 0x80081272, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="2000000000eef700040000097c3094083e7c7e9d25edd25800000000", @ANYRES32=r7], 0x20}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000200)={r7}, 0x8) pselect6(0x40, &(0x7f0000000000)={0x5, 0x40, 0x5, 0xfffffffffffffffb, 0x4, 0x1, 0x6e, 0x100000000}, &(0x7f0000000040)={0x1, 0x2, 0x2, 0x1, 0xd76, 0x8d0, 0x7, 0x80000001}, &(0x7f0000000080)={0x9, 0x4b, 0x3, 0x7, 0x6, 0x80, 0xdc, 0x80}, &(0x7f0000000100)={r2, r3+30000000}, &(0x7f0000000180)={&(0x7f0000000140)={0x2}, 0x8}) r8 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = fcntl$dupfd(r0, 0x0, r0) timerfd_gettime(r9, &(0x7f00000003c0)) 17:56:40 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x0, 0x2) 17:56:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 423.784000] audit: type=1400 audit(1574791000.939:169): avc: denied { wake_alarm } for pid=13691 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 17:56:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:41 executing program 1: open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 423.917404] audit: type=1804 audit(1574791001.059:170): pid=13701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir933656908/syzkaller.vYQoKQ/116/file0/file0" dev="loop5" ino=161 res=1 [ 424.002757] audit: type=1800 audit(1574791001.069:171): pid=13701 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="loop5" ino=161 res=0 17:56:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:41 executing program 1: open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000b000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$TUNSETNOCSUM(r2, 0x400454c8, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x4cb]}) r4 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x9, 0x100040) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000500)) ioctl$KVM_RUN(r3, 0xae80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000027c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) r9 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r9, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r9, 0x80081272, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x1f, 0x7, 0x3, 0x2, 0x0, 0x0, 0x8000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x5, 0x5, @perf_bp={&(0x7f0000000000), 0x2}, 0x10, 0x5bbf, 0x0, 0x3, 0xfffffffffffffff9, 0x0, 0x7fff}, r8, 0xc, r9, 0x8) r10 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r10, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r10, 0x80081272, 0x0) fstat(r10, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f00000001c0)='127.0.0.1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="7472616f72743d303030303030303465b2322c74696d656f75743d307830303030303030303030303030666666020000006d653d28402c74696d656f75743d3078666666666666666666666666664ccb9766661998b7675b1bea22642c7569643eb4f3c0a1d55f7ac66b320384aa8b8111355564fd35ecb65fe1593da3822e4d730058348d94e5b3000000000000000000000000000000006cd734208beecba0848bd68c8579034844fdc1aba004f607505335ceb4128d383d8d2c9edb761eaa8dbd573276fb372b4370ef5fa38b1d22e48d877725bc1cb58eacf0f41c893008ee851441d1046d03a511996c8a944f424929ce3b26380b03f9a6b046bbaff2a5edf83945a02aeabc682749c98cd7a31ae7ab988380a8a7fe985a4aa522532538c1f1210b5dffd29bbc2f86e8b0c14580297501062cb99d", @ANYRESDEC=r11, @ANYBLOB="2c636f6e746578743d7379736164464a4b2400b520bf372f1ff6cf2bbbfadee233505d1b553a83a6a11bdf30711106365fd0549e2055c9000000001cb57f5346fdf7d001a5dbe7d598aabeddaac674b646bfb68d15684df1348a15e12f193d4d5d5273a5411e930500cf35f4c487513a2d260100089a000000"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:56:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:41 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r4, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r4, 0x80081272, 0x0) preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000140)=""/250, 0xfa}, {&(0x7f0000000300)=""/166, 0xa6}, {&(0x7f00000003c0)=""/115, 0x73}], 0x3, 0x7ff) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f0000000100)={0x3, @null, r3}) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x4e23, 0x1, @loopback}, 0x1c) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0xb6) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000040)=0x5, 0x4) ftruncate(r6, 0x200004) sendfile(r0, r6, 0x0, 0x80001d00c0d0) 17:56:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='oom_adj\x00\x00\x00\x00\x00\x00\x00') ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='-4', 0x2}], 0x6) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x4) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000140)={0x7e, "cb65788eb72ce2b4f04205546d5ec74d992a956551ce1eb97857e5eae4265cb373a9fdcf6017857c4363b3fe49304f897b4cea95f6fc973afc3cf90a75c9afd396b1e2ddcbfcc8b61bc92e57dd489f16e5255f3eda31965e9a21a8ec1bc472deaee6da3e71a15c2ff742789ed3993cb2558afe1b3dd35b9268b93eaf0fb5"}) 17:56:42 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x0, 0x2) 17:56:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, 0x0) execveat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000780)=[&(0x7f0000000300)='-ppp1$\x00', &(0x7f0000000600)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000680)='/dev/snd/pcmC#D#c\x00', &(0x7f00000006c0)='\x00', &(0x7f0000000700)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000740)=')trusted\x00'], &(0x7f0000000940)=[&(0x7f00000007c0)='keyring-[\x00', &(0x7f0000000800)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000840)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000880)='/dev/snd/pcmC#D#c\x00', &(0x7f00000008c0)='/dev/snd/pcmC#D#c\x00', &(0x7f0000000900)='/dev/snd/pcmC#D#c\x00'], 0x1000) ioctl$BLKGETSIZE64(r2, 0x80081272, 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000140)=0x8) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r4, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r4, 0x80081272, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r4, 0xc080661a, &(0x7f0000000180)={{0x0, 0x0, @identifier="25a62116a8806b4d0ef88cdcbc29b9f8"}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = socket(0x10, 0x2, 0x0) socket(0x5, 0x5e88aec1620a2f9b, 0x7) sendto(r5, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) r7 = syz_open_dev$mice(&(0x7f0000000a80)='/dev/input/mice\x00', 0x0, 0x1) ioctl$ASHMEM_PURGE_ALL_CACHES(r7, 0x770a, 0x0) ioctl$KVM_SET_CPUID2(r6, 0x4008ae90, &(0x7f0000000980)=ANY=[@ANYBLOB="05000000000000001a00000006000000000000002a030000a80900001f000000080000000000000000000000000080060000000100000008000000800000003f00000001640e11000000000000000a000000010000800400000009000000010000000000008000000000000000000000000000000000020000004000000005000000fdffffffff7f0000ffff0000ff010000000000000000000000000000010000800300000006000000ffff00002000000030060000040000000000000000000400"/203]) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) recvmmsg(r5, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x1aa}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0xff08}, {&(0x7f0000000340)=""/22, 0x1de}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 17:56:42 executing program 1: mkdir(0x0, 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:42 executing program 5: socket$inet6(0xa, 0x0, 0x2000000000adb0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x23cea33ffd51e6f6) getuid() lstat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYRES32], 0x17d) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000400)=0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200, 0x4000000000}, r1, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) read$char_usb(r2, &(0x7f0000000200)=""/153, 0x99) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="d07da6d8fda6"], 0x1) r3 = msgget$private(0x0, 0x23cea33ffd51e6f6) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000d40)=ANY=[@ANYRES32, @ANYRES32], 0x8) r5 = socket(0x11, 0x80000, 0xdb) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000ac0)=0x5, 0x4) stat(&(0x7f0000000140)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000440)={{0x0, 0x0, r4, 0x0, r6, 0x20, 0x739}, 0x100000001, 0x2, 0x4, 0x6c5, 0x400}) lchown(&(0x7f0000000080)='./bus\x00', 0x0, r0) fallocate(r2, 0x3, 0x0, 0x8020003) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000000)="e5"}], 0x1) syz_open_dev$char_usb(0xc, 0xb4, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 17:56:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:42 executing program 1: mkdir(0x0, 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x2000000000000052, 0x0, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x10000}, 0x0, 0x0, 0x0, 0x8c3d1aa59c5123f9, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/50) getegid() getegid() socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086411, &(0x7f0000000100)={0x0, 0x7000000}) syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x5, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f0000000040)={0x1, 0x0, [{0x0, 0x1, 0x0, 0x0, @sint={0x101}}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @dev}], 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e21, 0x0, @local, 0x9}}, 0x1}, &(0x7f0000000340)=0x90) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x1}) r5 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000240)={r4, 0x0, r5}) getrlimit(0xd, &(0x7f0000000380)) close(r1) socket$netlink(0x10, 0x3, 0x15) syz_read_part_table(0x0, 0x0, &(0x7f0000000140)) r6 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0xfffffffffffff000, 0x8000) ioctl$VT_SETMODE(r6, 0x5602, &(0x7f0000000400)={0x9, 0x3, 0x462e, 0x6d, 0x3}) 17:56:42 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:42 executing program 1: mkdir(0x0, 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 425.677036] device bridge_slave_1 left promiscuous mode [ 425.682689] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.753913] device bridge_slave_0 left promiscuous mode [ 425.763352] bridge0: port 1(bridge_slave_0) entered disabled state 17:56:43 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x0, 0x2) 17:56:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd057729", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:43 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x200000, 0x0) r0 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000040)="296897b3fc288e35475267116087781b40095e51f9af8a636d6fe1dd53ae9c655296f80c29f37db63ef34fde2353bd7c233c17da296dbc2d895ac34cce1a24927ac217f89597066c4edccc2cc11413009829d6311af2e20cd284e08eba08aeaca7badca526d41b97fed4a9af172840ffdca8d743115a60d628413278f6c89fd2eddcb992c81e149127d9c20e0bc9b3ba3b2fedf4a21e389c93785cabd93d1c471de21237bdeabf05bfeae27c30969433f20190", 0xb3) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x276, 0x0, 0x0, 0xfffffe3d) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000000000/0x18000)=nil, 0x0, 0x73, 0x0, 0x0, 0xfffffdb0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @dev}, 0x10) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000140)={0x3f, 0x9, 0x7f, 0x2}) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r3, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r3, 0x80081272, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x401}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffdd4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 17:56:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r1, 0x80081272, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r2, 0x80081272, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000000)={0x8, 0x100, 0x2, 0x0, r2}) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='scalable\x00', 0x9) sendto$inet(r0, &(0x7f0000000100)="bd384ce1f54f7c522811c090bbf4ef7b4926a15e53a1bbb46854e2666d3327c6ae8e714ad8116298b6e23a4b036512e680d8864f6e29ae93b95733e5d0164691a37189b857a07bae4ee2995204e470c4c5ae2742f1a98076174e9420fa41857fbd21c794423e7851022eb84c0059c29ec119542880d2e770e56b498dfc425e4fdc7abdf6be20499b8bb6eb267a31a66c683c0feb6ecc488f3a2dc72e6db795aad7b717787df3b8e32eba76dddafc94c432d52ad8d07cc2cd9e3831e868ed4781c75508b8b07196c7b2", 0x2a4, 0x0, 0x0, 0x3ae) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac623ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a92825a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x104eb, 0x11, 0x0, 0x27) r3 = socket$inet6(0xa, 0x80003, 0xff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") 17:56:43 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 430.148429] device hsr_slave_1 left promiscuous mode [ 430.190764] device hsr_slave_0 left promiscuous mode [ 430.240158] team0 (unregistering): Port device team_slave_1 removed [ 430.253320] team0 (unregistering): Port device team_slave_0 removed [ 430.263910] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 430.320590] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 430.408479] bond0 (unregistering): Released all slaves 17:56:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900efff07000000068100025b0509000100010100ff3fff58", 0x1f}], 0x1) sync() 17:56:47 executing program 2: r0 = userfaultfd(0xc0800) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3800000024000705000000000098a30005000000", @ANYRES32=r7, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@dellink={0x20, 0x11, 0x201, 0x0, 0x0, {0x0, 0x0, 0x0, r7}}, 0x20}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r2, 0x0, 0x3, &(0x7f0000000080)='*-\x00', 0xffffffffffffffff}, 0x30) bind$alg(r2, &(0x7f0000000300)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes128\x00'}, 0x58) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5000200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x3c, 0x11, 0x200, 0x70bd2b, 0x25dfdbfe, {0x7, 0x0, 0x0, r7, 0x20000, 0x200}, [@IFLA_NET_NS_PID={0x8, 0x13, r8}, @IFLA_LINKMODE={0x8, 0x11, 0x1}, @IFLA_PHYS_SWITCH_ID={0xc, 0x24, "509020b5d1b462bd"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x48000}, 0x200088a0) shmctl$SHM_LOCK(0x0, 0xb) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000200)={0x0, 0x0}, 0x10) ioctl$sock_ifreq(r1, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00\x03', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) 17:56:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd057729", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x0, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:47 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x0) 17:56:47 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd057729", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x0) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:48 executing program 5: r0 = socket$kcm(0xa, 0x5, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/27, 0x1b, 0x40000100, &(0x7f0000000040)={0xa, 0x4e22, 0x6, @mcast2, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @local, 0x2}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)='m', 0x4bc}], 0x1}, 0x60) 17:56:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:48 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:49 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xae1d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2a40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200047ff, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000140)) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) r5 = getpid() accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0x195, 0x800) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, 0x0) fgetxattr(r2, &(0x7f00000004c0)=@known='security.apparmor\x00', &(0x7f0000000640)=""/198, 0x241) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x2}}, 0x0) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r8, &(0x7f0000000180)=ANY=[@ANYBLOB="0a0000000100002d42e34b2d618017b4001809"], 0x0) fsetxattr$security_selinux(r8, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:var_log_t:s0\x00', 0x1f, 0x0) tkill(r5, 0x0) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) 17:56:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x0) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:49 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x81) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x7, 0x0, 0x0, [{[@local]}]}]}}}], 0x20}}], 0x3, 0x0) 17:56:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:49 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x0) 17:56:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:49 executing program 5: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7c, 0x8000) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) r1 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) signalfd4(r3, &(0x7f0000000000)={0x3}, 0x8, 0x80000) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000180)={0x53, 0x0, 0x21, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000080)="9d04fecf5805ffa8f7696617e43af229801f5722ea307a4a965b5221bfa9c35563", 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r5 = socket(0xa, 0x1, 0x0) close(r5) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r5, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r7}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r7, 0x1, 0x7}, &(0x7f0000000140)=0xc) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000200)) 17:56:49 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2fc8c420"], 0x1) fallocate(r0, 0x3, 0x0, 0x8020003) 17:56:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x0) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 432.281083] sd 0:0:1:0: [sg0] tag#5267 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 432.289958] sd 0:0:1:0: [sg0] tag#5267 CDB: Service action bidirectional, sa=0x4 [ 432.297661] sd 0:0:1:0: [sg0] tag#5267 CDB[00]: 9d 04 fe cf 58 05 ff a8 f7 69 66 17 e4 3a f2 29 [ 432.306609] sd 0:0:1:0: [sg0] tag#5267 CDB[10]: 80 1f 57 22 ea 30 7a 4a 96 5b 52 21 bf a9 c3 55 [ 432.315581] sd 0:0:1:0: [sg0] tag#5267 CDB[20]: 63 [ 432.363322] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 432.484995] protocol 88fb is buggy, dev hsr_slave_0 [ 432.490156] protocol 88fb is buggy, dev hsr_slave_1 17:56:49 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x2000, 0x20}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [], [0x0, 0x10]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, 0x0) ioctl$PPPIOCGDEBUG(r3, 0x80047441, &(0x7f0000000900)) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r5, 0xffffffc3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) lsetxattr$security_ima(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000880)=@v1={0x2, "1aa83df66feb0c7171751c"}, 0xc, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xf, 0x5, &(0x7f0000000180)=@raw=[@alu={0x4, 0x0, 0x4, 0x3, 0x5, 0x10, 0xfffffffffffffff0}, @ldst={0x0, 0x3, 0x1, 0x6, 0x0, 0x18, 0x4}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xffff545e, 0x0, 0x0, 0x0, 0xf2}], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, [], r5, 0xa, r1, 0x8, &(0x7f0000000240)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x2, 0x9, 0x6}, 0x10}, 0x70) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r1, 0x80081272, 0x0) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f00000008c0)=0x4) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000000)) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0x4010ae42, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000ffb000/0x4000)=nil}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000080)={0x6}, 0x8) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r6, 0xc0f85403, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r7, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r8}}, 0x30) write$RDMA_USER_CM_CMD_MIGRATE_ID(r6, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), r8, r1}}, 0x18) 17:56:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 432.589546] input: syz1 as /devices/virtual/input/input10 17:56:49 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x0) 17:56:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:49 executing program 5: perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9e33703dbc7778cf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='tracefs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0/file0\x00', 0x462400, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[], 0x0) r2 = open(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[], &(0x7f0000000140)) syz_open_dev$sndpcmc(0x0, 0x8, 0x40) open(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)=ANY=[], &(0x7f0000000140)) pipe2$9p(&(0x7f00000005c0), 0xc0000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000600)='/dev/snapshot\x00', 0x202000, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[], &(0x7f0000000140)) write$P9_RREADDIR(0xffffffffffffffff, 0x0, 0xe850f50af522f5d) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x5) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x4) getpid() syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000800450000280000000000069078ac1414bbac1414bb00004e20", @ANYRES32=0x41424344, @ANYRES32=0x42424242, @ANYBLOB="5002ffbb09892701"], 0x0) 17:56:49 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 432.805013] protocol 88fb is buggy, dev hsr_slave_0 [ 432.810239] protocol 88fb is buggy, dev hsr_slave_1 [ 432.816145] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 432.885098] protocol 88fb is buggy, dev hsr_slave_0 [ 432.890248] protocol 88fb is buggy, dev hsr_slave_1 [ 432.903342] input: syz1 as /devices/virtual/input/input11 17:56:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 433.044994] protocol 88fb is buggy, dev hsr_slave_0 [ 433.050214] protocol 88fb is buggy, dev hsr_slave_1 17:56:50 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="736563757269747900000000000000000000100000000000000000000022005b8f2dd300133555541ad2a36ab5471ac8ca"], &(0x7f0000000080)=0x31) r2 = memfd_create(&(0x7f00000007c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\xd7\x8f\x1f\x81\xdc\x1b\x7f\x8f{\xdd\xcc\x8bRA\xda\x89k\xcbO/\xfa\r\xec\xbe\xfa\xcbP\xd8Efn\x00s\xc2Z\f\xcc\x11#\xcd\xfb\x94\xd6>\xb9\xd2\a\xf2tb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x99\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe3X\xc8\x82\xf0j\xd25\xe8$\xdc\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01b3\xd8\xb4CE7s\xe4\xa0u(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00'/302, 0x1) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000180)="715b427cfd65e82c71dbcdd13baa8bb812717cb453929aca9f7b55bd9214292d816c7de073c865c35ae548aae54f1b5914cec088d0f97dabfb70a0e05c1ee9035950a85d59e29821ec55f64c61cd618d2f6c591b94f1fc0f8662426b24630420491c0c71a8", 0x65}, {&(0x7f0000000300)="45713d541631fea9ae2caf8eebb8e1cb450f4895a28452953b85e5feff79941cd9a843473537f2741ad1afb3f35c139c08139939a996d911179fa15ed076ce21d40d5e28af1f4bb0d636366e7c1c38bd", 0x50}, {&(0x7f00000000c0)="b56f26d78338f701c8032ea4b45c59bf39c62d61a3ff04d5d4564afe260161febdf4fcf3f57fb5b66f924e4882075627bd288a530aa75b16991e", 0x3a}], 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0xff) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x4000000) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) pwritev(r3, &(0x7f0000000100)=[{&(0x7f0000000200)="73a2b1fbbf3a35faca34038f6a440f47ef50e08bf6444bcdc4deeca1c98b9b6050889ddd17f6e760119ec05ccb60d1211e05d31c2f1aa48e273a754cb72e5f722800d21e9dcc1666fbc934336859becde68895d05782ea3e39586c8eb510109fa18c2ce76bf4777d6cdc0669e469984b2b710624dad548c1c8712d225ceb7d65ae10ca99222faa4a2b4b3eb7895ec76ffa9918544bebdd178e304d4ae4a11e50f087ddbc7cd3daecd543f2705ce5de3d824ac902313172dd2738cf6de6ac075d4f2fc486923b0a00c2a524557551bc6b3a79e00acae9dbd4c5b0783f55ea42b3b51ff97a7e2507084257014f11", 0xfffffffffffffd12}], 0x1, 0x81809) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'sit0\x00'}) sendfile(r1, r1, 0x0, 0x40fdf) 17:56:50 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 433.185415] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:56:50 executing program 5: sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB='\x00'], 0x1) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x0, 0xfffffffffffffff9, 0x9}) ioctl$BLKGETSIZE64(r1, 0x80081272, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x1000, 0x0, 0xa, 0x2, 0x10, "08cffc8c7fbc3d4e4daadbd57665a843e27d13c247581ab2ccad4d648f88417bec98904ae9762d41478f417f930e30ee121fbe08531e20883288d6a6b2567d2a", "5a625baf0af8d40f1483d5af74d79790a68c9fa0ee6f10a5d9a59b4be0a3951807aeef3223c8969b13a476f963fccfbec446ac2aa5db6884d3230a450ebd489b", "2f22a174b7bad7cfa5250653a695585166b0e387b38c5e7949af017117e49a1d", [0x0, 0x76c8]}) fallocate(r0, 0x3, 0x0, 0x8020003) fcntl$getown(0xffffffffffffffff, 0x9) syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000240)='./bus\x00', 0x9d72, 0x3, &(0x7f0000000480)=[{&(0x7f0000000300)="92f143a64ba3effb829ed77747834f1a9f1ade25fcbd08396717a1dbec6a6a2411df23674ab714eaaa1bbfba4fedd3db27f22c4920b4b1ceb9b93168a300115d4eba334140ee73d31875eeeca48d650d67e9f6b50162f33d2aef7fdf3329442c55fba082a9bc20f87d7a27e06145521c265f828dd7b43bc66dca8accf70ad0d0143de6c6971ee85afd6549ac75ba117e039676aac5c61fcfb98fab61aab126849ee73d1873231858c9f5b446ecabc63e1dea11ec1b5af3f35a8b2cd5d4afaa31dda062bd859429183ba18b094c21adb83ea8added05709d43bc7680de7daf132c108", 0xe2, 0xffffffffffffffe1}, {&(0x7f0000000280)="b62f436c72324157c50edaebf36e47d3d130c524b65889e0aa41", 0x1a, 0xffff}, {&(0x7f0000000400)="4b712a54e1604d6b124171d5525d67408b27616a457067d114b59a10a217fbb37f7bffca104c32e2625dcdda50a555f0a68a98a8624612ecce94880bf5c9263dd7d1cad8ca5fd247f709d07095ea8fd5ab65e7b3eb22a4f03716369149323a6d767bbe93bea5bd2f4b0ff9cd353169144fa9a61cbfdb245f169be43033", 0x7d, 0x80000000}], 0x40, &(0x7f0000000500)='\x00') 17:56:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:50 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:50 executing program 2: prctl$PR_SET_SECUREBITS(0x1c, 0x21) open(&(0x7f0000000080)='./file0\x00', 0x8440, 0x129) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x7) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) [ 433.765069] protocol 88fb is buggy, dev hsr_slave_0 [ 433.770231] protocol 88fb is buggy, dev hsr_slave_1 17:56:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) ftruncate(r2, 0x3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000180)=ANY=[], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x4e4, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffd}}, 0x48) r5 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f000031aff8)={r3, r4}) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r8 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r8, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r8, 0x80081272, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r8, 0x6612) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, 0x0) sendmmsg$inet(r7, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000400), 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x1}], 0x34}}], 0x2, 0x4000) 17:56:51 executing program 0 (fault-call:9 fault-nth:0): pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740), 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 434.060100] FAULT_INJECTION: forcing a failure. [ 434.060100] name failslab, interval 1, probability 0, space 0, times 1 17:56:51 executing program 2: r0 = socket(0x10, 0x80002, 0xc) socket(0x0, 0x800, 0x17) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[]}}, 0x0) r1 = socket$inet6(0xa, 0x80003, 0xff) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x440880) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0x484, &(0x7f0000000300)=""/112, &(0x7f0000000000)=0x70) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x3) msgget$private(0x0, 0x68c) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimensat(r4, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={{r5, r6/1000+10000}, {r7, r8/1000+10000}}, 0x100) ioctl$BLKGETSIZE64(r2, 0x80081272, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xc9b) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmmsg$alg(r0, &(0x7f0000000140), 0xffffffffffffff68, 0x0) [ 434.141514] CPU: 1 PID: 14022 Comm: syz-executor.0 Not tainted 4.19.86-syzkaller #0 [ 434.149398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.158811] Call Trace: [ 434.161447] dump_stack+0x197/0x210 [ 434.165213] should_fail.cold+0xa/0x1b [ 434.169144] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 434.174275] ? lock_downgrade+0x880/0x880 [ 434.178794] __should_failslab+0x121/0x190 [ 434.183042] should_failslab+0x9/0x14 [ 434.186857] kmem_cache_alloc_node_trace+0x274/0x720 [ 434.191971] ? _raw_spin_unlock_bh+0x31/0x40 [ 434.196393] ? release_sock+0x156/0x1c0 [ 434.200454] __get_vm_area_node+0x12b/0x3a0 [ 434.204794] __vmalloc_node_range+0xc7/0x790 [ 434.209279] ? netlink_sendmsg+0x640/0xd70 [ 434.213534] ? netlink_sendmsg+0x640/0xd70 [ 434.217788] vmalloc+0x6b/0x90 [ 434.220988] ? netlink_sendmsg+0x640/0xd70 [ 434.225229] netlink_sendmsg+0x640/0xd70 [ 434.229303] ? netlink_unicast+0x720/0x720 [ 434.233659] ? selinux_socket_sendmsg+0x36/0x40 [ 434.238339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.243967] ? security_socket_sendmsg+0x8d/0xc0 [ 434.248730] ? netlink_unicast+0x720/0x720 [ 434.252976] sock_sendmsg+0xd7/0x130 [ 434.256700] kernel_sendmsg+0x44/0x50 [ 434.260511] sock_no_sendpage+0x116/0x150 [ 434.264669] ? sock_kfree_s+0x70/0x70 [ 434.268495] ? lock_acquire+0x16f/0x3f0 [ 434.272533] ? pipe_lock+0x6e/0x80 [ 434.276101] kernel_sendpage+0x92/0xf0 [ 434.279999] ? sock_kfree_s+0x70/0x70 [ 434.283811] sock_sendpage+0x8b/0xc0 [ 434.287598] pipe_to_sendpage+0x296/0x360 [ 434.291756] ? kernel_sendpage+0xf0/0xf0 [ 434.295830] ? direct_splice_actor+0x190/0x190 [ 434.300421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.305969] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 434.311347] __splice_from_pipe+0x391/0x7d0 [ 434.315687] ? direct_splice_actor+0x190/0x190 [ 434.320290] ? direct_splice_actor+0x190/0x190 [ 434.324886] splice_from_pipe+0x108/0x170 [ 434.329046] ? splice_shrink_spd+0xd0/0xd0 [ 434.333315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.338876] ? security_file_permission+0x89/0x230 [ 434.343830] generic_splice_sendpage+0x3c/0x50 [ 434.348429] ? splice_from_pipe+0x170/0x170 [ 434.352765] do_splice+0x642/0x12c0 [ 434.356415] ? opipe_prep.part.0+0x2d0/0x2d0 [ 434.360873] ? __fget_light+0x1a9/0x230 [ 434.364870] __x64_sys_splice+0x2c6/0x330 [ 434.369045] do_syscall_64+0xfd/0x620 [ 434.372863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.378068] RIP: 0033:0x45a639 [ 434.381300] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.400216] RSP: 002b:00007fe8ffaf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 434.407945] RAX: ffffffffffffffda RBX: 00007fe8ffaf3c90 RCX: 000000000045a639 [ 434.415235] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000003 [ 434.422517] RBP: 000000000075bfc8 R08: 00000000ffffffff R09: 0000000000000002 [ 434.429823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe8ffaf46d4 17:56:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 434.437112] R13: 00000000004ca797 R14: 00000000004e1bd8 R15: 0000000000000009 17:56:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x4}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 434.531867] IPVS: length: 112 != 24 [ 434.575769] syz-executor.0: vmalloc: allocation failure: 4416 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 434.604148] IPVS: length: 112 != 24 [ 434.607655] syz-executor.0 cpuset=syz0 mems_allowed=0-1 [ 434.642382] CPU: 0 PID: 14022 Comm: syz-executor.0 Not tainted 4.19.86-syzkaller #0 [ 434.650284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.659655] Call Trace: [ 434.662268] dump_stack+0x197/0x210 [ 434.665934] warn_alloc.cold+0x7b/0x173 [ 434.669959] ? zone_watermark_ok_safe+0x260/0x260 [ 434.669977] ? __get_vm_area_node+0x12b/0x3a0 [ 434.669993] ? rcu_read_lock_sched_held+0x110/0x130 [ 434.670013] ? __get_vm_area_node+0x2df/0x3a0 17:56:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:51 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740), 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 434.670033] __vmalloc_node_range+0x486/0x790 [ 434.679687] ? netlink_sendmsg+0x640/0xd70 [ 434.679707] vmalloc+0x6b/0x90 [ 434.701198] ? netlink_sendmsg+0x640/0xd70 [ 434.705458] netlink_sendmsg+0x640/0xd70 [ 434.709548] ? netlink_unicast+0x720/0x720 [ 434.713807] ? selinux_socket_sendmsg+0x36/0x40 [ 434.718499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.724063] ? security_socket_sendmsg+0x8d/0xc0 [ 434.728842] ? netlink_unicast+0x720/0x720 [ 434.733101] sock_sendmsg+0xd7/0x130 [ 434.736832] kernel_sendmsg+0x44/0x50 17:56:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 434.740653] sock_no_sendpage+0x116/0x150 [ 434.744825] ? sock_kfree_s+0x70/0x70 [ 434.748659] ? lock_acquire+0x16f/0x3f0 [ 434.752650] ? pipe_lock+0x6e/0x80 [ 434.756209] kernel_sendpage+0x92/0xf0 [ 434.760152] ? sock_kfree_s+0x70/0x70 [ 434.763971] sock_sendpage+0x8b/0xc0 [ 434.767717] pipe_to_sendpage+0x296/0x360 [ 434.771894] ? kernel_sendpage+0xf0/0xf0 [ 434.775979] ? direct_splice_actor+0x190/0x190 [ 434.780587] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.786150] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 434.791538] __splice_from_pipe+0x391/0x7d0 [ 434.791557] ? direct_splice_actor+0x190/0x190 [ 434.800473] ? direct_splice_actor+0x190/0x190 [ 434.800492] splice_from_pipe+0x108/0x170 [ 434.810365] ? splice_shrink_spd+0xd0/0xd0 [ 434.814624] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.820187] ? security_file_permission+0x89/0x230 [ 434.825141] generic_splice_sendpage+0x3c/0x50 [ 434.829746] ? splice_from_pipe+0x170/0x170 [ 434.834084] do_splice+0x642/0x12c0 [ 434.837747] ? opipe_prep.part.0+0x2d0/0x2d0 [ 434.843142] ? __fget_light+0x1a9/0x230 [ 434.847139] __x64_sys_splice+0x2c6/0x330 [ 434.851318] do_syscall_64+0xfd/0x620 [ 434.855141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.860341] RIP: 0033:0x45a639 [ 434.863551] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.882477] RSP: 002b:00007fe8ffaf3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 434.890224] RAX: ffffffffffffffda RBX: 00007fe8ffaf3c90 RCX: 000000000045a639 [ 434.897522] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 0000000000000003 [ 434.904817] RBP: 000000000075bfc8 R08: 00000000ffffffff R09: 0000000000000002 [ 434.912109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe8ffaf46d4 [ 434.919402] R13: 00000000004ca797 R14: 00000000004e1bd8 R15: 0000000000000009 17:56:52 executing program 2: syz_read_part_table(0x0, 0xaaaaaaaaaaaac47, &(0x7f0000000080)=[{&(0x7f0000000000)="0201540000000a000000ff07000000ffffffa6000800000000000000004000ffffffa9000000e1000000887700720030b5829237c30000000000008000da55aa", 0x40, 0x1c0}]) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:56:52 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0xa725, 0x80) setsockopt$sock_void(r1, 0x1, 0x61, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ptrace(0x8, r4) r5 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x29c) open_by_handle_at(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="992421f0cbb19eeea4c72e839ff9f9d669f178089788b45d520e41661e8cbb86c501427b37a5ba72b7de53f9f38435a5492c747f21ef0fd8b01910f4b0bec24145f7828d1742e5daecc899c3808451cf160a9de6f2cbb1cf88b46c55c7d7b969b110780ecbf55c78b7804c0168add72e746fea43d82d8f03992fd5f24e18bad6699d440accae5b5c42533110d9c15c9eed47eee91878ac797ed0627c20e5afd253e15962691f1bdb25509ac3595135dd96d389c88ccb7017934a1903e5175ec00008000000000000ed4201741fb4b4e68740e83c29cb05f7f8d920828c8ea5202c834549de767f"], 0x0) ioctl$BLKDISCARD(r5, 0x1277, &(0x7f00000001c0)=0xffffffff7fffffff) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={0x0}, &(0x7f0000000300)=0xc) r8 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r8, 0xc0f85403, 0x0) r9 = getpid() r10 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r10, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xfffffe5f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r9, r10, 0x0, 0x8, &(0x7f0000000080)='keyring\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r4, r8, 0x0, 0x19, &(0x7f0000000340)='cpusetsystemtrusted\\user\x00', r11}, 0x30) r13 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r13, 0xc0f85403, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f0000000440)={0x0, 0x2}) kcmp$KCMP_EPOLL_TFD(r7, r12, 0x7, r0, &(0x7f00000003c0)={r0, r13, 0x1}) 17:56:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 435.272219] loop2: p1[DM] p2 p3 p4 [ 435.276059] loop2: partition table partially beyond EOD, truncated [ 435.315564] loop2: p1 start 10 is beyond EOD, truncated [ 435.326955] loop2: p2 size 1073741824 extends beyond EOD, truncated [ 435.356049] loop2: p3 start 225 is beyond EOD, truncated [ 435.361653] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 435.665354] Mem-Info: [ 435.667869] active_anon:208015 inactive_anon:255 isolated_anon:0 [ 435.667869] active_file:12946 inactive_file:36229 isolated_file:0 [ 435.667869] unevictable:0 dirty:190 writeback:0 unstable:0 [ 435.667869] slab_reclaimable:14367 slab_unreclaimable:114934 [ 435.667869] mapped:59327 shmem:321 pagetables:1589 bounce:0 [ 435.667869] free:1141573 free_pcp:692 free_cma:0 [ 435.744980] Node 0 active_anon:832060kB inactive_anon:1020kB active_file:51644kB inactive_file:144916kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:237308kB dirty:756kB writeback:0kB shmem:1284kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 100352kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 435.850908] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 435.878018] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 435.904829] lowmem_reserve[]: 0 2555 2557 2557 [ 435.909647] Node 0 DMA32 free:766500kB min:36248kB low:45308kB high:54368kB active_anon:832108kB inactive_anon:1020kB active_file:51644kB inactive_file:144952kB unevictable:0kB writepending:796kB present:3129332kB managed:2619980kB mlocked:0kB kernel_stack:7936kB pagetables:6240kB bounce:0kB free_pcp:2612kB local_pcp:1440kB free_cma:0kB [ 435.941253] lowmem_reserve[]: 0 0 2 2 [ 435.945159] Node 0 Normal free:12kB min:32kB low:40kB high:48kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2428kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 435.971170] lowmem_reserve[]: 0 0 0 0 [ 435.975050] Node 1 Normal free:3783904kB min:53608kB low:67008kB high:80408kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870180kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 436.002735] lowmem_reserve[]: 0 0 0 0 [ 436.006681] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 436.020399] Node 0 DMA32: 299*4kB (UME) 365*8kB (UM) 179*16kB (UM) 55*32kB (UM) 12*64kB (UM) 238*128kB (UM) 32*256kB (UME) 15*512kB (UME) 10*1024kB (UM) 6*2048kB (UM) 168*4096kB (M) = 766500kB [ 436.039100] Node 0 Normal: 1*4kB (U) 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 12kB [ 436.050690] Node 1 Normal: 64*4kB (UME) 252*8kB (UM) 274*16kB (UME) 53*32kB (UE) 13*64kB (UME) 8*128kB (U) 5*256kB (UM) 6*512kB (UME) 3*1024kB (UM) 1*2048kB (E) 919*4096kB (M) = 3783904kB [ 436.067755] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 436.076673] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 436.085374] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 17:56:53 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:56:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740), 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:53 executing program 5: getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0xe9484f786a3bb8e4, &(0x7f00000010c0), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0)="240000001a0025f00485bc04fef7001d020b49ffed00000080032800080003000100", 0x22) r0 = socket(0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0x1, 0x0, 0x204, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000240)={r1}, 0x8) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f00000001c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = accept4(r3, &(0x7f0000001140)=@alg, &(0x7f00000011c0)=0x80, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) r6 = socket$inet6(0xa, 0x40000000000001, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) listen(r6, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000000080)=0x9, 0x4) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, 0x0, 0x0) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, &(0x7f0000a8a000)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x7a, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000540), &(0x7f0000000580)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000080)=@sack_info={0x0, 0xffff, 0x7}, &(0x7f0000001240)=0xc) pipe(&(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000cf6fe4), 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x3ff}, 0x8) r11 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r11, 0x1000008912, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) r13 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r13, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r13, 0x80081272, 0x0) ioctl(r0, 0x0, &(0x7f0000000100)="0840a0695e1d81d8cb37476080d5") r14 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r14, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r14, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(0xffffffffffffffff, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") epoll_ctl$EPOLL_CTL_DEL(r10, 0x2, 0xffffffffffffffff) r15 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r15, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r15, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r12, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000300)=[{0x7f, 0x3, 0x20, 0x5}, {0x8e87, 0x3f, 0x5, 0x6}, {0x3, 0x0, 0x7, 0xfffeffff}, {0x401f, 0x0, 0x3, 0x800000}, {0xff, 0x5, 0x6, 0x608}, {0x6, 0xa3, 0x7f, 0x4}, {0x3, 0x3e, 0x2, 0x34eb9a0b}, {0x400, 0xfc, 0x1, 0x8}]}, 0x162) sendto$inet(r15, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r15, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r15, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r15, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 17:56:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGREP(r0, 0x80084503, 0x0) r4 = add_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="7833f9071c01b0517ab08fe351ba7162c92d8dbc0e88657ca94b4af2ad96d9981a25bdaf7c834a6bdd9aa18c45aaa7fd8cc1bb140342ee7e4d311d86f0ed", 0x3e, 0xfffffffffffffffd) r5 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r6 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r7 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="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", 0x11d, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r5, r7}, 0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={'tgr128-generic\x00'}}) keyctl$instantiate_iov(0x14, r4, &(0x7f0000000200)=[{&(0x7f00000001c0)="82c7bcffff513553b3ae1375465d342b", 0x10}], 0x1, r7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r10 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r10, 0xc0f85403, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r10, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0xffffffffffffff3e) r11 = dup2(r8, r9) sendmsg$TIPC_NL_PEER_REMOVE(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu/syz0\x00', 0x1ff) r12 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r12, 0xc0f85403, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r12, 0xc02c5341, &(0x7f0000000400)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 436.094228] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 436.102962] 49500 total pagecache pages [ 436.107031] 0 pages in swap cache [ 436.110482] Swap cache stats: add 0, delete 0, find 0/0 [ 436.115898] Free swap = 0kB [ 436.118920] Total swap = 0kB [ 436.121932] 1965979 pages RAM [ 436.125088] 0 pages HighMem/MovableOnly [ 436.129129] 338855 pages reserved [ 436.132594] 0 pages cma reserved 17:56:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{0x0}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:53 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{0x0}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:54 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x100000, 0x2) 17:56:54 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r3, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r3, 0x80081272, 0x0) ioctl$IMCTRLREQ(r3, 0x80044945, &(0x7f0000000100)={0x8, 0x2, 0x5, 0x5}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x4e21, @broadcast}, {0x6, @random="e286e7fa95c0"}, 0x20, {0x2, 0x4e20, @broadcast}, 'lo\x00'}) syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0xfffffffffffffdc0, 0x11, 0x0, @ipv4={[0xb, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x11, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 17:56:54 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{0x0}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 437.925049] net_ratelimit: 26 callbacks suppressed [ 437.925059] protocol 88fb is buggy, dev hsr_slave_0 [ 437.935196] protocol 88fb is buggy, dev hsr_slave_1 [ 438.015013] protocol 88fb is buggy, dev hsr_slave_0 [ 438.020240] protocol 88fb is buggy, dev hsr_slave_1 [ 438.565008] protocol 88fb is buggy, dev hsr_slave_0 [ 438.570233] protocol 88fb is buggy, dev hsr_slave_1 17:56:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:55 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:55 executing program 5: syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap$usbmon(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x810, r2, 0x4) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r3, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 17:56:55 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x1000000, 0x2) 17:56:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 438.724999] protocol 88fb is buggy, dev hsr_slave_0 [ 438.730173] protocol 88fb is buggy, dev hsr_slave_1 17:56:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:56:56 executing program 2: mkdir(0x0, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) pivot_root(0x0, 0x0) accept$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x0) socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) gettid() r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x200, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000440)={0x0, @local, @loopback}, &(0x7f0000000480)=0xc) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079bbd1932a"], 0x48}}, 0x0) r10 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r10, 0xc0f85403, 0x0) sendmsg$nl_route(r6, &(0x7f0000000240)={0x0, 0xfffffffffffffd67, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRES16=r6, @ANYRES32=r9, @ANYRES64=0x0, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYRESOCT=r6, @ANYRES16=0x0, @ANYRES32=r1, @ANYRES16=r10, @ANYRES64, @ANYRESDEC, @ANYPTR]]], 0x3}, 0x1, 0x0, 0x0, 0x2263d5d09a390aa}, 0x0) r11 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r11, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r11, 0x80081272, 0x0) getpeername$packet(r11, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffeba}}, 0x40044) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000010000507000000000f00000000000000", @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r13, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r19 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r19, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r20, 0xffffffc3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) r21 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r21, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r21, 0x80081272, 0x0) getsockopt$inet6_mreq(r21, 0x29, 0x14, &(0x7f00000005c0)={@rand_addr, 0x0}, &(0x7f0000000600)=0x14) r23 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r23, 0xc0f85403, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000100), 0xc, &(0x7f0000000940)={&(0x7f00000006c0)={0x26c, 0x0, 0x10, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x900}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r16}, {0x1c0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x7, 0x20, 0xfc, 0x81}, {0x8, 0x7f, 0x1, 0x2}, {0x7, 0x20, 0x4, 0x3}, {0x9, 0x4, 0x5, 0xfffffffa}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}]}, 0x26c}, 0x1, 0x0, 0x0, 0x805}, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) 17:56:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 439.045046] protocol 88fb is buggy, dev hsr_slave_0 [ 439.050248] protocol 88fb is buggy, dev hsr_slave_1 17:56:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 439.121897] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 439.198603] IPVS: ftp: loaded support on port[0] = 21 17:56:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 17:56:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:56 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 17:56:56 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x3f000000, 0x2) [ 440.935997] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 441.218986] IPVS: ftp: loaded support on port[0] = 21 [ 441.321487] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 17:56:59 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, 0x0, 0x0) 17:56:59 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000300)={@remote}, 0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") sendto$inet6(r0, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$sock_bt_hci(r2, 0x400448e0, &(0x7f0000000180)="26ecd19de982d223e05b9739bb110710a59252cbddefccba3fe7e9c5e6affb27db3c997184aa19f94db2e65cc3139485a63d06900da12804282f7b089bfea1fd9d4ab2ad9c5255d7092f52f005de29236df352f8160ffff15805aaddf204ebbc694b929c7d7cc5de186942009d9b808da67aaf1bc04c5bcb15c63de2a2ba6084c9d01c405048ae7c80b9664f87ae1016a1ae620fd211eead1c09aa5d8230c05ab4128644f28e93605e78f900f842caa631") setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 17:56:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:56:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:56:59 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x3) 17:56:59 executing program 2: r0 = socket$inet6(0xa, 0x4, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000100)="0000003f0000007e5bc5795ecaff", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000180)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, 'syz0\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x3, 0x0, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) 17:57:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x5}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x0, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:00 executing program 5: syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{0x0, 0x0, 0x10001}, {&(0x7f0000000000)="58465342b8fcc985d7b4da083486de036edf1937b66ac4de6a1935fd765a45ce406ca916ab45aaccb6803bed3f5157ef00deef11d73fd3cb00761e1aa85ca187641218c2a06ffcd45bf7d790592d42e7d64b06bf54a040287f84945393646bb0e30747738ec4e4", 0x67}], 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='\xda\xa1\xf75\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000001c0)={0x1, 0xa, 0x4, 0x2000000, {r1, r2/1000+30000}, {0x4, 0x1, 0x7, 0xa1, 0x7, 0x20, "46df2421"}, 0xc47d, 0x2, @fd=0xffffffffffffffff, 0xfffffffffffffcff}) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$DRM_IOCTL_AGP_RELEASE(r0, 0x6431) 17:57:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:00 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x7f\xef\x00\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r2, &(0x7f0000000380), 0xfffffffe) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x8000, 0x0) 17:57:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x0, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 443.205070] net_ratelimit: 26 callbacks suppressed [ 443.205080] protocol 88fb is buggy, dev hsr_slave_0 [ 443.210137] protocol 88fb is buggy, dev hsr_slave_1 [ 443.241903] XFS (loop5): bad version [ 443.246405] XFS (loop5): SB validate failed with error -22. [ 443.256179] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 443.285014] protocol 88fb is buggy, dev hsr_slave_0 [ 443.290210] protocol 88fb is buggy, dev hsr_slave_1 17:57:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 443.466611] protocol 88fb is buggy, dev hsr_slave_0 [ 443.471745] protocol 88fb is buggy, dev hsr_slave_1 17:57:00 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x0, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:00 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:00 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x18d3f4) 17:57:00 executing program 5: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f00000005c0)='./file0\x00', 0xd54e, 0x6, &(0x7f00000019c0)=[{&(0x7f0000000600)="705e8780522d66a1811e9a3e6430946be78e216e39d0a2871eae3ab57efd2521770842addb68523f257997de4f7e5009cd42d6a66a78bcdaec440d2986af081415a28dd147ac633244e45e42321ff97e62d1ba83499603e20f8831f2ad22a2b803a2087fa9e17202604ae0b93b0a7430901f704d3d6d6d835fcdd7a74936c270aa8b8638377479803cae1826b0eb1490aef6e1504fd4137610cde418f4eddd3c13548a46b8283822a9ce5194468984980aff22445ae68ca0e679dd9d0c633bbe4ee20a70ee7c4b65b6206205318ca4af5e6883d73a5a", 0xd6, 0x9}, {&(0x7f0000000700)="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", 0x1000, 0x1}, {&(0x7f0000001700)="e508936433ddf835cef7243649f086976ad8558d7db32aba17bb899e9f792b2268a6ceddcbf96bed7f9ea92e5508b04aee0e3a2777aa177776eb5aec18ebc93be41769179a69486aa78174e3ab7d8531b1b05b80a10a0e5ab013e72f297e9c6d24e4bf4d4ce51187293324e234cbc0affc52e8c67968c3c1f822c7ca9b6d0be6347984ec9feaa379692fa9ac91300dc021a1efd43dd08bef5bb6c90ae0b99946ef1133", 0xa3, 0x8}, {&(0x7f00000017c0)="3ad94c08fd0a54a2a668d2928950460e2286bb46de6d8882c481f4699f3f34bd8d2589d276f896245782c6e13f25bf7424a35639baac0716f93a83de5c8282277ecbe6eb3d8481b069bdbe37aa93c87ff945afc361311bc94e925659c906b978b073d666bb7d47c05024d75339cd33cdbcb9a086fbe26d0badf3fa0ee9c66989e7f166f59afd0bd10e1a7fc64dc8a6a6308858055a0b06b3e33b81dc66a2afd7", 0xa0, 0x1}, {&(0x7f0000001880)="16bd2b2011668707c71390", 0xb, 0x100000000}, {&(0x7f00000018c0)="9d877173264e50d28e49b6498d00295cdab741446a1bbc6d2db220748763073aee13a6b04600a74342f64941036ca994527c5705442b153c66997a9cabfee48cc360aa944a48f58ecd58b5f1b84b7886fd19bcfada6bab3ef68ca8a03f727a02b266b1b8f67de96ec064b429efc4164a9938b71de966851da2dc10c7b40ccb7f30db98b1b3d741a3b27e15a36ba39a2273001c1709e1e94e209d9e59b2d7800e669e3052b13493a651b91033651b8ade58aefde20c0aedc06958e2681e49447dc057d134d2d0068b5624ceea6a743814a77dece486", 0xd5, 0x3}], 0x2084, &(0x7f0000001a80)={[{@fat=@usefree='usefree'}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x37, 0x33, 0x0, 0x64, 0x31, 0x63, 0x7d4c2bdf8df1f0c6, 0x64], 0x2d, [0x0, 0x3a, 0x61, 0x63], 0x2d, [0x38, 0x38, 0x62, 0xc6], 0x2d, [0x57a90097a4031b01, 0x65, 0x39, 0x63], 0x2d, [0x33, 0x37, 0x64, 0x30, 0x65, 0x61, 0xefde264e5b0469f3, 0x63]}}}, {@uid_gt={'uid>', r3}}]}) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000040), &(0x7f0000000080)=0x4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80006, 0x0) write$uinput_user_dev(r5, &(0x7f0000000140)={'\x04yz0\x05\xf0\x00\x00\x00\x80\xff\xff\xff\n\x00\x00\xfe\xff\xff\xff\x00\x00\x00\x00\x05\xbf\x00\x00\x05\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00'}, 0x45c) [ 443.643511] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8}}, 0x50) 17:57:01 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000040)={{0x0, 0x0, @descriptor="52f34da4c2dca227"}}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b502000010000800"/20, @ANYRES32=0x0, @ANYBLOB="020000b5e4000000"], 0x3c}}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x21, "77b7de00071ffdcf54c4d0f0c2200a01817c45fc111c410df17501464615108c23"}, &(0x7f0000000140)=0x29) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000001c0)={r3, 0xe, "619b667a05ca0c6ae14125d10115"}, &(0x7f0000000200)=0x16) ioctl$BLKGETSIZE64(r2, 0x80081272, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000080)={0x58, 0xf29d, 0xa, 0x90, 0x56f80000000000, 0x81}) [ 444.006633] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0xfffffffffffffe31) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r3, 0xffffffc3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@ipv4_getaddr={0x98, 0x16, 0x4, 0x70bd28, 0x25dfdbfe, {0x2, 0xae, 0x2, 0x0, r3}, [@IFA_LABEL={0x14, 0x3, 'nr0\x00'}, @IFA_LOCAL={0x8, 0x2, @rand_addr=0x7}, @IFA_LABEL={0x14, 0x3, 'veth1_to_bridge\x00'}, @IFA_CACHEINFO={0x14, 0x6, {0x6, 0x9, 0x80, 0x8}}, @IFA_CACHEINFO={0x14, 0x6, {0x6, 0x4, 0x7fff, 0xffff}}, @IFA_LABEL={0x14, 0x3, 'ipddp0\x00'}, @IFA_LABEL={0x14, 0x3, 'vxcan1\x00'}]}, 0x98}}, 0x0) [ 444.243922] protocol 88fb is buggy, dev hsr_slave_0 [ 444.244966] protocol 88fb is buggy, dev hsr_slave_0 [ 444.249081] protocol 88fb is buggy, dev hsr_slave_1 [ 444.254114] protocol 88fb is buggy, dev hsr_slave_1 17:57:01 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x208000, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="6c6b1977557c8060364a388bfc578df66b") r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) r1 = dup(r0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.metacopy\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b0b, &(0x7f0000000000)='wlan0\x00') openat$mixer(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, 0x0) write$ppp(r3, &(0x7f0000000180)="9f16b2f7b5cb60e0fc2f36b45909533f2320556672c026d63c565a63db22d34f66e684f344e3883ca4c6af9db1678bb42ac087741851804f263a19a7ddb5e4ab20e460e503f14ebb6cf9ce6f00d1d4f0351b2c596be2af2aeb2e7aab610555931e6c3591ac217b84398e09277ef1de0dcff277e37e3875935fa4f90081d3233f6af8438f2cb9a2b450d4ab620315", 0x8e) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r2, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r2, 0x80081272, 0x0) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000140)='batadv0\x00') 17:57:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:57:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8}}, 0x50) 17:57:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 444.469198] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:01 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2b2, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000800)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff13007b6b4816122d2550829eaa9435c999f7009bee59ca6726022b8753a088748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d275890b325561f6110fd7b0643d476574c0547bd55c550c3ceeabd0953a48a812079563018fd7d089bc0045d843800cc2ea448fb633ca22b827c0c520958c74955ebb814c46cc68b7ef0ee08278b256f535c76ebcc111ade44519498625c9deb2b8d0c87cc16e0e685fd53a966fd732099a0e4d3f5f3cfb2fa4aa84bda", 0x11d, 0xfffffffffffffffe) r2 = request_key(0x0, &(0x7f0000000500)={'syz', 0x3}, &(0x7f0000000540)='system.posix_acl_default\x00', 0xffffffffffffffff) keyctl$negate(0xd, r2, 0x3, 0x0) r3 = add_key$user(&(0x7f0000000580)='user\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)="fdf5ffd563aece6502c0d3098dbeab13412a5d5a29e6a4014da602962e26b73d857573a0ee8dc90665f2c74495e31e54496e65aae7a427b39259c0f35728e5f34ce51dbdc0da7d6e937151be913c504f6c5234bf04494f", 0x57, r2) keyctl$dh_compute(0x17, &(0x7f00000006c0)={r1, r3}, 0x0, 0x41, &(0x7f0000000500)={&(0x7f0000000540)={'tgr128-generic\x00'}, 0x0, 0xffffffffffffff12}) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000440)={r0, 0xc2, 0x2c}, &(0x7f0000000140)={'enc=', 'pkcs1', ' hash=', {'sha384-ce\x00'}}, &(0x7f0000000240)="f1ea8dbd82b69e3dbda40ece43a366a1c106568f425cb492d784a867fabb007f0960aa5e8bd78a7ca2b80afdf6292be4d2397a14b1510f7bbb08853832abe4308f489d665a2629758f837fedc872c52339bbc8b41d9fb709670a28af150990836f0ebcc3aba4f5749c339d79e640589d729072e367d8f63cf437bacc012d9dbc50bfa6b88e5c7fdac512f30da5789444130baf7b776f38bb659c2214709a4706790e3fc3770360e8076e1a94af3950830c7add83d645d4419d5109abfed3f26553aa", &(0x7f00000000c0)=""/44) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000200)="25bca274769e6202a734fa0095e0610687463915e38802a9d8aea872943afd874e2f98b479a7316270146d0e02f8e63ba8863cd7dcc6760253ef", 0x3a, 0x400}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="6a6f75726ead0000006f707269144a0ff48a716ab9cc339fa337b6f70d6f3dbd003030c1462d7999143030303030303030303030302730"]) 17:57:01 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8}}, 0x50) 17:57:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:57:01 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x800, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000240)=0x0) io_submit(r6, 0x2, &(0x7f00000002c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x0, r4, 0x0}]) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r7) r8 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r8, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r8, 0x80081272, 0x0) io_submit(r6, 0x1, &(0x7f0000000280)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0xfe1, r7, &(0x7f0000000180)="714ac804787a64bd76c82bb6fb8d66bd380dbed4b51d00b8646959f865535d7812bcf8586d31b1aa4c4b330842ba9b8b99103253c0fd84be0cc6c187ca77bbbbd5d98dacd8673f35689814a72e7f39aa26774f0e3e16ad6dca47d346d8fd60adcc2b91ebab02541982c9b51f2dc0464dad1ac7d0a23ccbf8e26b0242599ddfd75190a1303802f76af553eb0a56093a85b7febf089c28d76e9c71b1c493efe5e7e86ea870e5122ad605", 0xa9, 0x80, 0x0, 0x2, r8}]) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) r9 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r9, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r9, 0x80081272, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0xfffffffffffffff7) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r10, 0x0, 0x300000003, 0x2) 17:57:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(0x0, 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 444.656380] EXT4-fs (loop5): Unrecognized mount option "journ­" or missing value [ 444.781234] EXT4-fs (loop5): Unrecognized mount option "journ­" or missing value 17:57:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x9) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond0\x00', 0x0}) ioctl(0xffffffffffffffff, 0xcc, &(0x7f0000000280)="6965daa9c12c79dca03053b9be84a4dc7f3c75943c1428a79ebb7321fc86cfd4cda406bb75156b045ab547b27b895222d8305a890e7d1a7aa79bfb6c61062099be4d55a4e573ff60b025c46a21494a2ad324405a9447a1194d565ca466019a65ad30222f81802a03d817e5023cf5597ed9d9875d5e5719e10f080a6597646e1a3c63bf5ecd6e6e8564e87dd04ca04c0f4be0d5ba7310e02ccb81bafb157b847a398b6603f29df2d414b8d8d2fe5d7ebf6b51936312b9f069a0a7a6290e33e04d1bdcad10628a8f005be34f832fcd9a3ab4d65dfaaa692219fdb73065a8") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x6c00, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="740000002400f30700000000ddffffff00000000", @ANYRES32=r1, @ANYBLOB="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"], 0x74}}, 0x0) r2 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r2, &(0x7f0000000180)=[{0xa, 0x1000000000000, &(0x7f0000000100)=[{&(0x7f0000000040)="e588da94b522c2d1f313702948718f407fe7166ac45a790cd2065b44582f3310fb003cb29f9afc1ddb6272a61982d91403b9914e7638a71eab73d729de3c717034a0069e9ed7d8d5fa1979ad04faed8aeb63cac0ab9a4d2927d53b44ef0f6eb8b357571086780d116f40c92841c5a3d72ac31d7abedde3433aa57b7fefb2a6e25f68b39642e8ed4cba1d481661ba"}, {&(0x7f0000000600)="a175aecfc133f10e8096d588d507cb2369905aafe9156c60719627564d1f5841ed3912a4b4d6372b4d52111e6d26ae638675c823527d292fb9cfb0691358daaeed278a87b98817f0efa445e1e8110e40b7979829311002818ea4bfa43e186dbdf71f761f261789a4e4063b30213fc8674cff946703b49ecc157cd063ec3bf08b8f75365561ef81b12e6d77479cb6fba9e4a0e862fe0729da03403caa9b02aff1a185885195"}], 0xe, &(0x7f0000000100)}], 0x126618d46e7cf97, 0x0) [ 444.830018] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:02 executing program 3 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:02 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x90) setsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000140), 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000001ed4434e00a642e8377866532fb6a20000379ad11c041db8359764c119aa89c3ce0a4f977108d7674f050d64d0daeb939713ab1e5c968564fb9353195a7a5b7bd792b1f00c000000002d21746d1254af4256126f2d702e613e077aa9bf2018a4d20000000000001040b3fa500d257f9deb9e663aa5722d040000220000000005fff53822cc881d68061c2fae07"], &(0x7f0000000040)=0xac) getsockname$llc(r0, &(0x7f0000000340), &(0x7f0000000380)=0x10) capget(&(0x7f00000000c0)={0x20080522, r1}, &(0x7f0000000100)) pipe(&(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f00000002c0)={{0xffffffffffffffff, 0x3, 0x5, 0x2, 0x8}, 0x6, 0x3f}) 17:57:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 445.024434] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.2'. 17:57:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 17:57:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:02 executing program 5: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) creat(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200000, 0x27bbfe0b2bd1086f) link(&(0x7f00000000c0)='./bus/file0\x00', &(0x7f0000000200)='./bus/file1\x00') mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000400)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000100)='./bus/file1\x00', 0x0) 17:57:02 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x240) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r0, 0xffff) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3, 0x20000) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x1c) r2 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) write$P9_RRENAMEAT(r4, &(0x7f0000002840)={0x7, 0x4b, 0x2}, 0x7) process_vm_readv(r3, &(0x7f0000000180)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000000100)=""/111, 0x6f}], 0x3, &(0x7f00000027c0)=[{&(0x7f0000002240)=""/174, 0xae}, {&(0x7f0000002300)=""/133, 0x85}, {&(0x7f00000023c0)=""/78, 0x4e}, {&(0x7f0000002440)=""/126, 0x7e}, {&(0x7f00000024c0)=""/164, 0xa4}, {&(0x7f0000002580)=""/197, 0xc5}, {&(0x7f0000002680)=""/70, 0x46}, {&(0x7f0000002700)=""/146, 0x92}], 0x8, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0xe803, @loopback}], 0x1c) [ 445.279230] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 445.381976] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 17:57:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 445.540426] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:02 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, 0x0) getsockopt$inet_dccp_int(r7, 0x21, 0x5, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x63, @mcast1, 0x456d}}, 0x2, 0xbc}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000100)={r8}, &(0x7f0000000240)=0x8) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) pipe(&(0x7f0000000280)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:57:02 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0xf, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:02 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDSKBLED(r1, 0x4b65, 0x9) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x20200, 0x0) r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9370, 0x119280) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) r8 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r8, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r8, 0x80081272, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="c3ffffff0000000008000a0000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x4e24, 0x8, 0x4e20, 0x48, 0x2, 0xa0, 0x80, 0x67, r7, r9}, {0x1, 0x7, 0x7fffffff, 0x81, 0x0, 0x0, 0x3ff, 0xfffffffffffff801}, {0x4, 0x7, 0x2, 0x101}, 0x75, 0x6e6bb7, 0x1, 0x8c7bf8554974db54, 0x5}, {{@in=@multicast1, 0x4d5, 0xff}, 0x0, @in6=@remote, 0x0, 0x0, 0x1, 0x7f, 0x1, 0x4, 0x8000}}, 0xe8) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x8f4e7414abbb831f}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r10 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r10, 0x200004) sendfile(r3, r10, 0x0, 0x80001d00c0d0) r11 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r11, 0xc0f85403, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r11, 0x10e, 0x4, &(0x7f0000000240)=0x5, 0x4) 17:57:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 17:57:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 445.725583] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0xfdef, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:03 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40004, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r5, 0x11, 0x2, &(0x7f0000000180)=""/218, &(0x7f0000000100)=0xda) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:57:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 445.911709] device nr0 entered promiscuous mode [ 445.955291] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:03 executing program 2: syz_open_procfs(0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) close(r0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f0000000100)) write$evdev(r2, &(0x7f00000002c0)=[{{}, 0x0, 0x0, 0x5}, {{}, 0x2, 0x101}, {{}, 0x0, 0x7, 0x192b}, {{0x0, 0x2710}, 0x0, 0x800, 0x6}, {{0x0, 0x2710}, 0x0, 0x4b, 0x8}], 0x78) unshare(0x40000000) r3 = accept(r1, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0xffffff7f0e000000}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(r3, 0x0, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x1334, 0x10, 0x10, 0x70bd2c, 0x25dfdbfb, {0x11}, [@nested={0x1c, 0x3d, [@typed={0x18, 0x91, @str='/dev/vga_arbiter\x00'}]}, @generic="f4a26ff97ad2c3d798a81e1b367fd3bb47fec653b934d784a9ab97b4657871f89c9f6783f5e588f71beb464af0b84e9b11c40697d33424c71ed2ff38036ff6d67bfc22a7c5331345af39baf9722d5e16b9310eaa9947290e25f1d950af2dd73805dd9c685f639b7d7935cf40e6b915b534785ef8f95eb68ace84d8662a7592817eb0f7d5313ad9ae509507a2cdfe40e3189b59b4d056fb5f04df892840cae05af15fe8b2b8d77f2e9f5b2b87a2d91136d8324e7b04bbf95552c225069ad59e", @nested={0x1244, 0x68, [@generic="c174a9e652d60656cb2ddcb77286475061177f4de32a9760614d2931bb54c2d23a2960b0402ef664ed4eca28b27362e843a9b28027814d5a07494439141599520413bdc517ec832bb646bc71bda04664f67009215ffaf00d9de471337b0e80831f92bb5ac19fb1dc9fd9687e56639e542090e6e2d2dc85205132fde4c0261011e2e509ab61886a3fa42954c206", @typed={0x8, 0x3b, @uid=r6}, @generic="c938e7c15402478eea4b33f4191512250020f49c7f17e86fd9640b6e0b165789a9481030ffba9099e83692e24b7b2f1c4e3f0336957813bcd9abdeea05343344c878cc08228ea20506952bdc90073f9511db236c97ae615b155f65bfcab078e9c2b620a2755f3eef97c62b7161c46a5ac93333edf583519f5d35afb570166013cfb5df9cdf3c1c1cc6caa6e79de7629c5fd28ca6f670d5fa47912f26410f130cb24a5bbf6fcbe95def4f88b683802713db80c729d8055b379fe7c56e3e2fe7eb59dc92eae20ebe236e99410edf507cd5df6b18a3913da217b395ef4d3928f10c7dafc5a7171eca6b552bd9", @typed={0x8, 0x46, @ipv4=@broadcast}, @typed={0x8, 0xb, @fd=r0}, @typed={0x14, 0x6f, @ipv6=@rand_addr="51e2a0ae52cbc84e39d944d2202c9fef"}, @generic="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", @generic="49b23e6ca4c62f9bedc8d6c24a577f1b2e6513a0fe87747d8e9fbb33aefa7afd4b8966565d87788b99386fdcb2670275d2da79dfb1a3060ddab9585c431cee2e610e09b1ea8d514ee6885d9868e80429de04abcaf0e76da69704f6e974d76e10ea1f7c6d241e7a9109ca55d1ecfa5344584d2dfb360d4a56d7413c8bd9abd2da1a21d643e090fc13", @typed={0x14, 0x57, @ipv6=@mcast2}]}]}, 0x1334}, 0x1, 0x0, 0x0, 0x1000}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, 0x0, 0x0) 17:57:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 17:57:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x20000350, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0xfffffdef, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 446.361134] IPVS: ftp: loaded support on port[0] = 21 [ 446.579363] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:03 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 17:57:03 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = getpid() sched_setscheduler(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xd2, 0x0, 0x0, 0xff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x200009, 0x0, 0x0, 0x0, 0x0, 0x4000}, r1, 0x0, 0xffffffffffffffff, 0x8) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f00000016c0)="7ec5b45f617baa5e868f121eb32dfbcdae7acfd09476d04159a44d0e74568fcbfa5fe5370faa28189b8ed1b883a802a323496b16d36a107ee1901d04843ab2d024df8c82a2050b2cfcbcaefd1df2932895e34bd172ca4a59ae63878785e904417cbbd6ee95b6eb0ad1e88d406650d16b69d657a12ab72ea8bad5d4e36213d9a0f19e24a64a991e7ead01e9165f6faf13fb081ce5e2a79a1e29265c4a5c0e5577b9", &(0x7f0000000500)="8bc2d7"}}, &(0x7f0000044000)) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x20, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, 0xf911e193) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x111, 0xfa0e, {0x0}}, 0x8338) r3 = dup3(r0, r2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) sendmsg$nfc_llcp(r4, &(0x7f0000000180)={&(0x7f00000000c0)={0x27, 0x1, 0x2, 0x7, 0x1, 0x4, "769e701052b55d0e92fbae307e496da30691885eaa1d3acaf06d21fa0955aca54e25d22bbac816817860cf9f9d37be520e8b155d585b00dc43f2fecd8afecb", 0x3a}, 0x60, &(0x7f0000000480)=[{&(0x7f0000000200)="9a0fdbae6a8cff29d47f45997ccd246b7601b0df8959fafb363c25aea6c18149268b0e4aca7fa34d022456a73aa63a0a4938f2a90f24e3d3ca15f84cf9a75b502d159095132b67c2287331aafe78749e1b0f9cccef044391deb3100574b217903fe4e19f07f0feb33d17c8f34adac358e70034a2279a04ab1a444880b48f52e0c55ddcfb406fc7a6312ccab9956727f8ef9786881936161f8ca40f589639f8fbb714bd868d6e68ca5b56f498c617b965dbaa37a3a8a47c9b2f26911e50f8b6", 0xbf}, {&(0x7f0000000580)="7245be6a39fb555d0db8454f4928f6e5d729e21ed3b6548857f8661885bc20d35e29b298d1751d5f2eb522f5204864cc7752078df88e7d63cab11fb58c8f0602f517873e3f18debe2a8ed7adb41a993a06f831e97899bd9fe86e3400963672151fb7de46cc7b0e725cd7a1f455a3ae63527b2817b7f9df5b5ba61e3b7fc17900b3b7bd40f6a582aa9de020136f78e774f9cc15a010a7a8d18f09b5d97c817e64f074b163780acfd51c9b4c8e817d0144abc348334f20385d4adb4a0d67b9d57d2349124637e4bf21e6250883a627285a4bea26a74d854ab0de9ef99a35b395658c851297f9353cf5a4d60750eff2cddad7aca4a7fad4fd07cf51b252105c81e82e560075b7d65967e47791e65dc21f223140a6d5deb222ec408bdd5e34d95e3f409a21adcf3eb7b756ad2db65609f30273ef9aaf8f14d31e45d3c54f5bf7e36c0d138a280fc7b38e09cc07d44f0750bffda964fddcaf293174889c69a9634a1784739c387a01f767bc2339246eb8307c6acb5d2c6b9ea7c93b73581a5524424b9a10ce36a2cc5737b65b83622d7d8f04fe7e388bbe9fb3dbf1cb6daed20987c323635814cae527ee6b0bd7d944f3832f4479cdab5eaf47f583c25dcdd8a7080f8e7642ec8151448e0484818517b0f1c827326ef61901f9b86ddfcc63d3d43cb9ef5f158d6a76f97c5add176e3950c232327b8a5529d7e94dfb19881fe12ed7ae7ade9da25a38ebc6fb1a2c75aaf85cb68b55f00420d21ba2e79807e4c72220fc1d71af6e7b10dfeda5d5f305572371e5c85ad137cd5be3c60fece625b20d1db089005d027aeb6bc8b60bea7fb436a11a0fb5b706c33fed45ad59c5be8ac238c205bb139df8310c36e9b9d7e6929f48224166926feece8a4f60233cbee18f8c8ea61d642ea188fed57e5e687863b9f1ba9da19ec6c5203022e9d61110f2347f851c86bc77a49c5ede69c97922c96c438ebc544dd1ad87840f5d9f0c6d10b709a2e622c099276d22a3cc25b6b270860b5b8bb78dfae560ad9f3523bf004790b1a57fe473649c9cac96988ef23cdcbb49368604ff26351348888510b694efb7b5b2a6e3de0260f8ad05e947a70a9ce2738271c212ecc3939635a14528932e80757fff9e9c28e9e0f302c7ef1cad0bf07c6be74419fdf4c5c1bd8b9f7028b8ed89fd6adaf2ca6d0a51889d163dd6187fe7f45d2ea758d677f33b19695efbdb361fcf700f2a6fdd1da6d2bc3f402280aae46a02ab90f1501b1e4dc2c7180bbff1de89bd621461aea686e0fc8dd992c7d492ff7d40cdf44275a644a944adc36f4625fecd28caad8e78ae39eff0aa601842f37d2e80839927cdcdd266063322861384c701588cc7d3a5ef413396c47a264034736d434e2b38ce365d16243f0bd7b3d2a56c59ee30c73d9863fbb985ed7dd694b023b76f31044f779e62063dc545647f6c9ade19ca0b5d01b3945ceafb8872e6f92c748f3db2a8ed31c8461580b1a5f202f8b4af933e07229bba23cb3f4420489db26d94b62ae39861e19453ef8248a96ccafdd28373ed421c9ba30daa797b20bb79f5301ba256574ca126351e04ef2d62d2fad00290c23eee5546de08f338ecaa2561144b41f9bf8d6ac4230744a0a602dbb21a0c022f08c422b6cc6f2f30d6a7e48e9ae1bd916c95cde3b38b9fe4851c00db4347dfad3d5d5093c461f9116034b4852f8dec7cbd5c92b4ae34225005f938411d7ccb3404b78b3eecc6c1cf36c52d94c87b965df44f646f54a60ab3cfda91d271f0b436a4b5bb7e9da2c5c86d6f470a20b350f75f81390cc97822fd5bb036e02f13ce622ee167db28063188f23cc0e7b0c652906d5e53a1cafab39114cd1cec0eb6abd44bba567ef98606bc007db986af95f3eba757be7a2312d0f6c5c88126d23052d67931f0d4d030abcb7f3071ca230796bb76c72c5137fc622e2dc69e57f891144f5c41944930d20177729f25e5e6949527f7df347dda0d8969b8ec49c289fd2b35fb867d86722ff8c10c8d46f5b00fd2c3ed946393de855cb82e4081d65908eb0e190aac0bb9cc0a87d9e24aa7341abfd2e957c6ae8fa09719e1d144dff40cab934e7a9bd2d62fde06bb08a4c9336d97e981c67ea34aabb7a058f32841f576211d3ef1dd3d021b7a9cb24c1b5ec6b4655b7b4dfa68410de9ebc63b9811b8ae2cff314e71e36ce1ba167a8931b97a56e19c3595e79bfdaf1ab650f4954daf836c41d1a0f4181bf13be80582116b184685e23161df968ad039d8626cd7a7b676d28c4fa3114467a1e965a6e97ff158d780c975dc382d9915942b37190e8a952f64986f0b24174dbf6f49285a3b2e95aa3902812488a9c9e177f3796b54d478259cb7c2b102ffbd1e2dd1066a5add78b3e1c496dd1bd076f477a12dd68a187824fc14df8837703d58007c74a736b2f1fc5e435bbb30e22abebc38e9acdc1aaac5dcfdc13e9ea5b782d884c40732582a35066a20b93fbeda1bcf850897babfd5359da0ada37c4a1379dc8d473c82c323b3088eb20bd591c9a200ffb8b2285fa5a662a3b9cbe1beca3b1e49207bc0c79fa52bea5bc40320188f32bf0fb3cb4e35458ae553c0d3d461be7e507b7e885dc846e16191361048be26a40ac29655825bcd7d2997eddf7c395098a748a977f75b076e320d89afdabc8a9f4416dcc9ae05263aafaaddb76133cb9e8767f801bf51e7bfd1f6c2acef1201508416454749e4407e84bcd7a3812fd09e787133f103696b10430f812b26118d14f39988912d0eca8a5bf686b1eb0022bff6d19fa1ae200fe073db0cda6f6d9f872e4313ff2e43054cbb85ef0461b42b362ed80e91c3af3fecd4dcf5bc78b240eb90710dc9bc56566b01f19d40b1eed2dcdc134f8c6bcea7f98b3510375bd06f320acec913dccb0fc221985f168e5dd329d9e2025a5d7964784bfb7f79705f6154001b645ab4d34a387965f797d94ff795edc8b47dfebccd2e0bacd1641d80185fd744a4c07ed4ea631f526f73126438c25757def41b37c129f8779256218a223b5fe2e0ba2fa58706a0817f6d1cbc77a01ace47964404e6c26f449278b5104e81ef7bfd45b043bd299172ebdac8e04de9550727b0608f6a22b0e69b6e2e5168a900e548daa87a3bf860e620c593c8faf2bbdc197ae9048f94ff372fb44b01954ef710e02a36dd84a84f7f0023272edce8af887f4194d87c08cde00d99ce432c1fb09a2ce209e84bf6ae85dff47a96e012f2fbcceb416f371b02de0c6eb7a566740ab29d67058fcbbbd9136d8174b4d0eca6b2047b04d82a521dddc941404c190c1385bf1d042256613a8a992530f337e619074ebd84ead9b45833a4b672f41f7c9e84827353345a6edbaf281c77965ca5a614c667e331dc78162a28003cb464387a0a7f3d9ac19965e3c35851205ca96c5bdaa3a759d4d0726264849f85abef37afcd9a95cc898fcc152f1766d9748e9efd6d035a0ef6241ebbc7823398ee8457abec5caa0c2e0c93ba9dc518a77fea10f1aa5c3f36afe86e05e996fa821d673f0898a6c87f0f3e3e3fdcef90e716a01cb6ef11a07b1e9d569e122cef35297f60fff5d0c826d45701c4a4848ec89ee1a590e38b2f4c75f98e052fb1050607abd4ac7a8cf9f90cfa93128990f86fda655d46a9544c87156f3f97e5eedcee143bfe30b9b132be0a24e5d70de12af66c8348e4221682cc440e2a3e2f4711d871dec75726d00a14db55dba5f67455a445d1fb90ed11ed42fa2de5a3ece684ece7c967736f27a232f2f3fe117541b65e10de3e1a7c64dcb7fe3ae561623dc9b082b1a988c035577ba30c4ad75afc5def7d41ddff634b98529ab79a78e79434e7f1d365e2a22e812ef85a43712a3b9598d1b1dbae8ae078e1ce58050a4cf4e7a3caba49f2d2658be5beb689ef8456b3b7fabd810e4f2eeacd66d2ae83d154a4a136988f97b335c1e439472fc989edf5cf8312d56726a5305890f707e76013b2df3147e28ad9be33a9876d597525f545cd01fa67b0c5f475fe89a0f9ca413ddbf904285d6d27d38a290cbdbfbf9709150bcafdeb87affb450b3b12f1c5e5a6b06d238b33e21105206b173abdb01d24c1a8b883d0c2231112794cf658bab2652cfb0ab9dbae2d55167d0eb606f9116d5b38bcd46f1978ea2c7b5c4511dbdab78203781cf2c4da9969fe0d607570fa886ebce768cbb1d67db9425558657e7b106e520efadf6282d79ecdad08934aa1030ccb43977a79a90911b30b71706e992b784afd092be52dc77a3a7b333bc8639d14444c371624967abe60b63018ed7324dc5ea7316d4fa8e5fb735c32e8de9a382e192fd495fd9b0e43b8085702f64cbd86e454dabec1c4d1b15f6524b1a5ad78bb31c942398de619f4e292f572430c207862354102ff568e74843dc8dfd6b9d225f29921df4c7fc84fa8c7635bd1eb863f3e8a2bfce05877211a623cd7964a736f4e4fc81c166e41519564a640ec62232bc9548c2f4b4e1d0b1e73df09e14aaad406616700840279dd2bec4d4eece7ed5b6f73bb0429caaaa9369f421d1ebd04aeef86c00114db5c66ae0d389ea4b70c60df9bafc0f181e092959831fe5cf3d1b5b323098acd736f1a99fb92ac7f3025eff494ab0beaa04b3c04a60982e6b0508988293b24a84a0a7f797461949e052c4e97f6f6bfd759eef6626c010773e9d1135aa08431d19a4138952af7aacf72cf1f20ed95b7372b1d3d3c134cc82d32e15657952f8848a23cb27fb76a2efe99941b86ec13350cf272feb2981be5f79abfd87220b64f522d415bda57eb4bb12b5e735b8b29b9928141ac88f0f62ce5bee156c2515f93238588cfb212692437aafc53a1963153f5d5a2ebd902be1c66e2a7f12cc3bb3df540c41c94bf6da94a1e26a3d92fbed528588da3eae8ab0ce6f5fdf8266d5f43b32510b5e449910802c56d72d27ab9a31219fbc87de9cae9bbc878b519626b71e403945ade8cf0ebb0c11fccbf6dffb7b8238aed2850028bbdec8c5eacc804c483d4cdc7994ab8e45d9d325301a51b00fe42b4098dd9e9d18f2673e93500c1a7965513304bbbd27f83835823215580e7b3a8380ee59ebe414cd37f9a63b7670f60413cd048ad83ba6258aa2c5361c015b6101d762eb3f233929cadd968bd0338cb86b1d2b5e3b109581b771e7fa38d06f83728b4b80d3fc9e5ea5978a230212654a0c5f9b5dff2ed79a344c5aa9c0f2158f437e834d6c30ed1b0652e1ce3cfbe390fc9847dcf750128865a09266ec5ba9483b4495a5c9f44631d44193dfa0e0a54f0a7366b4d447cf86c353c8352693f9b2a462b17212028527635bbc19b97d011536a912d2329b74bdff44109a691b7c0020fb2cebd95d1365b95262d276d84ba3200b5d9769eee73ab48fcd268cc2d8f2d7e0366db67d7a1624c21dac2a72fdb5ba86216c5778e889c865384e5c0b32976e7a8c87cb92e7254380b472bdf4e5b23c3d209774a3d7271c3732e0ec251b0ac7e41775130696ab2e133558f866960c08f96eb8f489039bfea45cf5f7dda92b97c133fb6eb25f3292ed1be04d55ea13970bedfb0b70e3cb50a796538e7595172dd010d01a81f205af99c5ada2557c394a7b79f9f05c2a766cbeb1b3018dbb0ab0e7c1d99b46d9be75fcc29ddbd18e8d5df8fa045a8516fc2909fa466b4a18c959d3026617a293bd9c3f78de3e68cc524faf93d814558d24fc9d651f2ee8da5b33f4494ec408f99f3d02005c4e386f7841ea4723b67e0f05dff6e55ecfd96dd47d5ea9d858284e470a46e6931ac7f529fe3634df8e46a9c0fd41e9c9465ba49d724", 0x1000}, {&(0x7f00000002c0)="af335701519fb5f057a5b6bdd0c534b96869ef9221f87847e39771e510eb220c03082affcf6f3b32d346267d73178b2f368d079d06e3d8718f84ab15ca1c70d560d8b6aca8204590071330a6e9c8ce11366ea84b4d50263eec8807d947555c9df203e2bb4f6e31cc47489a8e4225af90bc0a78ca874cfd1bf0db68e00bd56b91d2975e553f34a81e69e462627dc35fcfa30c881205df70b7e4b550118a989cdf0f8e3bc83a33cfc58c0941518f5210194ff3cc809e6d949c043e80fc0c2fcf018f1708377ee6ba21b1279c6f38bc1309ed6816f3fdf78eca7f770aacce7901117f", 0xe1}, {&(0x7f0000000140)="763c6964f65186847e4038e2017bf11aac27c0d27047aa99cafb846e2037e0d1ca95ba3365770eb36851497598fb134b435a4547", 0x34}, {&(0x7f00000003c0)="c6709e83ca8b9fc585b84f20e6cb9dca719ae961c0fa77b372fba1d807606274a481daf3f306d8ef54bfe1a680a06be05377e0e2e763e9743c002c050544308a174eb2458840a9c3e157957b068c47abcaac51cda6db6575a52f7d7cf41ef7f418cfba77dffa27bd5afedddc8385509bf776f665b4210b57489a0e9426f9fb9ddf75bd7a4af49635b7e4c4e4451585efc0cf694853ee4c434642a06bb71ede7b1f529c54b8396f", 0xa7}], 0x5, &(0x7f0000001580)={0x108, 0x315, 0x80000001, "86a9a81c88a8c00a2b4df7fc3d890531eee36c481f29ce9f9cc66ae3daeaaa7bfcc4f40e3b1d7ca8e59f5c386ee445dfe757e165d28487b3015708ced2d75ea3e7c4735b750c3ae9420479c3c2911bbbeac6dcb51c5cabfbee5bdd836baef12f3be4d9d0dc5f9efd2cbbb6ce5dd0af056445156ab0503a4474682f5be9ae6c02c4c33dd74e6c0830656613e6cbc68cd8b8ff69df9f9b3929a286a744ceb1b99de283080a02d0cd1d5f36152b073b57d00892b4736cb2ffb96cbe45012d11c3b13ad512191538955ca8ddfd1f3da16d218cbc08ccb880b75fc4516e4b26f9d4ff9b565530deb8023378d782d74ece379eb7c8c0"}, 0x108, 0x20010000}, 0x8000) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)=0x0) tkill(r5, 0x14) 17:57:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 446.724811] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 446.738108] IPVS: ftp: loaded support on port[0] = 21 17:57:03 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) r6 = accept(0xffffffffffffffff, &(0x7f0000000200)=@rc, &(0x7f0000000280)=0x80) sendmsg$nl_netfilter(r6, &(0x7f0000000040)={0x0, 0x143, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000041bc77e05001500c0d6a00000000000"], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x40000) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r7 = fcntl$dupfd(r0, 0xc0a, r2) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(r7, 0xc0585609, &(0x7f0000000180)={0x2f0, 0x0, 0x4, 0x0, {r8, r9/1000+10000}, {0x2, 0x2, 0x26, 0x1, 0x0, 0xe9, "42d1ceeb"}, 0x76, 0x3, @userptr=0xfff, 0x4}) splice(r0, 0x0, r5, 0x0, 0xffffffff, 0x2) r10 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r10, 0xc0f85403, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r10, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0xfffffff9, 0x6403913f}, 0xc) 17:57:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 17:57:04 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0xc, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 446.986345] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 448.405011] net_ratelimit: 23 callbacks suppressed [ 448.405021] protocol 88fb is buggy, dev hsr_slave_0 [ 448.405049] protocol 88fb is buggy, dev hsr_slave_1 [ 448.410057] protocol 88fb is buggy, dev hsr_slave_1 [ 448.975024] protocol 88fb is buggy, dev hsr_slave_0 [ 448.980202] protocol 88fb is buggy, dev hsr_slave_1 17:57:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:06 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x40) write$input_event(r3, &(0x7f0000000100)={{}, 0x15, 0x2, 0x38}, 0x18) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r6) socket(0x5, 0x2, 0xff) socket$inet6_sctp(0xa, 0x1, 0x84) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r7, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r7, 0x80081272, 0x0) r8 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r8, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r8, 0x80081272, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000040a010000ffe9000000000000000000"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0xffffffff, 0x2) 17:57:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0xc00, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:06 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x282080, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x282080, 0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x20088000) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x0, 0x0) setpriority(0x1, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x282080, 0x0) sendmsg$NET_DM_CMD_START(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x44000) r3 = syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x8, 0x286200) read(r3, 0x0, 0x23b) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x802, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x1, 0x6, 0x0, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x0) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$inet_dccp_int(r1, 0x21, 0x3, &(0x7f00000000c0)=0x80, 0x4) bind$packet(r5, &(0x7f0000000040)={0x11, 0x800000000000004, r6, 0x1, 0x0, 0x6, @dev}, 0x14) futex(&(0x7f00000024c0), 0x8b, 0x2, &(0x7f0000002500), &(0x7f0000002540), 0x1) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'w\x01\x00\xff\xff\xff\xff\xff\xff\x00', 0x21, 0xffffffffffffff8f, 0x54}, 0x2c) r7 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x4e23, @loopback}, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x3}) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e22, @local}, {0x2, 0x4e22, @rand_addr=0x7}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x14}}, 0x20, 0x0, 0x0, 0x0, 0x3e91, &(0x7f0000000000)='vxcan1\x00', 0x3, 0x2, 0x1f}) setsockopt$IP_VS_SO_SET_ZERO(r7, 0x0, 0x48f, 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)='security.SMACK64TRANSMUTE\x00', &(0x7f0000002440)='TRUE', 0x4, 0x2) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r4, 0x80045400, &(0x7f00000012c0)) sendmmsg(r5, &(0x7f0000000d00), 0x1bdd307, 0x0) 17:57:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='batadv0\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000288, 0x0) socket$pptp(0x18, 0x1, 0x2) [ 449.127232] protocol 88fb is buggy, dev hsr_slave_0 [ 449.134471] protocol 88fb is buggy, dev hsr_slave_1 17:57:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x1000000, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:06 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x4000, 0x0) r3 = dup(r2) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r6) ioprio_set$uid(0x0, r6, 0x1ff) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000140)={0x1, 0x100, 0xa9944c8e02cd7bf5, {0x20, 0x6, 0x6}}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="ce8cdc8602000000040a01ff01000055958ff3c066db9ef44739bef2000000c00100"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 449.260780] IPVS: Scheduler module ip_vs_w not found 17:57:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 449.445000] protocol 88fb is buggy, dev hsr_slave_0 [ 449.450158] protocol 88fb is buggy, dev hsr_slave_1 [ 449.469487] IPVS: Scheduler module ip_vs_w not found [ 449.525683] protocol 88fb is buggy, dev hsr_slave_0 17:57:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0x0, 0x0}) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000001c0)) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x0, './file0\x00'}, 0xf9, &(0x7f0000007380), 0x2c1, &(0x7f0000000000)=[{0x80, 0x0, 0x0, "94eb29b6241d408594e00bc39e89b6760bd05881d1eeab33f0757a63b1e1c93bc5dd544f218e98bf37d3f1bef80efc23e0b22a2a23cea6e98577180a1349cc43d6c24a58140ba295d9fa8955bd058d46f8ec1c431e811f949a15f7eb572e7acd3ae97cfc03b153d24e76903c"}, {0x88, 0x0, 0x0, "0dbc66539e5a89a614cbaec03b8585f1b92e1c9ae9105678c0114ee2f1a871f87bc53e083047bea2370370cb50b0b514d96e2eb93fa5a94a7542e294052d190985092f82fc8c1686e7d96630ec0e726f7aaaaa9969d08b9f4d2568f9a3f1a045bdc5b86ff459f8e589e73d28914c037823"}, {0xfffffffffffffeae, 0x0, 0x0, "12eba2e57d5415a2b79ae98b6bc2c1eecf37b94cc0a020e894177c4a8d525dad09940068d14e15dc4503bcfd451b765ca74fb2e6fee4fb3ab4e94f038a42c70689b2a570787e99c5a190740ddb321cb2a56495db73c894fa1227314322c1c587b6bfc0bd55eeb70de67e5b6c7720f5b2c975dec82053cdcca928d6aa6022565ed8dc37ae6f1e66cdab86ffba"}], 0x1a8}}], 0x2, 0x0) 17:57:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0xc000000, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 449.754378] nla_parse: 2 callbacks suppressed [ 449.754390] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:07 executing program 5: unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f00000002c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0xffffffffffffff67) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000300)={[0x100, 0x0, 0x0, 0x0, 0x0, 0x2, 0x106], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 17:57:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x9, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 450.143675] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd2, 0x36a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x1000003, 0x4031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) semget$private(0x0, 0x0, 0x2) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101200, 0x0) r1 = socket(0xa, 0x80001, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000b34ff8)={0x0, 0x0}, &(0x7f0000b34ffc)=0xc) setuid(r2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) r3 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_int(r3, 0x1, 0x8, 0x0, &(0x7f0000000280)) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000a0fe0)={{&(0x7f00005e3000/0x800000)=nil, 0x20ce6000}, 0x200000}) 17:57:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:07 executing program 5: creat(0x0, 0x0) ioctl$KVM_SET_DEVICE_ATTR(0xffffffffffffffff, 0x4018aee1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000440), 0x6f5, 0x2000000022, &(0x7f0000000480)={0x77359400}) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="020500000200000000000000000000006622e85f3d08e1fb8abc9e557817db65bc28dce194bb4cabd6f87a264c66c0c37e2b34fbb2401107900b4e1e0e2d275caa821047c7dd3da4cee9ca5560e245db02becafa39679f8f4a81d48e234cd70533a73166f8b988897bde2f29bf0000000000000000"], 0x10}}, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r1, 0x80081272, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000300)={0x8, 0x6, 0x3f, 0x1, 'syz0\x00', 0xfb}) io_setup(0x7f, &(0x7f0000000000)=0x0) io_pgetevents(r2, 0x4, 0x3, &(0x7f0000000180)=[{}, {}, {}], &(0x7f00000000c0)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={0x8}, 0x8}) 17:57:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:07 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x2}, 0x7) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) r4 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) r7 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x408000, 0x0) r8 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r8, 0xc0f85403, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r8, 0x84, 0x71, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000200)={r9, 0x5}, &(0x7f0000000240)=0x8) socket$nl_netfilter(0x10, 0x3, 0xc) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESDEC=r10], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x4040001) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r6, 0x0, 0xffffffff, 0x2) 17:57:07 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0xc, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 450.503279] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x223, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 450.907849] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x8) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000140)={r5}) sendmsg$kcm(r6, &(0x7f0000001f00)={&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @empty}, 0x3, 0x3, 0x1}}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000500)="23b95cf175a81abc0f54e5aa83735ee5ae4f4d7f04500d22c1ba41f27a1237379a1ad86274250ce242c4e777bc04ccbce20017abef315f651edb966e421324f7430c82cf7e72a7aec6a71e849604abda10b7992b646f9f4bb3d4050b3fd947c70ed886b16579f14993367ab0642589c200dca4210b1681557aa43292c95831807e4bf1986dc12985842011d8fcc33e09867cee03ad499742408dcca0fd0c061f5f186896da256aaffcaa145b5cbf2d557edf299cfd4d7097e32d83e9b6e3769295732cc4be6f4f608b09a8fb1ca0ebea01221a6f9b138cc18eae5c694b8d5849b0a9243a69b113de4db77829eea4c1c787c761aeb9caa884e31bf59c7048454f404df553a1c0dad367bc316552814f84f98ac58136f5e1b22bcbc84761758986fe3c17e9bf93d7f46716dac74be13bed2536e7eac404dde5f1cf1d8a7b0e2271faf68da2fad9317812e02c4238ddac2b99cb19efaec11a637ee7cba13bace74b1d73b7ca9de25e5363abe11060644a87a92c82b6264b9120fa5b8d21847a648254459a6e6f2bf0f92a3df38c679660b4f17e7931a7cabce4cc0d5da29ad47030570bd43d7e95896243d60dd7c74e678edecc865c6b575b9b22d1cfff48e4fb3db79593df037c6a78ccf472228428813520eaaa860ae7c6ddb00af98003f9949407cc9646f1007117c4070fe5d01df8cbbc69976eb822c6640e17e6445ff1032b9187424fbba2014aaf90aaadf8aaa2c125ed622239246934d780fb1d1b4fe0f3beb2f3fc7e2fb611998bec636f2ce9d2e79320a74875bf89efe3b7cf5e9a66899b3c435dff67c396758c3f0fbaeaa783858ab4e1c95d9e6a3bf9b043207be5cfe5f6bc8f97c87d2ab863924e159a91959a6bf2bb1aaa041f0ea49d5b22979be4a2818ff7db322dd3e4e2d34a26513646836cf08aa0ce910fd5c0ab369f8b8da4c1734ef7a34e79838cea91f3a745ae80e8f13738ac1de03c3748e14db00f157666657eecd65ca1efd19c813425d2a6fb1a5cb69ef585d2e41cff873c7ab5a8ff8111821847346c4bfec1e2f54341031a10f6d0438f8942b2a590a80df1d63d57e42400719323d1c30e227243048c47820bbb23409c2b39e578337960906e3c373451b221918984f43d807c18bd073ae115d8218e100bf044c0f6f537f0c7759a7b0cce8a595b540d40680da6732062ee51fdeafd27a7eba6b26a29af570039e7d07add55a2a43005266c5e03c56f00de5aaa77f385797ba9f581abf4c39e2190d2b155b14ff29f6c35e96be83d5e85c11b896c53fbb9181fa3026c4e5848c3313d110feb63d247a3f00202e4144bb7276fda63fcb8beb2f76b588bcda08e90ccf4a0bcd51b0a7143e7185941b1fa97bea2e81ba437677c9b4a5fbe06ae8954fb40b5cb26cae67ffc21108beed2db699a7efa432ae3041938585b647ccab3725a26e4334ed818ec8588b3676f5b59651b246b816bc8efbef394de22ba27ffcaff179e9b27bd06a306d9eb55fd8812a45d22dfd7bc08586735fe37007f12529b42aeab1e138f8122b44cd0dbc554e8933104137a86ac1fc0632526ac6c98774cf376944ca59f29f29b365c17225afac15fd5339d17790bd80886228a7a53a562be914da7f6223b8b1434e2e41a20ad710924f2599d270f7b8e50edb8ca83a3e720fe5ee76bbabf508dace2112739ffcc48bbf1f3d948023c829ca145235ff91b9c1d2c6afac536e86a5bfea6a16731242b37e65bd77f202a7fe885737cd84ddf394032e0f6d7653b617d1da9e458e5d0d868313f6bf55bf654bccc472b7a607f2a0dcdf2e6785c87a622ea4f0bc278345b4c5e1de06cb95523ce6a00187e71cfcc80a25758c76ade90901512488dcefbe55bce3d90ac90ebbf056128cfb23111256fa5f71ff074a365f6e12d44c1156dac387eefae9dd134c845f5ddcd9b9240775604840eaa7ee2cf86976ab1f9e0f957af9ad5e8d1d90e6bceb0bda8919732f6b187552ea1feff1688023a47828d877896b3dcb70112804b0b2a19d4e29648ec15f27db2f97c1cbbf65d942cebe592391ee85c0f13a66502f8d591692773e79cc39947957d790762effba40a9360d875479520f07440dfdeeb07f26a3f88c2f6dd8c98aac91e8c6068536db1da5d0ffbc2ad86dcaff084de63ea6c022d1b160de9771ca33d3cfee656bfb05b763188ef0571caaba52a54f3feaeb7ef9a534528fb083338eadefd3d3b28abb213153072b59b468ebf440528f04e1cc1d1e1c93b9a26f408772c8c0cd0914ffaaa1ccb9020b2cfdb230aacfcc15b5ef7f8347093916bcdc7c78957bc7bad64392601ae64e3d8704dfe697176ada85291b0c3df10f64ac192ef74dfe85623ad46ba35f454d589445d870833fe4d89824c9a1ed03624b5c66b3923c7cc1ce6ef6ebd75c74c00907929d1badf41e2a3ca2ca337d909cd6a8efb3805419c5e10f8eb63e8d3bcd060b0c1a156818e847976f8b0f61e69c3ee8b422c005514c1cf221318b091e6e9362ac0b944addc4d211ef055c27e0d5aa918419bff7d31c07511a601f963d1ffdd5065a579be9b889ce3105492cda51b706c8fe18e95aff1a44f1e21bf7e7c0f57dfb258155de5c2afa58400f34f70a495921ef3fba683469a3274a6a2ba326dd991ea636d8049d917bcca5b2946d95e13994837abb0cee6106720702c8fbcf2ae4c3a811cac26277cc6e3aaf5cd2e063a3037b7dcf9028cc0f0df60aba83ade34db6e22da34e54a7ef36077cc5b64f9cda835d22b6e2ae07acd436107cb08b51363643d6eec0cc1f9b38b00fded1e51849f23a8b48965d94c54c30d9c8f88a3a2535fd44770104c1bb8898295de8443258f51c0a16d0990bfc1f886386eb51c9fa68c55ac4c603edaa404a9609da7d966e8243cd6ffa43ae14d0ad6e7fc9cf6b6b82be70001760752de3819e996266a4773cedeaddcae972da776702d07143b3b60e0d0c16c80b7e40f8fa7e4b65b09a802a8d1e575c6392f6080e20fee111e2a71410e78d90a6eb39c608fbcb0a4a98a7ccf266254d6098a7233fbe3184c4a28be3e738b9eae7d9d000173b5558bc525e736187e59e84ed32ed9f9da6782ca4dc9f07cbd05ea50a982c2c12ae74261d33c529aafe704769a799e7c435c7c16c9a8cc3f7f272f853e72c577d29a5c7483db2aee952a67ba2632d98cae62d0f6c1d29d8c192b370d2cde0587ecac86d2653542d4b430c733fa6172bf77eab30d8883165af3a0bb92130c5b17566f926be30be0b01c7968462d49627971ad9d385290bade1b18e148050ef041aff0c90785b2f131299c6086ff3e4221eca566861b0814245f3b60270d25586c8f97cb03c67e8ce025d62d50d9f8274038ca9f923368bbed7fc2c2e75820b543611d48ba366b0c418ca99a7f7f599e59f28eaf81faef2248e5fedc73ec9bc7c6c98934bcb6b8a0cc083b9052ccbc22c1f23164e3a4d8404c76641c97f4572ecc484b0c175c6cbdeb22404c85831d28647c5c551cf3bda0c01bf8c11b3364d5c8c31dba8faf11df77ef4e0d40ec5fe2f2078e8d0bc0bd5d479bbb52e3800addce59dd690a27f9897a861cb8f7fe0c3eb12f278bbbadd4571d08997a45265ad93f1adbe481b6bd5542c81e813660566e62e25f24a6cf48484e9c293b62fab84a606690ff22d776386f6780f22d9dc81c8cd138946c5ae58739a239e97c3e88c1d8ff71e98c156dc8b69269cc20e806ab90da45b36aa953d3392c851408f5dda288dee0a3067a57a492ec23fca43562f79d3ffe13ff7362530c4302b0ed5eb87288f019f9f6f4c9cecf249395091a620bf5cedec4701d9788623989f275615b6306774e3a0ce54daa25c13d9d4bf8743a3ebb5a6936889e7a36c52caeff22e3ade5152006df98c2e40215f2014b8e675fb9e10f68e34eee846b169dcbab40eed397479353b2f2f7d6dba1830a25125904b736dba8b7d41776477f716d6179c1ce689972895ef8006e07040d0f14bfc5d71d9c96f2ad2982fcd469f7a3c0a826ce40fd3ed3a782f936dd7904e36294d345f9c23786c0f47503529a9e8e1e0ca2500839580af9a19cb93b69696de3deb14838c2b37f710f2cc7bc574dfcdf2d441d02006db097758903f0b395cc4252575713367b18f6973536c0abce6c02b325a4a68e080599b164947da9a488b02ba1d95f2d569f14ff09ed2e0b85bba32f72ce9b8c99e18befaa78ae3867d9cb6e899b9cd117e06e75a13a29e78424f66cadb79b5b04149fa295e007df60ac2e58c03da073c4a100cfba0bca01f265eee6562d284215cc1f9befbb8da6a7f0976763afc6c9ac76f88b33434d40bd1bfe7c41264c0242f3052391039887ccf6f07fa2264ac4ee8e7c1c98c189ffc5294378948d9a3a5726a2bf09faec227737901f8a18d6cf8a4a9365df41d199cbe8646c71a29ed72b41adba7ef08a6f53968d2b4a547f30c413b8cdf9bac2d4e4af933eb8f06314a634352f646e8fdad8835c369ba7ff6125147fe0bed7a01aeef7c6fb9cb7bea3359ef06cd0a49d419dfc09cbcfb275de22755f7e399d36b69320c639ed79d8d017e3b581c8bf7f97d7a6a4a9db03a9e040038adec3e3a5334d70cea91011797c741e5bc61933274de4285a58634bf69a6e038802f6a22409904d0ae6cb482db96dbb96c99d8a305d96fc7f50f24bfb070786e9b62451f416991d52f3ca69271404b95b463558058ade091373b77fe2a66b797ca49ec7c9c536cb18d42c883b6acacd273f009bd67c0111b8aad84d6eaaa23a74904375118aee22787ef3216069223d3c8b3cbbe255a4f0fbbe7029d87a7fe215c530c570fbdcb5104ef9b3edf2b9230bb83c00bfd0e4f96e5816d58cf906535eb82b39d8867e982b8204dca43e34cc9679169c50a5fe508c9a409579f52af6936670233f3ccfbc08ac1bd8eccee91c16fc3774079f2377ff7881263b8b5089f2e1488516cd94b7d3e8c7dd031691d87914e2b4973a008fc226012348f5956ab590fcdadef6b9e7dc7ffc0ad9ff9f08b5ed96734bc8924179abbf2a76845981bb9fb7cb95b618392bf21f8ed794e89275932ed28a5cf0648bdb8f663a3ef4722efc815e4089afd476c12a53dbe6bb0b1c1184a5a729716523d911cdfc000ccb9de24bca9cc9e1f0f80ed701908376c1d6634cd11cb87a8589db2eb9eb0de01bc870ce89fba070a36d3ce5bd2b1a6d8505a7c8c94d3cf2cc34b3754377dc80363fa479c60085f9277203e6b10fe41fa81368b3185c4fbd0eb8b69bdbab2f88c83275bae8351c8d62bdfd3cde6da537d8b01156fa9292d35de753009b08b0e1a1ea10b6fa49ec4fb7b5b769e43ae1c085b8574fd760ef50f1ed6e8fc63f282a10b837ec83ce8531c78a5fddc0c77d9486d78635991b7cf2c3b2ab3272e9fc74fe86ee8acc2adee9587a672498fb8e670e03845f37636d5cbde307f5c86f189873713977d306d7ccbf0e9bed08e3af5d50384830a8ab25b2092cd90c20ed4aea440d12b3a8af38777c4bee223e8669bba2953a6c7b2833c56040eb59d308980a5f77fab541e7b5d6cc79544556cdefc63c61fdc8d414d9a9841624bcc7649694ea29a46e918e83070ba0613bb0ae42aaa876403f50420296b1d24b51545bb11e943957ddc4a24a72358dabd8fc44ce6cc5536e309d3eda0c88202e271559ec874d9de1d7c6f66e48e3ace106ee8dc2d4ed5a261076ca2ee5bd10cc8cf5de41351f3ee490285ede877c74f24a340573f5c18acfd33d28ccd6bd61cbf557b5f27327ec47a975d6eb39fb6fcd831e40d2188b", 0x1000}, {&(0x7f0000001500)="926c4d55e8d1fb8d60244b1759ef4c097504f72530a5aae4f9df00f0118854ed0e0e06678fe510bf35fe791a13e134220f9e650c8e8929e4e5208c529f31a486ff714179f0270b1999c3dfeb77414d060232416cf15360793168f12b80f3a6cc3f9dd7", 0x63}, {&(0x7f0000001580)="08bb7f95c262f538e35c095dc3ad1f45407797ad1fa2b0fbad4915bbffe92ae5b22e37b0ba0e478ac10bdc1923f28fc0aa4ce2d8d173f5f78528f97d1cd0fc11bc64c30925e9343522f72b3daf7d79c505eb5230c6718df466aa2402e83b7c9621247eca0ef81491d4ed11fbc45658c1f67d9bdafeea4887f1fcec771ced3f320fcdf6638e3c283645b70959b62f94bb9ea962fcedca243942423c08aa48204e70688ccf2274029b", 0xa8}, {&(0x7f0000001640)="7ebb050b9f3ae0c841e5d1cfb03f24696455e8139f357123220a11a84874d8bb943fcef2eec3d087b392fff29916ce3e8b9128bf3abb9ccde1948bd88dbb70b0de5a9af3584ca315272aedeefba084696f8efe4ff84928e84900649cb96a7ad2176a9629fd96109f2ff2139b3e698b082f10cdd9f9526165e19763afc2af56f94d327b341907f1b5a06c5ca381f63c330fdf84337a1a7d557ae231ebefadc60faf54e94950561232b3d0614b", 0xac}, {&(0x7f0000001700)="0c05e733939e81cd4fe9c4b09b3263f838a80af4dcded1d1d3c074b66f54d1242f13927528a3134ad84df992249f65b69e37ea527bea0a0b12c4d053909666e2f6e3663e50c2e2b3034f843a6805100938ab508df402545ff64ea310ce28ac2783da647915d82b30be0a770410b441678248ecd15d05ea69769718cb9b771bb200886bfd30bde31a857926baeb39438ca529c48c988cbed9dda0fa208696f04eddfe34426beee5acc8613e84dd3b0416896195bea4f9dd4208e83a11ecf1a67989d97ef97c39bdcc0f184905f4d061782a6d3c9f5603dd3781f23437945448afc73ac623a34033a1b4948be39ef187f96e757cd0d793f3", 0xf7}, {&(0x7f0000001800)="a5632492bbed64e7c9b592510bd6a7f515c69a2e8e0854cfb20679d415197b6f8b74ac497b79b3389134d98f0d09828dcfbb40305fad3e53062135d3eff522aac0ee8aaac75e", 0x46}, {&(0x7f0000000340)="e663384fce1538", 0x7}, {&(0x7f0000001880)="b38e9220a561df0456ad35e4c9c1122fceb0340b21e7cc241627d3290447b7a2a315bd234731bc3b0c55c70abcf4c08b01b02edf9f362b046cd3e0cd04d44001e02f250cb7b8ffb8ce67451773444bf32e7c80944f71e5db08f54aa9ff14fcbc374f9dcd990340e1a5cfadeead320e351d5f6e7bdf49a85ed96a006512f9e25a61c9620ec8a771e73f", 0x89}, {&(0x7f0000001940)="a2183b9f0b9f9f04bc96fbd9119fab19167d0cc450c5f98d22d4ba7bf0e448c8de827ade3f76f069fd73cbc821bcdc95e6aa421c8f0c8e04ce7df2b32862aa059a08b00403ba9738659c8c00cb357bfb12d23b375b9f74c6e5b4c64ee180c2a9eee9733d376d93bd1ed83a9c5050457005dcacdd3770d70e88a55036b94a82", 0x7f}, {&(0x7f00000019c0)="f93788aa9a9707d8f47d8523fc1ea87a5c4492c6e8dd1515c3abf6e8fa939ebbb60c73c745d1b5bc595f4e572e15034e1960f0b84f65caf1b2160f78e6a49d5864d768c3250872f608c19b826a949baeac510437b42be4dd66e83068ec994d10e325685fd278311219180dd68db766b143c27685e2b767b0a7ae4843e1987ede945a7613caea79c5d72eca598fbea65c0475e39744c8c9492e", 0x99}], 0xa, &(0x7f0000001b40)=ANY=[@ANYBLOB="78000000000000000a010000ffffffff40a9609daca907625fb5e355ff52febc18c5a663c4c4d0f79734c309956783c7fa2b70f571c34f9ffc80667ce5047404f28fdd03b76d2f4a678f800a67af8d0958068182345635d28864c430db0939eeb0cd8f9b368b1568013e9924d5bed73e37a1428f000000002000000000000004130100000004000052c9939f9e6ba91c27a5bf0b7b210000f80000000000000000000000bd0000006c210699d8d7f22c4f4479d9d6f1d9c3284fed0b6db054ea65dd8d1e51a2e11866fbe3ca6952fa5f6fd0663455addd7a013843d512b1027c0f0392f0e005b2863b268219a9ee4d256ed5e04aac263d4473a56581ed93b513822810e66dbedf75899b2081a2787ea69510700202f15032f1632b943aaf24377ee2947c5f10f33af2536c3bfb0246e6780e8c59dc15987d1452d1de9ba61af130a6c9d7beb251f8fd25175e0ef4af3935b47414db8a3f07200580a29a70de042f881dceea3b0eb85479988984478448eaca4b13d9afb0c7dab599d97d05b7d18a6b311c365885904b2729a33cc9f100f80000000000000006000000080000005dc86406d60f1dff0e9ab13ee554834434d25fd6347aa95971d697335400df24711273427d95b57fb582cf1034ff5d76b0bde70e35e75e72b84bd96ac20093eba35ecf80826cee0faeb1f17041ea1559ebd65cf864099730ac9711264e80f837d6034e9c7c9ceae399c5862dfdc20b2f70a0a9c48c68ccad3ed1964838aea39277ab3a192900a50cb0ae43546aa68e0f72a097549f6a7be28c43355c9ac4cb9e4e141a54bc05c6f20b1fd80e02f609398f43546234113f47b5530dc70cc8109024e6227a93c4721b70df00229f64ce49ebc9f976f0acd43005eddfc458f7715a0000000000400000000000000019010000030000000114cd8c489ae08eac6b36f5615575b0e42d7cc8a674d48eace460682e3b1a5307d138000000000000001101000009000000e002deb421cbe7b7c0683409bd35b4e85f299d285ff51eeb739ffac26bddfaf5280000000000000090000000000000000201000009000000bb0b84a4da2914f8cf91fa8ba87e7e48551ad00ec92f9de1f676c0d57288af7deace78dfc78a0fa11a871e4f20eafc441b790de4710aa9ea9034fab98e28448dae7ca1c0741da658315b5ce73fc971821cde758c9c3989299c4f731948644bb46778f7cc4457d68a44f8ac0695c896622c49b309a38cb88a04c7740c00"/912], 0x390}, 0x4800) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r4, 0xffffffc3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@loopback, @rand_addr="41d2d79da36684263f565125d7e5d76c", @remote, 0x3, 0xc207, 0x5, 0x100, 0x2df, 0x40001, r4}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001f80)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000002040)={&(0x7f0000001f40)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002000)={&(0x7f0000001fc0)={0x30, r8, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x76c0a4cea5b1eaad) connect$inet6(r7, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={[], [], @loopback}, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB='+! ./file0\n'], 0x13400) 17:57:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 17:57:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x300, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:08 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) accept(r5, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000000)=0x80) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 451.338516] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 17:57:08 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$BINDER_SET_MAX_THREADS(r4, 0x40046205, &(0x7f0000000100)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0xffffffff, 0x2) 17:57:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(0x0, 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:08 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x4, 0x0, 0x21000a}}, 0x50) [ 451.623140] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:08 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8b38, 0x0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r0 = gettid() clone(0x100000100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() kcmp(r1, r0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/Z\xb8\xa2\xec0\x99\xfdq\x00\x84mC#D#c\x00', 0x98b5, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, 0x0) r6 = getpid() r7 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r7, 0x0, 0x0) r8 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r8, 0x747eaffabd3209ab, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x4a000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r6, r7, 0x0, 0x8, &(0x7f0000000080)='keyring\x00', r9}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, r5, 0x0, 0x13, &(0x7f0000000000)='2selinux+@(\'bdev/\x19\x00', r9}, 0x30) 17:57:09 executing program 5: ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x10, 0x2, 0x0) semctl$GETZCNT(0x0, 0x3, 0xf, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x4ffe0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'batadv0\x00', 0x2111}) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x32, 0x0, 0x84003ff) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000580)=0x44) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00') semget(0x0, 0x3, 0x102) openat$full(0xffffffffffffff9c, 0x0, 0x240080, 0x0) creat(&(0x7f0000000300)='.\x00', 0xa0) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000900)="120000001200e7ef077b3d3fcd00000200a1", 0x12, 0x0, 0x0, 0x6642a8772ff04e88) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0504000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 17:57:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x20, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}}, 0x20}}, 0x0) 17:57:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8922, &(0x7f0000000180)={'dummy0\x00', 0x0}) r1 = socket$unix(0x1, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8922, &(0x7f0000000180)={'dummy0\x00', &(0x7f0000000000)=@ethtool_rxnfc={0x31, 0x9, 0x1000, {0xf, @ah_ip4_spec={@broadcast, @broadcast, 0x101, 0x2}, {0x0, @dev={[], 0x13}, 0x4, 0x101, [0x3, 0x200]}, @sctp_ip6_spec={@mcast1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4e22, 0x4e22, 0x8}, {0x0, @random="415e7a013852", 0x1f, 0x2, [0xffffff31, 0xe66]}, 0x4, 0x5}}}) [ 451.883821] ptrace attach of ""[14619] was attempted by "/root/syz-executor.2"[14620] 17:57:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x5, 0x0, 0x21000a}}, 0x50) 17:57:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(0x0, 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 452.039269] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 452.170526] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 17:57:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0xc, 0x0, 0x21000a}}, 0x50) 17:57:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(0x0, 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:09 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000180)={r0, r1, 0x9, 0x0, &(0x7f0000000000), 0x0, 0x1b, 0x1, 0x1, 0x4, 0x1, 0x5, 'syz1\x00'}) 17:57:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x10, 0x0, 0x21000a}}, 0x50) 17:57:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, 0x0, 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, 0x0, 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 453.268846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 17:57:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 17:57:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, 0x0, 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:10 executing program 5: io_setup(0x3, &(0x7f0000000300)) r0 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r0, 0x0) r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e00000023008163e45ae08700000000060f02cc000000bc4cc91b4dd65b2f0580cb7023f52a556d1cd4f1cbf90a", 0x2e}], 0x1}, 0x0) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e00000023008163e45ae08700000000060f02cc000000bc4cc91b4dd65b2f0580cb7023f52a556d1cd4f1cbf90a", 0x2e}], 0x1}, 0x0) r3 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r4, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1a000}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f00000000c0)=0xf0000000, 0x4) recvfrom$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x10080) ioctl$PPPIOCGIDLE(r5, 0x8010743f, &(0x7f00000003c0)) r6 = socket$kcm(0x10, 0x3, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001940)=0x14) sendmsg$kcm(r6, &(0x7f00000018c0)={&(0x7f0000000280)=@can={0x1d, r7}, 0x80, &(0x7f0000000200), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB]}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r8 = socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) getpeername(r8, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000240)=0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0xa0f34ffc5cd5b407, 0x8) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r9, 0x8933, &(0x7f0000000000)={'team0\x00'}) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002a00)=0x14) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r12, 0xffffffc3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@newlink={0xdc, 0x10, 0xffffff1f, 0x800000, 0x0, {}, [@IFLA_LINKINFO={0xb4, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0xa4, 0x2, [@gre_common_policy=[@IFLA_GRE_FWMARK={0x8, 0x14, 0x28b}, @IFLA_GRE_ERSPAN_DIR={0x8}, @IFLA_GRE_LINK={0x8, 0x1, r12}, @IFLA_GRE_IGNORE_DF={0x8, 0x13, 0x1}, @IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_ENCAP_TYPE={0x8, 0xe, 0x2}, @IFLA_GRE_ERSPAN_DIR={0x8, 0x17, 0x1}, @IFLA_GRE_IKEY={0x8, 0x4, 0x5}, @IFLA_GRE_IKEY={0x8, 0x4, 0xe6c2}], @gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}], @IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_IFLAGS={0x8}, @IFLA_GRE_OKEY={0x8, 0x5, 0x8}, @IFLA_GRE_LINK={0x8}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x401}], @IFLA_GRE_REMOTE={0x14, 0x7, @local}]}}}, @IFLA_IF_NETNSID={0x8}]}, 0xdc}}, 0x0) 17:57:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) bind$unix(r2, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_TXQLEN={0x8, 0xd, 0x40000003}]}, 0x30}}, 0x0) 17:57:10 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000040a01000000000000b3a755cbae01b6"], 0x14}}, 0x0) splice(r0, 0x0, r3, 0x0, 0xffffffff, 0x2) [ 453.469486] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 453.605047] net_ratelimit: 25 callbacks suppressed [ 453.605057] protocol 88fb is buggy, dev hsr_slave_0 [ 453.615213] protocol 88fb is buggy, dev hsr_slave_1 17:57:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) [ 453.685027] protocol 88fb is buggy, dev hsr_slave_0 [ 453.690223] protocol 88fb is buggy, dev hsr_slave_1 17:57:10 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) sendto$inet(r5, &(0x7f00000003c0)="2de259820fb1fbd9c10807c85200505f885c9137822914591e7533e4975adff2f10f835f030eb956f62faa5e57e6e7310b4f8bc6c5e7d2da56844831a226c81776d0cd881aa28c19e16eea3b83a751b437ad3787828a6de409a8437dda8d5cdc17c20a8bd84b6e445b4b4c25668f9fdd15e6b38b31fa69c857ccf13262aa7dc6320c73a537891520fef080b5d3d95074b2c86b19fa424681d9c1197b1c024f7f3ecd1ca6c41743c7ecc973c8c1e081796557ae71c12ed3d2250f6378fabf42707f7f6776a0f8a3b3d06a2b58e503c59e77d5913b", 0xd4, 0x0, &(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) ioctl$LOOP_GET_STATUS64(r4, 0x4c05, &(0x7f0000000180)) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="000000000000000f8c6082cba0906a5c47f0b895ff0cca6bb8978f821d43387ae17259b720bf6d2bf305fae1a72c9c48a128f574a99277946127b724c96719c7d5bb1f5df7d3bfb19f416ed3bf693840950bf29ac3cfe34cbfb094f63386e58bf69d2e5f9fba1bb75ddcd3ca7aea9fa85640653165401797ddf3b497dd7b525d69eb38284defac10dbf3d52079433dad307f2390000000"], 0x14}}, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, 0x0) ioctl$BLKROGET(r7, 0x125e, &(0x7f0000000100)) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r6, 0x0, 0xffffffff, 0x2) 17:57:10 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0xc, 0x21000a}}, 0x50) 17:57:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 453.855061] protocol 88fb is buggy, dev hsr_slave_0 [ 453.860322] protocol 88fb is buggy, dev hsr_slave_1 [ 453.889120] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 17:57:11 executing program 2: sync() [ 453.976287] gretap0: refused to change device tx_queue_len [ 453.988729] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 17:57:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0xc00, 0x21000a}}, 0x50) 17:57:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x1000000, 0x21000a}}, 0x50) 17:57:11 executing program 2: stat(0x0, 0x0) getegid() lstat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000300)) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, 0x0) r1 = socket(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000180)=[@in6={0xa, 0x0, 0x0, @remote, 0x9}], 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01f0b778", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) sendmmsg$inet_sctp(r1, &(0x7f0000002cc0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000016c0)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4, 0x0, 0x0, r3}}], 0x20}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000000)={r3, 0x1f8, 0x6, 0x6, 0x1d, 0x5e84}, &(0x7f0000000040)=0x14) clock_gettime(0x0, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @local}, 0x8) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8242, 0x80000001, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[], &(0x7f000095dffc)) unshare(0x60020000) [ 454.569469] IPVS: ftp: loaded support on port[0] = 21 17:57:11 executing program 5: syz_open_dev$evdev(0x0, 0x0, 0x80000) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x9) r1 = syz_open_dev$dspn(0x0, 0x1, 0x2) write$UHID_INPUT(r1, &(0x7f00000002c0)={0x4, "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", 0xffffffffffffff5a}, 0x1006) write$eventfd(r1, &(0x7f0000000040)=0x5, 0x8) r2 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000180)) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x404, 0x4800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) 17:57:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:11 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fchmodat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x25, 0x14, 0x2, 0x1, 0x0, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0xf3985302f7e579f4}, 0x300080c0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 454.645038] protocol 88fb is buggy, dev hsr_slave_0 [ 454.645302] protocol 88fb is buggy, dev hsr_slave_0 [ 454.650195] protocol 88fb is buggy, dev hsr_slave_1 17:57:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x28}}, 0x0) 17:57:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0xc000000, 0x21000a}}, 0x50) 17:57:12 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu\x00E\xab\xcbw\x83.\xf3\x8a\xf6\xb3\xac\xfe\x9ek9\xcd\"\x84\x18/~[{\xfb\xc2\t}\xaaCSM^Z\x98\x0eZ\xfca5b\xd6\x92\a\xd6*\xd8v\xd0\xb1\x00=k|\xf1P\xbf\x17\x1b\x8f\xd6LT`V\\\xaeuJ[:\xcd<\xa1L\xec\x9fU\xe9\x14_g=\xfc\x7f\xbd-\xb2\xfa\xee\xe3\a~\x90\xd4\x90\a\x83\x81\xac\x1bWE_\x05;\xefk\x1e\xed:\x90\xc1\xba\x96\xde\xfac\xf0\'&:dn`\xe8\xa6-\x1dh\xb07#T\xa6\xa3\x9c\x91_jM@\x06\x8c\xf5\xbb\x81G\xb9\xa9\x8b\xf3\x8f\xa2\xee', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpuset.sched_load_balance\x00', 0x2, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x86100, 0x0) write$cgroup_int(r1, &(0x7f00000003c0), 0xfffffffffffffd93) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) [ 454.931947] nla_parse: 1 callbacks suppressed [ 454.931958] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) 17:57:12 executing program 4 (fault-call:6 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 455.307589] IPVS: ftp: loaded support on port[0] = 21 [ 455.377063] FAULT_INJECTION: forcing a failure. [ 455.377063] name failslab, interval 1, probability 0, space 0, times 0 [ 455.377602] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 455.414287] CPU: 0 PID: 14753 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 455.422165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.431543] Call Trace: [ 455.434169] dump_stack+0x197/0x210 [ 455.437837] should_fail.cold+0xa/0x1b [ 455.441747] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 455.446879] ? lock_downgrade+0x880/0x880 [ 455.451057] __should_failslab+0x121/0x190 [ 455.455311] should_failslab+0x9/0x14 [ 455.459127] kmem_cache_alloc_node+0x26c/0x710 [ 455.463815] __alloc_skb+0xd5/0x5f0 [ 455.467488] ? skb_scrub_packet+0x490/0x490 [ 455.471826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.477377] ? netlink_autobind.isra.0+0x228/0x310 [ 455.482327] netlink_sendmsg+0x97b/0xd70 [ 455.486402] ? netlink_unicast+0x720/0x720 [ 455.486426] ? selinux_socket_sendmsg+0x36/0x40 [ 455.486443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.486461] ? security_socket_sendmsg+0x8d/0xc0 [ 455.486478] ? netlink_unicast+0x720/0x720 [ 455.509925] sock_sendmsg+0xd7/0x130 [ 455.509943] ___sys_sendmsg+0x803/0x920 [ 455.517641] ? copy_msghdr_from_user+0x430/0x430 [ 455.522428] ? lock_downgrade+0x880/0x880 [ 455.526590] ? kasan_check_read+0x11/0x20 [ 455.530742] ? __fget+0x367/0x540 [ 455.530762] ? iterate_fd+0x360/0x360 [ 455.530783] ? __fget_light+0x1a9/0x230 [ 455.541993] ? __fdget+0x1b/0x20 [ 455.545375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 455.550931] __sys_sendmsg+0x105/0x1d0 [ 455.550952] ? __ia32_sys_shutdown+0x80/0x80 [ 455.559262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 455.564032] ? do_syscall_64+0x26/0x620 [ 455.568017] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.568034] ? do_syscall_64+0x26/0x620 [ 455.568059] __x64_sys_sendmsg+0x78/0xb0 [ 455.581465] do_syscall_64+0xfd/0x620 [ 455.585283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.585299] RIP: 0033:0x45a639 [ 455.593668] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.593679] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 455.593698] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 17:57:12 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0xc}}, 0x50) [ 455.627564] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 455.634855] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 455.642157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 455.649608] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 [ 458.434849] bridge0: port 3(gretap0) entered disabled state [ 458.443163] device gretap0 left promiscuous mode [ 458.448507] bridge0: port 3(gretap0) entered disabled state [ 458.513986] IPVS: ftp: loaded support on port[0] = 21 [ 458.805030] net_ratelimit: 25 callbacks suppressed [ 458.805038] protocol 88fb is buggy, dev hsr_slave_0 [ 458.805068] protocol 88fb is buggy, dev hsr_slave_0 [ 458.810069] protocol 88fb is buggy, dev hsr_slave_1 [ 458.815124] protocol 88fb is buggy, dev hsr_slave_1 [ 459.200204] chnl_net:caif_netlink_parms(): no params data found [ 459.213445] device bridge_slave_1 left promiscuous mode [ 459.222416] bridge0: port 2(bridge_slave_1) entered disabled state [ 459.286457] device bridge_slave_0 left promiscuous mode [ 459.291996] bridge0: port 1(bridge_slave_0) entered disabled state [ 459.525011] protocol 88fb is buggy, dev hsr_slave_0 [ 459.530138] protocol 88fb is buggy, dev hsr_slave_1 [ 459.845114] protocol 88fb is buggy, dev hsr_slave_0 [ 459.850270] protocol 88fb is buggy, dev hsr_slave_1 [ 459.925032] protocol 88fb is buggy, dev hsr_slave_0 [ 459.930174] protocol 88fb is buggy, dev hsr_slave_1 [ 462.888160] device hsr_slave_1 left promiscuous mode [ 462.950459] device hsr_slave_0 left promiscuous mode [ 462.990659] team0 (unregistering): Port device team_slave_1 removed [ 463.001573] team0 (unregistering): Port device team_slave_0 removed [ 463.014708] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 463.112295] bond0 (unregistering): Released all slaves [ 463.202637] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.209339] bridge0: port 1(bridge_slave_0) entered disabled state [ 463.217515] device bridge_slave_0 entered promiscuous mode [ 463.225807] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.232256] bridge0: port 2(bridge_slave_1) entered disabled state [ 463.239978] device bridge_slave_1 entered promiscuous mode [ 463.262009] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 463.272242] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 463.312574] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 463.320991] team0: Port device team_slave_0 added [ 463.382051] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 463.389881] team0: Port device team_slave_1 added [ 463.402260] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 463.410201] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 463.538155] device hsr_slave_0 entered promiscuous mode [ 463.582894] device hsr_slave_1 entered promiscuous mode [ 463.636178] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 463.643581] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 463.674948] bridge0: port 2(bridge_slave_1) entered blocking state [ 463.681348] bridge0: port 2(bridge_slave_1) entered forwarding state [ 463.688051] bridge0: port 1(bridge_slave_0) entered blocking state [ 463.694411] bridge0: port 1(bridge_slave_0) entered forwarding state 17:57:20 executing program 2: clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLINK(r1, 0x0, 0x0) 17:57:20 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0xc00}}, 0x50) 17:57:20 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x4, 0x4780c1) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x800, 0x3f) close(r5) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) connect$rxrpc(r2, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x2, @ipv4={[], [], @multicast2}, 0x7}}, 0x24) ioctl$KVM_ASSIGN_SET_MSIX_NR(r6, 0x4008ae73, &(0x7f0000000140)={0x6, 0x2}) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r7, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r7, 0x80081272, 0x0) ioctl$SIOCRSSCAUSE(r7, 0x89e1, &(0x7f0000000100)=0x7ff) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="e0000000070a0400000000000000000000000000cc004700cc487636dbd82fe470c32095cc8c57f5f0ef902bdb03f7972d374fa86c7e77985d2301a45aa4254a395e166b7506e0f348cd957158f4fb401c67ceabbca28585c9160d9daafde60b37483618281b8b9908db01e3c6258d7f0591f7535aca89e66858ad78da6761877fca4002339157a755b82ad93bc4354855e765004f42fb1c529f10240e56d45aa654348241ac8858a44c106fcc15e2b9eaccba170875f1f7370e20848402e2bb8d2ec7530b0b654e0e60ec283ff9f5cfe3727274efe0eed64633278f3d87406900366d463f9faa9ae4458a3c000000"], 0xe0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r5, 0x0, 0xffffffff, 0x2) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000000)=0x1, 0x4) 17:57:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:20 executing program 4 (fault-call:6 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 463.800773] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 463.831797] 8021q: adding VLAN 0 to HW filter on device bond0 [ 463.895424] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 463.949553] FAULT_INJECTION: forcing a failure. [ 463.949553] name failslab, interval 1, probability 0, space 0, times 0 [ 463.992229] CPU: 0 PID: 14784 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 464.000641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 464.010183] Call Trace: [ 464.010215] dump_stack+0x197/0x210 [ 464.010242] should_fail.cold+0xa/0x1b [ 464.010262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 464.016481] ? lock_downgrade+0x880/0x880 [ 464.016515] __should_failslab+0x121/0x190 [ 464.016535] should_failslab+0x9/0x14 [ 464.016549] kmem_cache_alloc_node_trace+0x274/0x720 [ 464.016564] ? __alloc_skb+0xd5/0x5f0 [ 464.016585] __kmalloc_node_track_caller+0x3d/0x80 [ 464.035108] __kmalloc_reserve.isra.0+0x40/0xf0 [ 464.035129] __alloc_skb+0x10b/0x5f0 [ 464.035146] ? skb_scrub_packet+0x490/0x490 [ 464.035164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.035180] ? netlink_autobind.isra.0+0x228/0x310 [ 464.035197] netlink_sendmsg+0x97b/0xd70 [ 464.035216] ? netlink_unicast+0x720/0x720 [ 464.043592] ? selinux_socket_sendmsg+0x36/0x40 [ 464.043609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 464.043626] ? security_socket_sendmsg+0x8d/0xc0 [ 464.043648] ? netlink_unicast+0x720/0x720 [ 464.052548] sock_sendmsg+0xd7/0x130 [ 464.052567] ___sys_sendmsg+0x803/0x920 [ 464.052585] ? copy_msghdr_from_user+0x430/0x430 [ 464.052610] ? lock_downgrade+0x880/0x880 [ 464.061333] ? kasan_check_read+0x11/0x20 [ 464.061355] ? __fget+0x367/0x540 [ 464.061375] ? iterate_fd+0x360/0x360 [ 464.069775] ? __fget_light+0x1a9/0x230 [ 464.069792] ? __fdget+0x1b/0x20 [ 464.069806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 464.069829] __sys_sendmsg+0x105/0x1d0 [ 464.079677] ? __ia32_sys_shutdown+0x80/0x80 [ 464.079711] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 464.079726] ? do_syscall_64+0x26/0x620 [ 464.079744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.079760] ? do_syscall_64+0x26/0x620 [ 464.088730] __x64_sys_sendmsg+0x78/0xb0 [ 464.088753] do_syscall_64+0xfd/0x620 [ 464.088777] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 464.097648] RIP: 0033:0x45a639 [ 464.097665] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 464.097674] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 464.097689] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 464.097697] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 464.097706] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 464.097714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 464.097721] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 [ 464.097968] net_ratelimit: 20 callbacks suppressed [ 464.097975] protocol 88fb is buggy, dev hsr_slave_0 [ 464.108122] protocol 88fb is buggy, dev hsr_slave_1 [ 464.108250] protocol 88fb is buggy, dev hsr_slave_0 [ 464.108294] protocol 88fb is buggy, dev hsr_slave_1 [ 464.255057] protocol 88fb is buggy, dev hsr_slave_0 [ 464.288050] protocol 88fb is buggy, dev hsr_slave_1 [ 464.310746] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 464.341293] bridge0: port 1(bridge_slave_0) entered disabled state [ 464.398181] bridge0: port 2(bridge_slave_1) entered disabled state [ 464.409185] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 464.446312] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 464.465551] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 464.472842] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 464.498732] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 464.509463] 8021q: adding VLAN 0 to HW filter on device team0 [ 464.527257] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 464.534362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 464.544059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 464.552772] bridge0: port 1(bridge_slave_0) entered blocking state [ 464.559331] bridge0: port 1(bridge_slave_0) entered forwarding state [ 464.571799] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 464.583397] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 464.592559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 464.604051] bridge0: port 2(bridge_slave_1) entered blocking state [ 464.610486] bridge0: port 2(bridge_slave_1) entered forwarding state [ 464.630967] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 464.647456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 464.665749] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 464.684348] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 464.691563] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 464.707729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 464.722756] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 464.744813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 464.752638] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 464.766870] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 464.781247] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 464.794666] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 464.811768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 464.823366] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 464.846475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 464.855692] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 464.863609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 464.873220] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 464.880137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 464.899508] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 464.907831] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 464.914109] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 464.924295] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 464.943119] 8021q: adding VLAN 0 to HW filter on device batadv0 17:57:22 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) r1 = creat(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, 0x0) 17:57:22 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="1d99e814000000040a0100f5ffffffffffffff00000000"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:57:22 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r1, 0x541b, 0x2070e000) 17:57:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0x0, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:22 executing program 4 (fault-call:6 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 464.995024] protocol 88fb is buggy, dev hsr_slave_0 [ 465.003033] protocol 88fb is buggy, dev hsr_slave_1 17:57:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0xc}}, 0x50) [ 465.045009] protocol 88fb is buggy, dev hsr_slave_0 [ 465.045043] protocol 88fb is buggy, dev hsr_slave_1 [ 465.097280] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 465.159605] FAULT_INJECTION: forcing a failure. [ 465.159605] name failslab, interval 1, probability 0, space 0, times 0 [ 465.186921] CPU: 1 PID: 14817 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 465.194779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.204147] Call Trace: [ 465.206766] dump_stack+0x197/0x210 [ 465.210425] should_fail.cold+0xa/0x1b [ 465.214340] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.219516] __should_failslab+0x121/0x190 [ 465.223772] should_failslab+0x9/0x14 [ 465.227592] kmem_cache_alloc+0x47/0x700 [ 465.231670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.237327] ? check_preemption_disabled+0x48/0x290 [ 465.242356] ? lock_acquire+0x16f/0x3f0 [ 465.246351] skb_clone+0x156/0x3e0 [ 465.249911] netlink_deliver_tap+0x97b/0xc20 [ 465.254356] netlink_unicast+0x5a8/0x720 17:57:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0xc00}}, 0x50) [ 465.258439] ? netlink_attachskb+0x770/0x770 [ 465.262865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.268497] netlink_sendmsg+0x8ae/0xd70 [ 465.272644] ? netlink_unicast+0x720/0x720 [ 465.276977] ? selinux_socket_sendmsg+0x36/0x40 [ 465.281678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.287251] ? security_socket_sendmsg+0x8d/0xc0 [ 465.292031] ? netlink_unicast+0x720/0x720 [ 465.296301] sock_sendmsg+0xd7/0x130 [ 465.300037] ___sys_sendmsg+0x803/0x920 [ 465.304020] ? copy_msghdr_from_user+0x430/0x430 [ 465.308862] ? lock_downgrade+0x880/0x880 [ 465.313001] ? kasan_check_read+0x11/0x20 [ 465.317154] ? __fget+0x367/0x540 [ 465.320639] ? iterate_fd+0x360/0x360 [ 465.324433] ? __fget_light+0x1a9/0x230 [ 465.328435] ? __fdget+0x1b/0x20 [ 465.331811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 465.337366] __sys_sendmsg+0x105/0x1d0 [ 465.341264] ? __ia32_sys_shutdown+0x80/0x80 [ 465.345709] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 465.350485] ? do_syscall_64+0x26/0x620 [ 465.354477] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.359862] ? do_syscall_64+0x26/0x620 [ 465.363947] __x64_sys_sendmsg+0x78/0xb0 [ 465.368035] do_syscall_64+0xfd/0x620 [ 465.371893] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.377100] RIP: 0033:0x45a639 [ 465.380302] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.399223] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:57:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e23, @rand_addr=0x7}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) [ 465.407210] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 465.414471] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 465.421733] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 465.429005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 465.436273] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 [ 465.464101] batman_adv: batadv0: Adding interface: veth121 [ 465.470203] batman_adv: batadv0: The MTU of interface veth121 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 465.501733] batman_adv: batadv0: Not using interface veth121 (retrying later): interface not active 17:57:22 executing program 4 (fault-call:6 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="390000001300090468fe07000000e3000000ff3f01000000450001070000001419001a000400020007000a00550e69330f4de5020080080000", 0x40e}], 0x1) socket$unix(0x1, 0x0, 0x0) 17:57:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0x0, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 465.636899] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 465.701459] FAULT_INJECTION: forcing a failure. [ 465.701459] name failslab, interval 1, probability 0, space 0, times 0 [ 465.713362] CPU: 0 PID: 14844 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 465.721185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 465.730567] Call Trace: [ 465.733197] dump_stack+0x197/0x210 [ 465.736876] should_fail.cold+0xa/0x1b [ 465.740795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 465.745997] ? __kernel_text_address+0xd/0x40 [ 465.746029] __should_failslab+0x121/0x190 [ 465.754764] should_failslab+0x9/0x14 [ 465.758586] kmem_cache_alloc+0x47/0x700 [ 465.762697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.768270] ? check_preemption_disabled+0x48/0x290 [ 465.773303] ? lock_acquire+0x16f/0x3f0 [ 465.773328] skb_clone+0x156/0x3e0 [ 465.773421] dev_queue_xmit_nit+0x309/0xa10 [ 465.785247] ? validate_xmit_xfrm+0x1f7/0xda0 [ 465.789777] dev_hard_start_xmit+0xa7/0x980 [ 465.794132] ? check_preemption_disabled+0x48/0x290 [ 465.799177] __dev_queue_xmit+0x2704/0x2fe0 [ 465.803521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.809090] ? netdev_pick_tx+0x300/0x300 [ 465.813266] ? __copy_skb_header+0x2c0/0x560 [ 465.813286] ? skb_checksum+0xc0/0xc0 [ 465.813309] ? rcu_read_lock_sched_held+0x110/0x130 [ 465.813329] ? kasan_check_write+0x14/0x20 [ 465.833946] ? __skb_clone+0x613/0x870 [ 465.837879] dev_queue_xmit+0x18/0x20 [ 465.837896] ? dev_queue_xmit+0x18/0x20 [ 465.845758] netlink_deliver_tap+0x910/0xc20 [ 465.845785] netlink_unicast+0x5a8/0x720 [ 465.845805] ? netlink_attachskb+0x770/0x770 [ 465.845826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.845844] netlink_sendmsg+0x8ae/0xd70 [ 465.845865] ? netlink_unicast+0x720/0x720 [ 465.854336] ? selinux_socket_sendmsg+0x36/0x40 [ 465.854353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 465.854372] ? security_socket_sendmsg+0x8d/0xc0 [ 465.854386] ? netlink_unicast+0x720/0x720 [ 465.854404] sock_sendmsg+0xd7/0x130 [ 465.864329] ___sys_sendmsg+0x803/0x920 17:57:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 465.864350] ? copy_msghdr_from_user+0x430/0x430 [ 465.864378] ? lock_downgrade+0x880/0x880 [ 465.864398] ? kasan_check_read+0x11/0x20 [ 465.872715] ? __fget+0x367/0x540 [ 465.872736] ? iterate_fd+0x360/0x360 [ 465.872761] ? __fget_light+0x1a9/0x230 [ 465.872779] ? __fdget+0x1b/0x20 [ 465.882970] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 465.882994] __sys_sendmsg+0x105/0x1d0 [ 465.883011] ? __ia32_sys_shutdown+0x80/0x80 [ 465.883046] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 465.892018] ? do_syscall_64+0x26/0x620 [ 465.892038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.892052] ? do_syscall_64+0x26/0x620 [ 465.892072] __x64_sys_sendmsg+0x78/0xb0 [ 465.892090] do_syscall_64+0xfd/0x620 [ 465.899778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 465.899792] RIP: 0033:0x45a639 [ 465.899808] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 465.899821] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 17:57:23 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0xda4fff08) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x5}, 0x10) getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r1, 0x0, 0x1, &(0x7f00000000c0)='\x00'}, 0x30) 17:57:23 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r4, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r4, 0x80081272, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000000)=0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) close(r5) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) write$binfmt_misc(r6, &(0x7f0000000180)={'syz0', "ece3d34fd5e9705b7ae5be0ae7c7d5992ce1dfba695e813fbefcd4b45e2f5975b9f18132f67c192b19d61657fad71f50b3e4aaa416fc58557be0c292c61575260e8425c0d9dea988c0d363b45712e2b0cfb5bbc5b95871f7775c20d2078c0acb8d46c7a3a642819c33c41016904d971a6816217cc100b185"}, 0x7c) splice(r0, 0x0, r5, 0x0, 0xffffffff, 0x2) [ 465.908730] ORIG_RAX: 000000000000002e [ 465.908741] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 465.908751] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 465.908760] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 465.908769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 465.908778] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 17:57:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0x0, 0x40, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 466.180792] batman_adv: batadv0: Adding interface: veth123 17:57:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0xc}}, 0x50) [ 466.214155] batman_adv: batadv0: The MTU of interface veth123 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 466.249232] batman_adv: batadv0: Not using interface veth123 (retrying later): interface not active 17:57:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 17:57:23 executing program 4 (fault-call:6 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x0, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 466.494695] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r2, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) r3 = socket$inet6(0xa, 0x80002, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r4, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x2}, 0x1c) dup3(r3, r4, 0x0) 17:57:23 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0xc00}}, 0x50) [ 466.603508] FAULT_INJECTION: forcing a failure. [ 466.603508] name failslab, interval 1, probability 0, space 0, times 0 [ 466.653485] CPU: 0 PID: 14884 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 466.661365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 466.670743] Call Trace: [ 466.673366] dump_stack+0x197/0x210 [ 466.677034] should_fail.cold+0xa/0x1b [ 466.681064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 466.686210] ? lock_downgrade+0x880/0x880 [ 466.690400] __should_failslab+0x121/0x190 [ 466.694659] should_failslab+0x9/0x14 [ 466.698477] kmem_cache_alloc_trace+0x2cc/0x760 [ 466.703163] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.708807] ? notifier_call_chain+0x1e0/0x230 [ 466.713418] __netdev_adjacent_dev_insert+0x13a/0x700 [ 466.718636] __netdev_upper_dev_link+0x227/0x340 [ 466.723408] ? find_held_lock+0x35/0x130 [ 466.727495] ? netdev_upper_dev_unlink+0x190/0x190 [ 466.732450] ? lock_downgrade+0x880/0x880 [ 466.736615] ? kasan_check_read+0x11/0x20 [ 466.740782] netdev_master_upper_dev_link+0x3a/0x50 [ 466.745819] batadv_hardif_enable_interface+0x26a/0xb30 [ 466.751211] batadv_softif_slave_add+0x8f/0x100 [ 466.755897] ? batadv_softif_slave_del+0xd0/0xd0 [ 466.760769] do_set_master+0x1ca/0x230 [ 466.764680] do_setlink+0x95d/0x34c0 [ 466.768426] ? rtnl_getlink+0x6a0/0x6a0 [ 466.772424] ? __lock_acquire+0x6ee/0x49c0 [ 466.776688] ? __lock_acquire+0x6ee/0x49c0 [ 466.780952] ? __lock_acquire+0x6ee/0x49c0 [ 466.785198] ? mark_held_locks+0x100/0x100 [ 466.789453] ? __lock_acquire+0x6ee/0x49c0 [ 466.793703] ? perf_trace_lock_acquire+0xf5/0x580 [ 466.798600] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 466.803809] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 466.808841] ? validate_nla+0x32f/0x810 [ 466.812838] rtnl_newlink+0xbad/0x1610 [ 466.816753] ? rtnl_link_unregister+0x250/0x250 [ 466.821443] ? mark_held_locks+0x100/0x100 [ 466.825722] ? __lock_acquire+0x6ee/0x49c0 [ 466.829963] ? perf_trace_lock_acquire+0xf5/0x580 [ 466.834818] ? __update_load_avg_se+0x5ec/0xa10 [ 466.839497] ? __lock_is_held+0xb6/0x140 [ 466.843929] ? mark_held_locks+0x100/0x100 [ 466.848616] ? debug_smp_processor_id+0x1c/0x20 [ 466.853294] ? perf_trace_lock_acquire+0xf5/0x580 [ 466.858150] ? finish_task_switch+0x146/0x7c0 [ 466.862662] ? __lock_acquire+0x6ee/0x49c0 [ 466.866921] ? finish_task_switch+0x146/0x7c0 [ 466.871441] ? mark_held_locks+0xb1/0x100 [ 466.875615] ? mark_held_locks+0x100/0x100 [ 466.879875] ? debug_smp_processor_id+0x1c/0x20 [ 466.884560] ? perf_trace_lock_acquire+0xf5/0x580 [ 466.889424] ? finish_task_switch+0x146/0x7c0 [ 466.893943] ? __mutex_lock+0xa67/0x1300 [ 466.898029] ? find_held_lock+0x35/0x130 [ 466.902340] ? __lock_is_held+0x90/0x140 [ 466.906429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 466.911987] ? rtnl_link_unregister+0x250/0x250 [ 466.916671] rtnetlink_rcv_msg+0x463/0xb00 [ 466.920940] ? rtnetlink_put_metrics+0x560/0x560 [ 466.925717] ? netdev_pick_tx+0x300/0x300 [ 466.929887] ? netlink_deliver_tap+0x22d/0xc20 [ 466.934490] ? find_held_lock+0x35/0x130 [ 466.934513] netlink_rcv_skb+0x17d/0x460 [ 466.934533] ? rtnetlink_put_metrics+0x560/0x560 [ 466.942652] ? netlink_ack+0xb30/0xb30 17:57:24 executing program 5: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getgroups(0x0, 0x0) getegid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 466.951295] ? kasan_check_read+0x11/0x20 [ 466.955475] ? netlink_deliver_tap+0x254/0xc20 [ 466.960085] rtnetlink_rcv+0x1d/0x30 [ 466.963833] netlink_unicast+0x537/0x720 [ 466.967935] ? netlink_attachskb+0x770/0x770 [ 466.972379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.977948] netlink_sendmsg+0x8ae/0xd70 [ 466.982039] ? netlink_unicast+0x720/0x720 [ 466.986307] ? selinux_socket_sendmsg+0x36/0x40 [ 466.991023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 466.996592] ? security_socket_sendmsg+0x8d/0xc0 17:57:24 executing program 2: clone(0x2000004100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x18) [ 467.001372] ? netlink_unicast+0x720/0x720 [ 467.005639] sock_sendmsg+0xd7/0x130 [ 467.009376] ___sys_sendmsg+0x803/0x920 [ 467.013378] ? copy_msghdr_from_user+0x430/0x430 [ 467.018145] ? lock_downgrade+0x880/0x880 [ 467.018166] ? kasan_check_read+0x11/0x20 [ 467.018184] ? __fget+0x367/0x540 [ 467.018201] ? iterate_fd+0x360/0x360 [ 467.033798] ? __fget_light+0x1a9/0x230 [ 467.037785] ? __fdget+0x1b/0x20 [ 467.041156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.046720] __sys_sendmsg+0x105/0x1d0 [ 467.050628] ? __ia32_sys_shutdown+0x80/0x80 [ 467.055079] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 467.059858] ? do_syscall_64+0x26/0x620 [ 467.063855] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.069275] ? do_syscall_64+0x26/0x620 [ 467.073280] __x64_sys_sendmsg+0x78/0xb0 [ 467.075151] ptrace attach of "/root/syz-executor.5"[14898] was attempted by "/root/syz-executor.5"[14899] [ 467.077530] do_syscall_64+0xfd/0x620 [ 467.077557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 467.096337] RIP: 0033:0x45a639 [ 467.099525] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 467.119291] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 467.127362] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 467.134679] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 467.141948] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:57:24 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RMKNOD(r0, 0x0, 0x0) [ 467.149216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 467.156502] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 17:57:24 executing program 4 (fault-call:6 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:24 executing program 0: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) read(r0, &(0x7f0000000180)=""/4096, 0x1000) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) write$smack_current(r6, &(0x7f0000000000)={'iposix_acl_access!-ppp0wlan1trusted'}, 0x24) socket$nl_netfilter(0x10, 0x3, 0xc) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r5, 0x0, 0xffffffff, 0x2) 17:57:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x0, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x1000000}}, 0x50) [ 467.407014] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 467.510376] FAULT_INJECTION: forcing a failure. [ 467.510376] name failslab, interval 1, probability 0, space 0, times 0 [ 467.523786] CPU: 0 PID: 14920 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 467.531643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 467.541018] Call Trace: [ 467.543642] dump_stack+0x197/0x210 [ 467.547315] should_fail.cold+0xa/0x1b [ 467.551240] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 467.556373] ? lock_downgrade+0x880/0x880 [ 467.560558] __should_failslab+0x121/0x190 [ 467.564821] should_failslab+0x9/0x14 [ 467.568647] __kmalloc_track_caller+0x2de/0x750 [ 467.573344] ? __lock_acquire+0x6ee/0x49c0 [ 467.578146] ? kstrdup_const+0x66/0x80 [ 467.582054] kstrdup+0x3a/0x70 [ 467.585527] kstrdup_const+0x66/0x80 [ 467.589256] __kernfs_new_node+0xb0/0x680 [ 467.593429] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 467.598203] ? perf_trace_lock_acquire+0xf5/0x580 [ 467.603071] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.608708] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 467.614195] ? find_held_lock+0x35/0x130 [ 467.618276] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 467.623749] kernfs_new_node+0x99/0x130 [ 467.627745] kernfs_create_link+0xdd/0x250 [ 467.632009] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 467.637309] sysfs_create_link+0x65/0xc0 [ 467.641403] netdev_adjacent_sysfs_add+0xc2/0x100 [ 467.646265] ? napi_disable+0xc0/0xc0 [ 467.650082] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.655637] ? notifier_call_chain+0x1e0/0x230 17:57:24 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r6 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r6, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r6, 0x80081272, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r7, 0xc0f85403, 0x0) r8 = getpid() r9 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x28001, 0x2) ioctl$int_in(r9, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r8, r9, 0x0, 0x8, &(0x7f0000000080)='keyring\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000880)={0xffffffffffffffff, r7, 0x0, 0x1, &(0x7f0000000840)='\x00', r10}, 0x30) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r13, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r13, 0x0) r14 = accept4(r13, 0x0, 0x0, 0x0) sendto$inet6(r14, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreq(r14, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @empty}, 0x8) fstat(r14, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r15) r16 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r16, 0xc0f85403, 0x0) r17 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r17, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r17, 0x80081272, 0x0) r18 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r18) r19 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r19, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r19, 0x80081272, 0x0) r20 = openat$full(0xffffffffffffff9c, &(0x7f0000000980)='/dev/full\x00', 0x0, 0x0) r21 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r21, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r21, 0x80081272, 0x0) r22 = getpid() sched_setscheduler(r22, 0x5, &(0x7f0000000380)) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) r24 = getegid() r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f0000000380)) r26 = getuid() r27 = fcntl$getown(r2, 0x9) r28 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r29) r30 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r30, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r30, 0x0) r31 = accept4(r30, 0x0, 0x0, 0x0) sendto$inet6(r31, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreq(r31, 0x0, 0x24, &(0x7f00000002c0)={@multicast1, @empty}, 0x8) fstat(r31, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r32) [ 467.660243] __netdev_adjacent_dev_insert+0x4c7/0x700 [ 467.665459] __netdev_upper_dev_link+0x227/0x340 [ 467.670238] ? find_held_lock+0x35/0x130 [ 467.674324] ? netdev_upper_dev_unlink+0x190/0x190 [ 467.679281] ? lock_downgrade+0x880/0x880 [ 467.683452] ? kasan_check_read+0x11/0x20 [ 467.687627] netdev_master_upper_dev_link+0x3a/0x50 [ 467.692667] batadv_hardif_enable_interface+0x26a/0xb30 [ 467.698066] batadv_softif_slave_add+0x8f/0x100 [ 467.702753] ? batadv_softif_slave_del+0xd0/0xd0 [ 467.707529] do_set_master+0x1ca/0x230 sendmsg$unix(r6, &(0x7f0000000b80)={&(0x7f0000000680)=@file={0xd93b6b96f035ac11, './file0\x00'}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000700)="181c87d5c0e45988ef5c6f8bcca8771243681ae8ce9207920e1d5ab28abc5b5c6206d431db9334275a224179cc7a579764ea211913d34d27fe3ec6348e78491bf790be9d20eaa58e99a4217e2f654c51e6c17d9245c4b260554613e1b9086fc03155b6ed144e5ee82115e7ce7f5f818b8a43c4ba70d7", 0x76}, {&(0x7f0000000780)="86762e918811a5a0880cc000eec4dc26636011bf324712cb1bf817f9408188f57c6a823e8a1262ce5dcaa051adca6781d562cf34417c0369e8b43ecf29b1b133e5321dd50bdd406a4ed70f3ac2141f5e54cded10b83a3c9c47886987783d2667107c2d50cf33d7c5f393dd9140bde3a730a3c4604f4aeb74348a50", 0x7b}], 0x2, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r15}}}, @rights={{0x2c, 0x1, 0x1, [r16, r1, r17, r18, r19, r3, r0]}}, @rights={{0x18, 0x1, 0x1, [r20, r21]}}, @cred={{0x1c, 0x1, 0x2, {r22, r23, r24}}}, @cred={{0x1c, 0x1, 0x2, {r25, r26, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r27, r29, r32}}}], 0xc8, 0x80}, 0x4000) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r5, 0xc4c85512, &(0x7f0000000180)={{0x5, 0x5, 0x1ff, 0x7, '\x00', 0x8000}, 0x0, [0x1ff, 0x8, 0x3, 0x40, 0x4, 0x2, 0x4, 0x1, 0x1a1d, 0x2, 0x0, 0x0, 0x401, 0x40, 0x2, 0x4, 0x7f, 0x100000001, 0x8, 0x8000, 0x80, 0x5, 0x10000, 0x6, 0x5, 0x6, 0xfffffffffffff000, 0x3f, 0xffffffffffffff7e, 0x6, 0x1, 0x0, 0x7ff, 0x5, 0x8, 0xd86, 0x40, 0x0, 0x1, 0x5, 0x8, 0x7f, 0x5, 0x94, 0x40, 0xfffffffffffffff7, 0x1, 0x5, 0x3, 0x2085, 0x9, 0x0, 0x6e9e7fa5, 0xf84, 0x4, 0x20, 0x9, 0x12d, 0x24, 0xfffffffffffffffb, 0x3, 0x3, 0x1ff, 0xd0, 0x5, 0x64f, 0x0, 0x7, 0x8000, 0x5, 0x461, 0x7, 0xfffffffffffffff8, 0x7, 0x2, 0x5, 0x3, 0x2, 0x3ff, 0x100000000, 0x8, 0xb54, 0x0, 0x7, 0xffff, 0x9f77, 0x0, 0x100000000000000, 0x1, 0x1ff, 0x1f, 0x8, 0x800, 0x1, 0x6, 0x6, 0x0, 0x9, 0x385, 0x8, 0x10001, 0x12a6, 0x10000, 0x100000001, 0x4, 0x2d0, 0x9, 0x5, 0x8, 0x7fffffff, 0xc0000000000000, 0x3, 0x5, 0x4, 0x4, 0x80000000, 0x1f, 0x80000001, 0x2e3, 0x4, 0x1c00000000, 0x7fffffff, 0x7, 0x800, 0x9, 0x6, 0x1, 0x401], {r33, r34+30000000}}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="141f00"/20], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 467.711455] do_setlink+0x95d/0x34c0 [ 467.715198] ? rtnl_getlink+0x6a0/0x6a0 [ 467.719190] ? __lock_acquire+0x6ee/0x49c0 [ 467.723449] ? __lock_acquire+0x6ee/0x49c0 [ 467.727709] ? __lock_acquire+0x6ee/0x49c0 [ 467.731948] ? mark_held_locks+0x100/0x100 [ 467.736189] ? __lock_acquire+0x6ee/0x49c0 [ 467.740419] ? perf_trace_lock_acquire+0xf5/0x580 [ 467.745274] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 467.750477] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 467.755509] ? validate_nla+0x32f/0x810 [ 467.759527] rtnl_newlink+0xbad/0x1610 [ 467.763420] ? rtnl_link_unregister+0x250/0x250 [ 467.768088] ? mark_held_locks+0x100/0x100 [ 467.772359] ? __lock_acquire+0x6ee/0x49c0 [ 467.776624] ? perf_trace_lock_acquire+0xf5/0x580 [ 467.781491] ? __update_load_avg_se+0x5ec/0xa10 [ 467.786165] ? __lock_is_held+0xb6/0x140 [ 467.790237] ? mark_held_locks+0x100/0x100 [ 467.794468] ? debug_smp_processor_id+0x1c/0x20 [ 467.799142] ? perf_trace_lock_acquire+0xf5/0x580 [ 467.803983] ? finish_task_switch+0x146/0x7c0 [ 467.808470] ? __lock_acquire+0x6ee/0x49c0 [ 467.812692] ? finish_task_switch+0x146/0x7c0 [ 467.817177] ? mark_held_locks+0xb1/0x100 [ 467.821321] ? mark_held_locks+0x100/0x100 [ 467.825574] ? debug_smp_processor_id+0x1c/0x20 [ 467.830256] ? perf_trace_lock_acquire+0xf5/0x580 [ 467.835094] ? finish_task_switch+0x146/0x7c0 [ 467.839584] ? __mutex_lock+0xa67/0x1300 [ 467.843636] ? find_held_lock+0x35/0x130 [ 467.847743] ? __lock_is_held+0x90/0x140 [ 467.851807] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.857345] ? rtnl_link_unregister+0x250/0x250 [ 467.862036] rtnetlink_rcv_msg+0x463/0xb00 [ 467.866276] ? rtnetlink_put_metrics+0x560/0x560 [ 467.871030] ? netdev_pick_tx+0x300/0x300 [ 467.875193] ? netlink_deliver_tap+0x22d/0xc20 [ 467.879776] ? find_held_lock+0x35/0x130 [ 467.883922] netlink_rcv_skb+0x17d/0x460 [ 467.887989] ? rtnetlink_put_metrics+0x560/0x560 [ 467.892740] ? netlink_ack+0xb30/0xb30 [ 467.896640] ? kasan_check_read+0x11/0x20 [ 467.900840] ? netlink_deliver_tap+0x254/0xc20 [ 467.905433] rtnetlink_rcv+0x1d/0x30 [ 467.909145] netlink_unicast+0x537/0x720 [ 467.913340] ? netlink_attachskb+0x770/0x770 [ 467.917776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.923345] netlink_sendmsg+0x8ae/0xd70 [ 467.927456] ? netlink_unicast+0x720/0x720 [ 467.931705] ? selinux_socket_sendmsg+0x36/0x40 [ 467.936373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 467.941910] ? security_socket_sendmsg+0x8d/0xc0 [ 467.946661] ? netlink_unicast+0x720/0x720 [ 467.950898] sock_sendmsg+0xd7/0x130 [ 467.954641] ___sys_sendmsg+0x803/0x920 [ 467.958611] ? copy_msghdr_from_user+0x430/0x430 [ 467.963369] ? lock_downgrade+0x880/0x880 [ 467.967598] ? kasan_check_read+0x11/0x20 [ 467.971749] ? __fget+0x367/0x540 [ 467.975233] ? iterate_fd+0x360/0x360 [ 467.979046] ? __fget_light+0x1a9/0x230 [ 467.983035] ? __fdget+0x1b/0x20 [ 467.986401] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 467.991944] __sys_sendmsg+0x105/0x1d0 [ 467.995871] ? __ia32_sys_shutdown+0x80/0x80 [ 468.000311] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.005062] ? do_syscall_64+0x26/0x620 [ 468.009031] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.014388] ? do_syscall_64+0x26/0x620 [ 468.018357] __x64_sys_sendmsg+0x78/0xb0 [ 468.022435] do_syscall_64+0xfd/0x620 [ 468.026243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.031438] RIP: 0033:0x45a639 [ 468.034640] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 468.053575] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 17:57:25 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e70e) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) sched_setparam(0x0, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x11) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000180)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}, 0x50) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x11000490) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d9189) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$UI_SET_SNDBIT(r7, 0x4004556a, 0x0) r8 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x0) sendfile(r7, r8, 0x0, 0x8000fffffffe) 17:57:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) dup3(r1, r0, 0x0) [ 468.061301] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 468.068576] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 468.075860] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 468.083146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 468.090502] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 17:57:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x0, 0x80, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:25 executing program 4 (fault-call:6 fault-nth:6): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:25 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0xc000000}}, 0x50) 17:57:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r2, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, 0x0, 0x4000000000dc) [ 468.352257] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:25 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="0e00370000001b83dbcd953f2da3ac1da87767acf6f58a2d091b0ebe2d504211c6dd1d0488fd78f73d939fc28fa0a2a8af7c87d5dcf87c4ee1631429d065c7142c17ea69a41566f1f1ba3c538cef027da258f28f903bef8a872723354a4caf41c36f5b8bc73088fa9209c11ae94719a4eb68627a3a0655e36110ba18888243502caec39dc9aefec206a6a462dcf9"], 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 468.435769] FAULT_INJECTION: forcing a failure. [ 468.435769] name failslab, interval 1, probability 0, space 0, times 0 [ 468.502706] CPU: 0 PID: 14952 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 468.510603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 468.519999] Call Trace: [ 468.522652] dump_stack+0x197/0x210 [ 468.526317] should_fail.cold+0xa/0x1b [ 468.526343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 468.526364] ? lock_downgrade+0x880/0x880 [ 468.526389] __should_failslab+0x121/0x190 [ 468.526405] should_failslab+0x9/0x14 [ 468.526420] kmem_cache_alloc+0x2ae/0x700 [ 468.535838] ? memcpy+0x46/0x50 [ 468.535860] ? kstrdup+0x5a/0x70 [ 468.535884] __kernfs_new_node+0xef/0x680 [ 468.535900] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 468.535919] ? perf_trace_lock_acquire+0xf5/0x580 [ 468.535933] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.535954] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 468.544336] ? find_held_lock+0x35/0x130 [ 468.544358] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 468.544380] kernfs_new_node+0x99/0x130 [ 468.559076] kernfs_create_link+0xdd/0x250 [ 468.568945] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 468.568971] sysfs_create_link+0x65/0xc0 [ 468.579445] netdev_adjacent_sysfs_add+0xc2/0x100 [ 468.579466] ? napi_disable+0xc0/0xc0 [ 468.620590] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.626153] ? notifier_call_chain+0x1e0/0x230 [ 468.630771] __netdev_adjacent_dev_insert+0x4c7/0x700 [ 468.635995] __netdev_upper_dev_link+0x227/0x340 [ 468.640774] ? find_held_lock+0x35/0x130 [ 468.644860] ? netdev_upper_dev_unlink+0x190/0x190 [ 468.649818] ? lock_downgrade+0x880/0x880 [ 468.654021] ? kasan_check_read+0x11/0x20 [ 468.658193] netdev_master_upper_dev_link+0x3a/0x50 [ 468.663230] batadv_hardif_enable_interface+0x26a/0xb30 [ 468.668623] batadv_softif_slave_add+0x8f/0x100 [ 468.673317] ? batadv_softif_slave_del+0xd0/0xd0 [ 468.678097] do_set_master+0x1ca/0x230 [ 468.682002] do_setlink+0x95d/0x34c0 [ 468.685760] ? rtnl_getlink+0x6a0/0x6a0 [ 468.689759] ? __lock_acquire+0x6ee/0x49c0 [ 468.694017] ? __lock_acquire+0x6ee/0x49c0 [ 468.698274] ? __lock_acquire+0x6ee/0x49c0 [ 468.702526] ? mark_held_locks+0x100/0x100 [ 468.706779] ? __lock_acquire+0x6ee/0x49c0 [ 468.711025] ? perf_trace_lock_acquire+0xf5/0x580 [ 468.715890] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 468.721095] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 468.726128] ? validate_nla+0x32f/0x810 [ 468.730137] rtnl_newlink+0xbad/0x1610 [ 468.734043] ? rtnl_link_unregister+0x250/0x250 [ 468.738731] ? mark_held_locks+0x100/0x100 [ 468.743010] ? __lock_acquire+0x6ee/0x49c0 [ 468.747257] ? perf_trace_lock_acquire+0xf5/0x580 17:57:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x0, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) tee(0xffffffffffffffff, r0, 0x0, 0x0) [ 468.752125] ? __update_load_avg_se+0x5ec/0xa10 [ 468.756822] ? __lock_is_held+0xb6/0x140 [ 468.760925] ? mark_held_locks+0x100/0x100 [ 468.765206] ? debug_smp_processor_id+0x1c/0x20 [ 468.769885] ? perf_trace_lock_acquire+0xf5/0x580 [ 468.774739] ? finish_task_switch+0x146/0x7c0 [ 468.779257] ? __lock_acquire+0x6ee/0x49c0 [ 468.783503] ? finish_task_switch+0x146/0x7c0 [ 468.788016] ? mark_held_locks+0xb1/0x100 [ 468.792193] ? mark_held_locks+0x100/0x100 [ 468.796443] ? debug_smp_processor_id+0x1c/0x20 [ 468.796461] ? perf_trace_lock_acquire+0xf5/0x580 [ 468.796480] ? finish_task_switch+0x146/0x7c0 [ 468.796499] ? __mutex_lock+0xa67/0x1300 [ 468.806031] ? find_held_lock+0x35/0x130 [ 468.806096] ? __lock_is_held+0x90/0x140 [ 468.806123] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.828328] ? rtnl_link_unregister+0x250/0x250 [ 468.833038] rtnetlink_rcv_msg+0x463/0xb00 [ 468.837299] ? rtnetlink_put_metrics+0x560/0x560 [ 468.842080] ? netdev_pick_tx+0x300/0x300 [ 468.846246] ? netlink_deliver_tap+0x22d/0xc20 [ 468.850848] ? find_held_lock+0x35/0x130 [ 468.854940] netlink_rcv_skb+0x17d/0x460 [ 468.859017] ? rtnetlink_put_metrics+0x560/0x560 [ 468.863778] ? netlink_ack+0xb30/0xb30 [ 468.867669] ? kasan_check_read+0x11/0x20 [ 468.871824] ? netlink_deliver_tap+0x254/0xc20 [ 468.876407] rtnetlink_rcv+0x1d/0x30 [ 468.880122] netlink_unicast+0x537/0x720 [ 468.884182] ? netlink_attachskb+0x770/0x770 [ 468.888596] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.894143] netlink_sendmsg+0x8ae/0xd70 [ 468.898218] ? netlink_unicast+0x720/0x720 [ 468.902451] ? selinux_socket_sendmsg+0x36/0x40 [ 468.907117] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 468.912647] ? security_socket_sendmsg+0x8d/0xc0 [ 468.917395] ? netlink_unicast+0x720/0x720 [ 468.921624] sock_sendmsg+0xd7/0x130 [ 468.925329] ___sys_sendmsg+0x803/0x920 [ 468.929311] ? copy_msghdr_from_user+0x430/0x430 [ 468.934062] ? lock_downgrade+0x880/0x880 [ 468.938219] ? kasan_check_read+0x11/0x20 [ 468.942362] ? __fget+0x367/0x540 [ 468.945932] ? iterate_fd+0x360/0x360 [ 468.949731] ? __fget_light+0x1a9/0x230 [ 468.953694] ? __fdget+0x1b/0x20 [ 468.957049] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 468.962579] __sys_sendmsg+0x105/0x1d0 [ 468.966472] ? __ia32_sys_shutdown+0x80/0x80 [ 468.970887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 468.975639] ? do_syscall_64+0x26/0x620 [ 468.979727] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.985092] ? do_syscall_64+0x26/0x620 [ 468.989068] __x64_sys_sendmsg+0x78/0xb0 [ 468.993127] do_syscall_64+0xfd/0x620 [ 468.996932] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.002131] RIP: 0033:0x45a639 [ 469.005327] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 469.024316] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 469.032041] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 469.039311] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 469.046575] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 17:57:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 469.053836] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 469.061113] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 [ 469.204997] net_ratelimit: 29 callbacks suppressed [ 469.205005] protocol 88fb is buggy, dev hsr_slave_0 [ 469.205103] protocol 88fb is buggy, dev hsr_slave_0 [ 469.210116] protocol 88fb is buggy, dev hsr_slave_1 [ 469.215113] protocol 88fb is buggy, dev hsr_slave_1 17:57:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x200}) 17:57:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x0, 0xc}}, 0x50) 17:57:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x0, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:26 executing program 5: bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4}, 0x11) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = memfd_create(&(0x7f0000000000), 0x200) ftruncate(r1, 0x800799c) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x2, 0x2012, r1, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) tkill(0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 17:57:26 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000740)={0x20, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f00}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r7, 0x0, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:57:26 executing program 4 (fault-call:6 fault-nth:7): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:26 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r2, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x2}, 0x1c) dup3(r1, r2, 0x0) 17:57:26 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4002) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) io_setup(0xc32f, &(0x7f0000000440)=0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0xb, 0x12, r6, 0x0) ftruncate(r1, 0x48280) r7 = open(&(0x7f00000004c0)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r7, &(0x7f0000000080)={0x14}, 0xfffffff4) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 17:57:26 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) chdir(&(0x7f0000000000)='./file0\x00') write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:57:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x0, 0xc00}}, 0x50) 17:57:26 executing program 2: keyctl$revoke(0x3, 0x0) pipe(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x2, 0x0, 0x0) 17:57:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x0, 0x6, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 469.660157] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 469.794266] FAULT_INJECTION: forcing a failure. [ 469.794266] name failslab, interval 1, probability 0, space 0, times 0 [ 469.812839] CPU: 0 PID: 15023 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 469.820698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.820705] Call Trace: [ 469.820735] dump_stack+0x197/0x210 [ 469.820763] should_fail.cold+0xa/0x1b [ 469.840597] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 469.840617] ? lock_downgrade+0x880/0x880 [ 469.840643] __should_failslab+0x121/0x190 [ 469.849901] should_failslab+0x9/0x14 [ 469.849918] kmem_cache_alloc+0x2ae/0x700 [ 469.849941] __kernfs_new_node+0xef/0x680 [ 469.862561] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 469.871575] ? perf_trace_lock_acquire+0xf5/0x580 [ 469.871602] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 469.871616] ? find_held_lock+0x35/0x130 [ 469.871639] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 469.881971] kernfs_new_node+0x99/0x130 [ 469.881995] kernfs_create_link+0xdd/0x250 [ 469.882012] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 469.882031] sysfs_create_link+0x65/0xc0 [ 469.909089] __netdev_adjacent_dev_insert+0x36d/0x700 [ 469.914314] __netdev_upper_dev_link+0x227/0x340 [ 469.919095] ? find_held_lock+0x35/0x130 [ 469.923180] ? netdev_upper_dev_unlink+0x190/0x190 [ 469.928135] ? lock_downgrade+0x880/0x880 [ 469.932307] ? kasan_check_read+0x11/0x20 [ 469.936583] netdev_master_upper_dev_link+0x3a/0x50 [ 469.941609] batadv_hardif_enable_interface+0x26a/0xb30 [ 469.946980] batadv_softif_slave_add+0x8f/0x100 [ 469.951642] ? batadv_softif_slave_del+0xd0/0xd0 [ 469.956410] do_set_master+0x1ca/0x230 [ 469.960305] do_setlink+0x95d/0x34c0 [ 469.964019] ? rtnl_getlink+0x6a0/0x6a0 [ 469.968002] ? __lock_acquire+0x6ee/0x49c0 [ 469.972262] ? __lock_acquire+0x6ee/0x49c0 [ 469.976559] ? __lock_acquire+0x6ee/0x49c0 [ 469.980788] ? mark_held_locks+0x100/0x100 [ 469.985048] ? __lock_acquire+0x6ee/0x49c0 [ 469.989295] ? perf_trace_lock_acquire+0xf5/0x580 [ 469.994146] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 469.999349] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 470.004360] ? validate_nla+0x32f/0x810 [ 470.008334] rtnl_newlink+0xbad/0x1610 [ 470.012227] ? rtnl_link_unregister+0x250/0x250 [ 470.016933] ? mark_held_locks+0x100/0x100 [ 470.021194] ? __lock_acquire+0x6ee/0x49c0 [ 470.025434] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.030331] ? __update_load_avg_se+0x5ec/0xa10 [ 470.035000] ? __lock_is_held+0xb6/0x140 [ 470.039078] ? mark_held_locks+0x100/0x100 [ 470.043360] ? debug_smp_processor_id+0x1c/0x20 [ 470.048041] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.052883] ? finish_task_switch+0x146/0x7c0 [ 470.057423] ? __lock_acquire+0x6ee/0x49c0 [ 470.061690] ? finish_task_switch+0x146/0x7c0 [ 470.066206] ? mark_held_locks+0xb1/0x100 [ 470.070365] ? mark_held_locks+0x100/0x100 [ 470.074603] ? debug_smp_processor_id+0x1c/0x20 [ 470.079292] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.084129] ? finish_task_switch+0x146/0x7c0 [ 470.088619] ? __mutex_lock+0xa67/0x1300 [ 470.092671] ? find_held_lock+0x35/0x130 [ 470.096750] ? __lock_is_held+0x90/0x140 [ 470.100827] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.106357] ? rtnl_link_unregister+0x250/0x250 [ 470.111035] rtnetlink_rcv_msg+0x463/0xb00 [ 470.115266] ? rtnetlink_put_metrics+0x560/0x560 [ 470.120012] ? netdev_pick_tx+0x300/0x300 [ 470.124237] ? netlink_deliver_tap+0x22d/0xc20 [ 470.128829] ? find_held_lock+0x35/0x130 [ 470.132983] netlink_rcv_skb+0x17d/0x460 [ 470.137049] ? rtnetlink_put_metrics+0x560/0x560 [ 470.141810] ? netlink_ack+0xb30/0xb30 [ 470.145691] ? kasan_check_read+0x11/0x20 [ 470.149845] ? netlink_deliver_tap+0x254/0xc20 [ 470.154441] rtnetlink_rcv+0x1d/0x30 [ 470.158155] netlink_unicast+0x537/0x720 [ 470.162255] ? netlink_attachskb+0x770/0x770 [ 470.166665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.172203] netlink_sendmsg+0x8ae/0xd70 [ 470.176351] ? netlink_unicast+0x720/0x720 [ 470.180581] ? selinux_socket_sendmsg+0x36/0x40 [ 470.185299] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 470.190840] ? security_socket_sendmsg+0x8d/0xc0 [ 470.196337] ? netlink_unicast+0x720/0x720 [ 470.200570] sock_sendmsg+0xd7/0x130 [ 470.204294] ___sys_sendmsg+0x803/0x920 [ 470.208263] ? copy_msghdr_from_user+0x430/0x430 [ 470.213032] ? lock_downgrade+0x880/0x880 [ 470.217175] ? kasan_check_read+0x11/0x20 [ 470.221412] ? __fget+0x367/0x540 [ 470.224860] ? iterate_fd+0x360/0x360 [ 470.228683] ? __fget_light+0x1a9/0x230 [ 470.232665] ? __fdget+0x1b/0x20 [ 470.236634] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.242170] __sys_sendmsg+0x105/0x1d0 [ 470.246049] ? __ia32_sys_shutdown+0x80/0x80 [ 470.250458] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 470.255204] ? do_syscall_64+0x26/0x620 [ 470.260124] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.265487] ? do_syscall_64+0x26/0x620 [ 470.269458] __x64_sys_sendmsg+0x78/0xb0 [ 470.274578] do_syscall_64+0xfd/0x620 [ 470.278408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 470.283614] RIP: 0033:0x45a639 [ 470.286816] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 470.305907] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 470.313630] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 470.320901] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 470.328170] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 470.335441] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 17:57:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, 0x0, 0x4000000000dc) 17:57:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x0, 0x1000000}}, 0x50) [ 470.342962] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 [ 470.351135] protocol 88fb is buggy, dev hsr_slave_0 [ 470.355434] protocol 88fb is buggy, dev hsr_slave_0 [ 470.356277] protocol 88fb is buggy, dev hsr_slave_1 [ 470.361223] protocol 88fb is buggy, dev hsr_slave_1 [ 470.366387] protocol 88fb is buggy, dev hsr_slave_0 [ 470.376404] protocol 88fb is buggy, dev hsr_slave_1 17:57:27 executing program 4 (fault-call:6 fault-nth:8): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x0, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:27 executing program 5: creat(0x0, 0x0) socket$inet(0x10, 0x3, 0x20000000006) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003640)=[{{&(0x7f0000001640)=@nfc={0x27, 0x0, 0x2, 0x7}, 0x80, &(0x7f0000001a80)=[{&(0x7f00000016c0)="7a84686f07635f3bf49c89835f46e711cedd6cd787264ada9f029b72a74fed4e65d48ce5dfe6bdf2c9ad3760015b10748904d412a8934fae3f9e5b991e9ac5c47b69c01afd42ced6027ef6d0ec65f1fae4cc54648201bcb8666577057c77ef98431e176f25315beb427430dec0cb1d41927e80c2234155a8f67e3f327fb5bd623866586038226b7a6bd21e552309904740d609b5b586a27d5c20e0ae449af9e5bcda5cb38082c6859a144ef20477f0133786a636a82fbebd8efde7c4d8dac8c13e49a54cb53b98e46709f9fa80ff4a52d3b7ccd8", 0xd4}, {&(0x7f00000017c0)="bc031193043d783d13bbbb", 0xb}, {&(0x7f0000001800)="56b0faf406431c00b295c88843532b64c91aff0caa617f3dafd1281af8bfd31e4fdeea75faa79821c940e24de7d3222b81081b0f74b6a077d3c09a47ebe87283ca83320af63e752d17f4c653e0e3c2d87d81c4f6abc9cab0c7fa9054a3d290fc675ac1416b48b98b88bc49ab4b7c20b6697a3e501067015c5bf7b7490d14f659873f5b7ae40ad47f99e84dfd6ab8d7e31337e36333989291b65067ad9d2eda1d4a8bea48087e1dd1f83708695e2c1a1a2dacda54ed7207839a46a75ed59bd3b0a1f1d88c87eb47fb", 0xc8}, {&(0x7f0000001900)="ccfed6de5a1d9e6eca41b0afa1b06587892419ab36a453f2710617ba10a3f59f480e8c008fff08cfea1247442ff4e0c53c78e76b8844485ba6efd7fc0ad68af2d8fc5924617d70af", 0x48}, {0x0}], 0x5, &(0x7f0000001b00)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xfffffffd}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14}}], 0x90}}, {{&(0x7f0000001bc0)=@sco={0x1f, {0x81, 0x5, 0x7f, 0x7, 0x5}}, 0x80, &(0x7f0000001d80)=[{0x0}, {0x0}], 0x2, &(0x7f0000001dc0)=[@txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x78}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000002500)="48fc48b32e32a21bbd9c75d109f55c8d3e8489881049d8a59e84db354eca1072b546bb5054aeb78bf7b368183eb83f5147a95b5a15bab986c996d5fc4f3c5acad3c091d974ffa156f4cd4b7ceff28ba66daa0d1ef3ddba0d90b9c8968dfafebd64be054413384ab6e68eb6a63707dc66df424498f4beaef9ee4dfe0516", 0x7d}], 0x1, &(0x7f0000003600)=[@timestamping={{0x14, 0x1, 0x25, 0x76}}], 0x18}}], 0x3, 0x20000) r0 = creat(0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x44, r1, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x2000040}, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001240)={0x0, 0x70, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x2c0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xd96, 0x3ff}, 0x1100, 0x0, 0x4, 0x7, 0x3, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) keyctl$set_timeout(0xf, r3, 0x0) add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='r\x15', &(0x7f0000000040)={'syz'}, &(0x7f00000000c0)='-&wlan1vmnet1\xf5eth1\'}selinux$\x00', r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000140)="5d825ef375e6076bffcb64f57ebdae463e867019f28eee39b2921cd6fc4601adc7b21157af28d5a9557edb7a1b1c9b2ffa88e47449b87410664ee46fdcc6ba461520c3cd144460b7cb01df39d5ffce975193994a8f80326a4959810834f8549e44c97973c80ade4a90017d47a753ac23b59d6a20f4f469433fd08558301d41a8ba01ac3c9cf4d81d84a3f0dfef3a118c49108a881646b82e", 0x98) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x3, r2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) creat(0x0, 0xb1) gettid() [ 470.499211] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:27 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x400}}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 470.635985] FAULT_INJECTION: forcing a failure. [ 470.635985] name failslab, interval 1, probability 0, space 0, times 0 17:57:27 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x0, 0xc000000}}, 0x50) [ 470.685113] CPU: 0 PID: 15047 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 470.692997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 470.702398] Call Trace: [ 470.705010] dump_stack+0x197/0x210 [ 470.708647] should_fail.cold+0xa/0x1b [ 470.712537] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 470.717642] ? lock_downgrade+0x880/0x880 [ 470.721789] __should_failslab+0x121/0x190 [ 470.726017] should_failslab+0x9/0x14 [ 470.729807] kmem_cache_alloc_trace+0x2cc/0x760 [ 470.736552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.742083] ? sysfs_do_create_link_sd.isra.0+0xbb/0x130 [ 470.747531] __netdev_adjacent_dev_insert+0x13a/0x700 [ 470.752732] __netdev_upper_dev_link+0x259/0x340 [ 470.757563] ? find_held_lock+0x35/0x130 [ 470.761618] ? netdev_upper_dev_unlink+0x190/0x190 [ 470.766559] ? lock_downgrade+0x880/0x880 [ 470.770718] netdev_master_upper_dev_link+0x3a/0x50 [ 470.775758] batadv_hardif_enable_interface+0x26a/0xb30 [ 470.781114] batadv_softif_slave_add+0x8f/0x100 [ 470.785770] ? batadv_softif_slave_del+0xd0/0xd0 [ 470.790529] do_set_master+0x1ca/0x230 [ 470.794421] do_setlink+0x95d/0x34c0 [ 470.798133] ? rtnl_getlink+0x6a0/0x6a0 [ 470.802103] ? __lock_acquire+0x6ee/0x49c0 [ 470.806334] ? __lock_acquire+0x6ee/0x49c0 [ 470.810563] ? __lock_acquire+0x6ee/0x49c0 [ 470.814788] ? mark_held_locks+0x100/0x100 [ 470.819013] ? __lock_acquire+0x6ee/0x49c0 [ 470.823240] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.828098] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 470.833277] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 470.838287] ? validate_nla+0x32f/0x810 [ 470.842297] rtnl_newlink+0xbad/0x1610 [ 470.846244] ? rtnl_link_unregister+0x250/0x250 [ 470.850919] ? mark_held_locks+0x100/0x100 [ 470.855224] ? __lock_acquire+0x6ee/0x49c0 [ 470.859469] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.864322] ? __update_load_avg_se+0x5ec/0xa10 [ 470.869011] ? __lock_is_held+0xb6/0x140 [ 470.873090] ? mark_held_locks+0x100/0x100 [ 470.877327] ? debug_smp_processor_id+0x1c/0x20 [ 470.881991] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.886847] ? finish_task_switch+0x146/0x7c0 [ 470.891341] ? __lock_acquire+0x6ee/0x49c0 [ 470.895584] ? finish_task_switch+0x146/0x7c0 [ 470.900077] ? mark_held_locks+0xb1/0x100 [ 470.904223] ? mark_held_locks+0x100/0x100 [ 470.908474] ? debug_smp_processor_id+0x1c/0x20 [ 470.913166] ? perf_trace_lock_acquire+0xf5/0x580 [ 470.918000] ? finish_task_switch+0x146/0x7c0 [ 470.922503] ? __mutex_lock+0xa67/0x1300 [ 470.926579] ? find_held_lock+0x35/0x130 [ 470.930686] ? __lock_is_held+0x90/0x140 [ 470.934820] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 470.940381] ? rtnl_link_unregister+0x250/0x250 [ 470.945052] rtnetlink_rcv_msg+0x463/0xb00 [ 470.949299] ? rtnetlink_put_metrics+0x560/0x560 [ 470.954059] ? netdev_pick_tx+0x300/0x300 [ 470.958215] ? netlink_deliver_tap+0x22d/0xc20 [ 470.962806] ? find_held_lock+0x35/0x130 [ 470.966862] netlink_rcv_skb+0x17d/0x460 [ 470.970917] ? rtnetlink_put_metrics+0x560/0x560 [ 470.975682] ? netlink_ack+0xb30/0xb30 [ 470.979586] ? kasan_check_read+0x11/0x20 [ 470.983742] ? netlink_deliver_tap+0x254/0xc20 [ 470.988346] rtnetlink_rcv+0x1d/0x30 [ 470.992067] netlink_unicast+0x537/0x720 [ 470.996158] ? netlink_attachskb+0x770/0x770 [ 471.000566] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.006119] netlink_sendmsg+0x8ae/0xd70 [ 471.010193] ? netlink_unicast+0x720/0x720 [ 471.014439] ? selinux_socket_sendmsg+0x36/0x40 [ 471.019099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 471.024629] ? security_socket_sendmsg+0x8d/0xc0 [ 471.029476] ? netlink_unicast+0x720/0x720 [ 471.033701] sock_sendmsg+0xd7/0x130 [ 471.037403] ___sys_sendmsg+0x803/0x920 [ 471.041371] ? copy_msghdr_from_user+0x430/0x430 [ 471.046123] ? lock_downgrade+0x880/0x880 [ 471.050268] ? kasan_check_read+0x11/0x20 [ 471.054416] ? __fget+0x367/0x540 [ 471.057884] ? iterate_fd+0x360/0x360 [ 471.061692] ? __fget_light+0x1a9/0x230 [ 471.065756] ? __fdget+0x1b/0x20 [ 471.069114] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.074645] __sys_sendmsg+0x105/0x1d0 [ 471.078801] ? __ia32_sys_shutdown+0x80/0x80 [ 471.083209] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 471.087970] ? do_syscall_64+0x26/0x620 [ 471.091946] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.097294] ? do_syscall_64+0x26/0x620 [ 471.101268] __x64_sys_sendmsg+0x78/0xb0 [ 471.105331] do_syscall_64+0xfd/0x620 [ 471.109142] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 471.114333] RIP: 0033:0x45a639 [ 471.117513] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:57:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, 0x0, 0x4000000000dc) [ 471.136519] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 471.144628] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 471.151899] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 471.159166] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 471.166435] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 471.173697] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 17:57:28 executing program 4 (fault-call:6 fault-nth:9): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000100)={@random="7525820aedb8", @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast1}, @gre}}}}, 0x0) 17:57:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x0, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) 17:57:28 executing program 2: r0 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='(procem1\x00', 0xfffffffffffffffa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r3, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) poll(&(0x7f0000000040)=[{r3}], 0x7, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000005c0)) r4 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) r5 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r5, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, 0x0, 0x0) poll(&(0x7f0000000040)=[{r5}], 0x7, 0x0) r6 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r6, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x2}, 0x1c) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, 0x0, 0x0) poll(&(0x7f0000000040)=[{r6}], 0x7, 0x0) r7 = dup3(r5, r6, 0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='selinux1em0cgroupself{[vmnet0bdev(\x98system\x00', r7}, 0x10) r8 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r4, r8, &(0x7f0000000240)=0x202, 0x4000000000dc) socket$nl_route(0x10, 0x3, 0x0) r9 = syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(r8, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="ee9e47f5", @ANYRES16=r9, @ANYBLOB="050c27bd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x8040) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f00000006c0)=""/208) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x180800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r9, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x80}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000140)={r0, 0xd0, 0x53}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'ghash-ce\x00'}}, &(0x7f0000000240)="86f9256f7e0e8fb94a2e753220a6cfe4594c2db0490f6a48cbed026e58692062e905f16e7de718c0afc2f9f8ca8f53ac20821d12e6dccfac758515ba43c7627eebd6a21c7e4467093d48389613fee1f3deb45e05a5b6a24063d58cdf009b1016e976bd2d3e2b13192a09d0393cb381288c73ce309c6487fda7192783dbf4bb44229fee015f55514c9feae0c46acc0b30610e07d456cb46a8e25c1d488f9b2914cfa6fec21e8ac3ebdede180ed77fc897b808385af08232fac56aa5184170958c92ca85437cc6c5ea459449754811bf3f", &(0x7f0000000340)="4060e7aa437395571c7a930f426e325c0ea10a1356702426c6e2299eafc43899d0427a3a0ceb7111ee1e755dcbc12011d65982e6e45f89f9de4c7cc0c82092e653d12975283f27af766f558bd59af03c1a19f3") openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init() [ 471.525780] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:28 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101000, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)={r5, 0x0, 0x0, 0xfffffffffffffff9, 0x24}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x800400, 0x0) sendmsg$FOU_CMD_ADD(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x60, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x89}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x16}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2e}, @FOU_ATTR_LOCAL_V4={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0x1}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @remote}}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @local}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x6c}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x50) ioctl$BLKGETSIZE64(r5, 0x80081272, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @aes256, 0x4, "7d9ef270f9ec4dc0"}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f00000001c0)={0x1, 0x23, 0x800, 0x3, 0x53, 0x0, 0x9}, 0xc) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 471.610890] FAULT_INJECTION: forcing a failure. [ 471.610890] name failslab, interval 1, probability 0, space 0, times 0 [ 471.694446] CPU: 0 PID: 15070 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 471.702775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 471.702785] Call Trace: [ 471.702813] dump_stack+0x197/0x210 [ 471.702840] should_fail.cold+0xa/0x1b [ 471.702863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 471.714820] ? lock_downgrade+0x880/0x880 [ 471.714851] __should_failslab+0x121/0x190 [ 471.714877] should_failslab+0x9/0x14 [ 471.722378] __kmalloc_track_caller+0x2de/0x750 17:57:28 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a}}, 0x50) [ 471.722400] ? __lock_acquire+0x6ee/0x49c0 [ 471.722418] ? kstrdup_const+0x66/0x80 [ 471.722434] kstrdup+0x3a/0x70 [ 471.722450] kstrdup_const+0x66/0x80 [ 471.759367] __kernfs_new_node+0xb0/0x680 [ 471.763529] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 471.768283] ? perf_trace_lock_acquire+0xf5/0x580 [ 471.773121] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.778661] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 471.778681] ? find_held_lock+0x35/0x130 [ 471.778699] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 471.778725] kernfs_new_node+0x99/0x130 [ 471.778742] kernfs_create_link+0xdd/0x250 [ 471.778759] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 471.788635] sysfs_create_link+0x65/0xc0 [ 471.788658] netdev_adjacent_sysfs_add+0xc2/0x100 [ 471.788674] ? napi_disable+0xc0/0xc0 [ 471.788695] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.788711] ? sysfs_do_create_link_sd.isra.0+0xbb/0x130 [ 471.788734] __netdev_adjacent_dev_insert+0x4c7/0x700 [ 471.798165] __netdev_upper_dev_link+0x259/0x340 [ 471.798182] ? find_held_lock+0x35/0x130 [ 471.798201] ? netdev_upper_dev_unlink+0x190/0x190 [ 471.807977] ? lock_downgrade+0x880/0x880 [ 471.807998] ? kasan_check_read+0x11/0x20 [ 471.808018] netdev_master_upper_dev_link+0x3a/0x50 [ 471.808040] batadv_hardif_enable_interface+0x26a/0xb30 [ 471.808064] batadv_softif_slave_add+0x8f/0x100 [ 471.808085] ? batadv_softif_slave_del+0xd0/0xd0 [ 471.816962] do_set_master+0x1ca/0x230 [ 471.816983] do_setlink+0x95d/0x34c0 [ 471.817002] ? mark_held_locks+0x100/0x100 [ 471.817021] ? rtnl_getlink+0x6a0/0x6a0 [ 471.826369] ? __lock_acquire+0x6ee/0x49c0 [ 471.826490] ? is_bpf_text_address+0xac/0x170 [ 471.826510] ? __lock_acquire+0x6ee/0x49c0 [ 471.837162] ? __lock_acquire+0x6ee/0x49c0 [ 471.837176] ? mark_held_locks+0x100/0x100 [ 471.837194] ? __lock_acquire+0x6ee/0x49c0 [ 471.837209] ? perf_trace_lock_acquire+0xf5/0x580 [ 471.837226] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 471.837243] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 471.846136] ? validate_nla+0x32f/0x810 [ 471.846170] rtnl_newlink+0xbad/0x1610 [ 471.846200] ? rtnl_link_unregister+0x250/0x250 [ 471.846217] ? mark_held_locks+0x100/0x100 [ 471.855280] ? debug_smp_processor_id+0x1c/0x20 [ 471.855307] ? is_bpf_text_address+0xac/0x170 [ 471.855325] ? find_held_lock+0x35/0x130 [ 471.855341] ? is_bpf_text_address+0xac/0x170 [ 471.855359] ? __lock_acquire+0x6ee/0x49c0 [ 471.864585] ? __lock_acquire+0x6ee/0x49c0 [ 471.864601] ? lock_downgrade+0x880/0x880 [ 471.864631] ? mark_held_locks+0x100/0x100 [ 471.864648] ? debug_smp_processor_id+0x1c/0x20 [ 471.864665] ? perf_trace_lock_acquire+0xf5/0x580 [ 471.874695] ? debug_smp_processor_id+0x1c/0x20 [ 471.874716] ? avc_has_perm_noaudit+0x38f/0x570 [ 471.874738] ? __lock_acquire+0x6ee/0x49c0 [ 471.874769] ? mark_held_locks+0x100/0x100 [ 471.883426] ? debug_smp_processor_id+0x1c/0x20 [ 471.883443] ? perf_trace_lock_acquire+0xf5/0x580 [ 471.883508] ? find_held_lock+0x35/0x130 [ 471.895389] ? rtnetlink_rcv_msg+0x3d0/0xb00 [ 471.895412] ? __lock_is_held+0x90/0x140 [ 471.895440] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 471.895457] ? rtnl_link_unregister+0x250/0x250 [ 471.895472] rtnetlink_rcv_msg+0x463/0xb00 [ 471.895490] ? rtnetlink_put_metrics+0x560/0x560 [ 471.904209] ? netdev_pick_tx+0x300/0x300 [ 471.904230] ? netlink_deliver_tap+0x22d/0xc20 [ 471.904248] ? find_held_lock+0x35/0x130 [ 471.904268] netlink_rcv_skb+0x17d/0x460 [ 472.073082] ? rtnetlink_put_metrics+0x560/0x560 [ 472.077849] ? netlink_ack+0xb30/0xb30 [ 472.081726] ? kasan_check_read+0x11/0x20 [ 472.085873] ? netlink_deliver_tap+0x254/0xc20 [ 472.090917] rtnetlink_rcv+0x1d/0x30 [ 472.094629] netlink_unicast+0x537/0x720 [ 472.098697] ? netlink_attachskb+0x770/0x770 [ 472.103132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.108659] netlink_sendmsg+0x8ae/0xd70 [ 472.112729] ? netlink_unicast+0x720/0x720 [ 472.116969] ? selinux_socket_sendmsg+0x36/0x40 [ 472.121639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.127189] ? security_socket_sendmsg+0x8d/0xc0 [ 472.131963] ? netlink_unicast+0x720/0x720 [ 472.136248] sock_sendmsg+0xd7/0x130 [ 472.139970] ___sys_sendmsg+0x803/0x920 [ 472.143938] ? copy_msghdr_from_user+0x430/0x430 [ 472.148717] ? lock_downgrade+0x880/0x880 [ 472.152876] ? kasan_check_read+0x11/0x20 [ 472.157018] ? __fget+0x367/0x540 [ 472.160464] ? iterate_fd+0x360/0x360 [ 472.164259] ? __fget_light+0x1a9/0x230 [ 472.168239] ? __fdget+0x1b/0x20 [ 472.171611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.177147] __sys_sendmsg+0x105/0x1d0 [ 472.181027] ? __ia32_sys_shutdown+0x80/0x80 [ 472.185439] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 472.190185] ? do_syscall_64+0x26/0x620 [ 472.194204] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.199656] ? do_syscall_64+0x26/0x620 [ 472.203651] __x64_sys_sendmsg+0x78/0xb0 [ 472.207787] do_syscall_64+0xfd/0x620 [ 472.211609] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.216797] RIP: 0033:0x45a639 [ 472.220016] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 17:57:29 executing program 4 (fault-call:6 fault-nth:10): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) [ 472.239960] RSP: 002b:00007f4b60222c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 472.247729] RAX: ffffffffffffffda RBX: 00007f4b60222c90 RCX: 000000000045a639 [ 472.254998] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 472.262442] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 472.269781] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602236d4 [ 472.277120] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 17:57:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r0, r1, &(0x7f0000000880)=0x202, 0x4000000000dc) 17:57:29 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg$inet(r0, &(0x7f00000035c0)=[{{&(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10, 0x0}}], 0x1, 0x0) 17:57:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x0, 0x1, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 472.423584] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 472.515733] FAULT_INJECTION: forcing a failure. [ 472.515733] name failslab, interval 1, probability 0, space 0, times 0 17:57:29 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0xc, 0x4, 0xa, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) 17:57:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x0, 0x0, [0xc]}}, 0x50) [ 472.634634] CPU: 1 PID: 15100 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 472.642518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 472.651891] Call Trace: [ 472.654513] dump_stack+0x197/0x210 [ 472.658178] should_fail.cold+0xa/0x1b [ 472.662092] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 472.667233] ? lock_downgrade+0x880/0x880 [ 472.671416] __should_failslab+0x121/0x190 [ 472.675675] should_failslab+0x9/0x14 [ 472.679489] kmem_cache_alloc+0x2ae/0x700 [ 472.683640] ? memcpy+0x46/0x50 [ 472.686930] ? kstrdup+0x5a/0x70 [ 472.690311] __kernfs_new_node+0xef/0x680 [ 472.694484] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 472.699266] ? perf_trace_lock_acquire+0xf5/0x580 [ 472.704120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.709677] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 472.715416] ? find_held_lock+0x35/0x130 [ 472.719494] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 472.724989] kernfs_new_node+0x99/0x130 [ 472.729001] kernfs_create_link+0xdd/0x250 [ 472.733253] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 472.738540] sysfs_create_link+0x65/0xc0 [ 472.742622] netdev_adjacent_sysfs_add+0xc2/0x100 [ 472.747935] ? napi_disable+0xc0/0xc0 [ 472.751755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.757312] ? sysfs_do_create_link_sd.isra.0+0xbb/0x130 [ 472.762787] __netdev_adjacent_dev_insert+0x4c7/0x700 [ 472.768001] __netdev_upper_dev_link+0x259/0x340 [ 472.772791] ? find_held_lock+0x35/0x130 [ 472.776877] ? netdev_upper_dev_unlink+0x190/0x190 [ 472.781838] ? lock_downgrade+0x880/0x880 [ 472.786007] ? kasan_check_read+0x11/0x20 [ 472.790180] netdev_master_upper_dev_link+0x3a/0x50 [ 472.795250] batadv_hardif_enable_interface+0x26a/0xb30 [ 472.800641] batadv_softif_slave_add+0x8f/0x100 [ 472.805328] ? batadv_softif_slave_del+0xd0/0xd0 [ 472.805347] do_set_master+0x1ca/0x230 [ 472.805364] do_setlink+0x95d/0x34c0 [ 472.805391] ? rtnl_getlink+0x6a0/0x6a0 [ 472.805413] ? __lock_acquire+0x6ee/0x49c0 [ 472.805436] ? __lock_acquire+0x6ee/0x49c0 [ 472.805458] ? __lock_acquire+0x6ee/0x49c0 17:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) 17:57:29 executing program 5: creat(0x0, 0x0) socket$inet(0x10, 0x3, 0x20000000006) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x44, r1, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x2000040}, 0x0) perf_event_open(&(0x7f00000011c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001240)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2c0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x6, @perf_config_ext={0xd96, 0x3ff}, 0x1100, 0x0, 0x4, 0x7, 0x3, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) keyctl$set_timeout(0xf, r3, 0x0) request_key(0x0, &(0x7f0000000040)={'syz'}, &(0x7f00000000c0)='-&wlan1vmnet1\xf5eth1\'}selinux$\x00', r3) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, &(0x7f0000000140)="5d825ef375e6076bffcb64f57ebdae463e867019f28eee39b2921cd6fc4601adc7b21157af28d5a9557edb7a1b1c9b2ffa88e47449b87410664ee46fdcc6ba461520c3cd144460b7cb01df39d5ffce975193994a8f80326a4959810834f8549e44c97973c80ade4a90017d47a753ac23b59d6a20f4f469433fd08558301d41a8ba01ac3c9cf4d81d84a3f0dfef3a118c49", 0x91) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x3, r2, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) creat(0x0, 0xb1) [ 472.805468] ? mark_held_locks+0x100/0x100 [ 472.805490] ? __lock_acquire+0x6ee/0x49c0 [ 472.814135] ? perf_trace_lock_acquire+0xf5/0x580 [ 472.814156] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 472.814172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 472.814190] ? validate_nla+0x32f/0x810 [ 472.814215] rtnl_newlink+0xbad/0x1610 [ 472.826124] ? rtnl_link_unregister+0x250/0x250 [ 472.826144] ? mark_held_locks+0x100/0x100 [ 472.826191] ? __lock_acquire+0x6ee/0x49c0 [ 472.847946] ? perf_trace_lock_acquire+0xf5/0x580 [ 472.847969] ? __lock_is_held+0xb6/0x140 [ 472.847997] ? mark_held_locks+0x100/0x100 [ 472.848018] ? debug_smp_processor_id+0x1c/0x20 [ 472.848039] ? perf_trace_lock_acquire+0xf5/0x580 [ 472.858236] ? finish_task_switch+0x146/0x7c0 [ 472.858257] ? __lock_acquire+0x6ee/0x49c0 [ 472.858271] ? finish_task_switch+0x146/0x7c0 [ 472.858289] ? mark_held_locks+0xb1/0x100 [ 472.858314] ? mark_held_locks+0x100/0x100 [ 472.858335] ? debug_smp_processor_id+0x1c/0x20 [ 472.858349] ? perf_trace_lock_acquire+0xf5/0x580 [ 472.858363] ? finish_task_switch+0x146/0x7c0 [ 472.858381] ? __mutex_lock+0xa67/0x1300 [ 472.858398] ? find_held_lock+0x35/0x130 [ 472.858461] ? __lock_is_held+0x90/0x140 [ 472.875212] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.875231] ? rtnl_link_unregister+0x250/0x250 [ 472.875246] rtnetlink_rcv_msg+0x463/0xb00 [ 472.875267] ? rtnetlink_put_metrics+0x560/0x560 [ 472.875289] ? netdev_pick_tx+0x300/0x300 [ 472.875306] ? netlink_deliver_tap+0x22d/0xc20 [ 472.875324] ? find_held_lock+0x35/0x130 17:57:30 executing program 4 (fault-call:6 fault-nth:11): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff06, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) 17:57:30 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) [ 472.875342] netlink_rcv_skb+0x17d/0x460 [ 472.875357] ? rtnetlink_put_metrics+0x560/0x560 [ 472.884519] ? netlink_ack+0xb30/0xb30 [ 472.884539] ? kasan_check_read+0x11/0x20 [ 472.884560] ? netlink_deliver_tap+0x254/0xc20 [ 472.884585] rtnetlink_rcv+0x1d/0x30 [ 472.884600] netlink_unicast+0x537/0x720 [ 472.902397] ? netlink_attachskb+0x770/0x770 [ 472.902423] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.902442] netlink_sendmsg+0x8ae/0xd70 [ 472.902467] ? netlink_unicast+0x720/0x720 [ 472.902489] ? selinux_socket_sendmsg+0x36/0x40 [ 472.902505] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 472.916702] ? security_socket_sendmsg+0x8d/0xc0 [ 472.916722] ? netlink_unicast+0x720/0x720 [ 472.916739] sock_sendmsg+0xd7/0x130 [ 472.916755] ___sys_sendmsg+0x803/0x920 [ 472.916773] ? copy_msghdr_from_user+0x430/0x430 [ 472.916800] ? lock_downgrade+0x880/0x880 [ 472.916820] ? kasan_check_read+0x11/0x20 [ 472.916838] ? __fget+0x367/0x540 [ 472.916855] ? iterate_fd+0x360/0x360 [ 472.916875] ? __fget_light+0x1a9/0x230 [ 472.916889] ? __fdget+0x1b/0x20 [ 472.934774] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 472.934801] __sys_sendmsg+0x105/0x1d0 [ 472.934821] ? __ia32_sys_shutdown+0x80/0x80 [ 472.934853] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 472.943395] ? do_syscall_64+0x26/0x620 [ 472.943415] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.943431] ? do_syscall_64+0x26/0x620 [ 472.957083] __x64_sys_sendmsg+0x78/0xb0 [ 472.957108] do_syscall_64+0xfd/0x620 [ 472.957130] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 472.957141] RIP: 0033:0x45a639 [ 472.957156] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 472.957164] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 472.957183] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 472.957190] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 472.957197] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 472.957205] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 472.957213] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 17:57:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(0x0, 0x100, 0x85) pipe(0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000880)='ppp0$\x00', 0xfffffffffffffff9) request_key(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f0000000180)='syz0\x00', 0xfffffffffffffffd) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000002c0)=@sco={0x1f, {0xfa, 0x40, 0x80, 0x6, 0x0, 0x1}}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000400)="4652362469fedf060f5f80ac31f7e5755efdd5483d4e302cba7cf5db83dfdcce42514078bd80319106ba7765128e5b7287e08c4e3903632f765b97201fd0cda0e38368092008efdeabd9743f49cda6d65cb143dd97ecc189c994982d0e2b8f042b5d67d53d0db38fd459ef21f2c47188b7e0ccc782e359795928c2b0c7cfafc25de445e683aa9c8ad55504b60ba7c6", 0x8f}, {&(0x7f00000004c0)}, {&(0x7f0000000540)="77396861ae9e1396ca7af710283d31899f6ea134e0fb7a4e6be6b018a5306ee1f13d98fa0a0fd1ff5341c5177e55910696f17aa868376f0fe393e00a64f5b635d536962bf65dabe5317b3873edf2822755402d1cc5ae5bccafabd7618e20ca90d2", 0x61}], 0x3, &(0x7f00000005c0)=[@mark={{0x14, 0x1, 0x24, 0x4}}], 0x18}, 0x0) openat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, 0x3c) syz_open_procfs(0x0, &(0x7f0000000300)='oom_score_adj\x00') writev(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) syz_open_dev$dmmidi(0x0, 0x9, 0x100) syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, 0x0) fstatfs(r2, &(0x7f00000004c0)=""/58) pipe(&(0x7f0000000000)) r3 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000280)='trusted.overlay.upper\x00', &(0x7f0000000980)=ANY=[@ANYBLOB="00fbe9013fad1b27b0d42e4492e8428447583da8d63e9bfb44fb45143c680e04c33b58851e18dfb0c5af90d05725e372d23920b67176d350b827fe5f66b0edae9c3e706b99d261d19ef1a9b9617ed55792e8f3826bd988daa000064466f65cdb935282659c226e9f361b13ae53cf2e8980f979dec689847c3ae4eed699dffa146b0e1d42673e876f3392b307d8db59f4d861de0d9294bdb0a7046c7ea1dc92f69053aaebbf2b12b83435213551ee9393af87cfb798ee004fdb8e04d5bccf36644ff5bcadd17f68dd359288cb581743d658e8c4ec9c4c417dc70eebd424"], 0xe9, 0x1) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) [ 473.297982] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 17:57:30 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000600)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000300)={0x50, 0x0, 0x1, {0x7, 0x8, 0x0, 0x21000a, 0x0, 0x0, 0x0, 0x0, [0xc00]}}, 0x50) [ 473.360234] FAULT_INJECTION: forcing a failure. [ 473.360234] name failslab, interval 1, probability 0, space 0, times 0 [ 473.372605] CPU: 1 PID: 15130 Comm: syz-executor.4 Not tainted 4.19.86-syzkaller #0 [ 473.380448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.389813] Call Trace: [ 473.392420] dump_stack+0x197/0x210 [ 473.396087] should_fail.cold+0xa/0x1b [ 473.399993] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 473.405118] ? lock_downgrade+0x880/0x880 17:57:30 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14, 0x4, 0xa, 0x1}, 0x14}}, 0x0) fcntl$setstatus(r2, 0x4, 0xc00) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0xffffffff, 0x2) [ 473.409278] __should_failslab+0x121/0x190 [ 473.413519] should_failslab+0x9/0x14 [ 473.417325] kmem_cache_alloc_node+0x26c/0x710 [ 473.421919] __alloc_skb+0xd5/0x5f0 [ 473.425551] ? skb_scrub_packet+0x490/0x490 [ 473.429877] ? if_nlmsg_size+0x4ad/0x9f0 [ 473.434046] rtmsg_ifinfo_build_skb+0x74/0x1a0 [ 473.438648] rtmsg_ifinfo_event.part.0+0x43/0xe0 [ 473.443419] rtnetlink_event+0x12c/0x150 [ 473.447499] notifier_call_chain+0xc2/0x230 [ 473.451845] raw_notifier_call_chain+0x2e/0x40 [ 473.456443] call_netdevice_notifiers_info+0x3f/0x90 [ 473.461656] __netdev_upper_dev_link+0x282/0x340 [ 473.466438] ? find_held_lock+0x35/0x130 [ 473.470522] ? netdev_upper_dev_unlink+0x190/0x190 [ 473.475481] ? lock_downgrade+0x880/0x880 [ 473.479649] ? kasan_check_read+0x11/0x20 [ 473.483819] netdev_master_upper_dev_link+0x3a/0x50 [ 473.488891] batadv_hardif_enable_interface+0x26a/0xb30 [ 473.494316] batadv_softif_slave_add+0x8f/0x100 [ 473.499035] ? batadv_softif_slave_del+0xd0/0xd0 [ 473.503783] do_set_master+0x1ca/0x230 [ 473.507672] do_setlink+0x95d/0x34c0 [ 473.511387] ? finish_task_switch+0x146/0x7c0 [ 473.515889] ? find_held_lock+0x35/0x130 [ 473.519959] ? rtnl_getlink+0x6a0/0x6a0 [ 473.523928] ? __lock_acquire+0x6ee/0x49c0 [ 473.528158] ? finish_task_switch+0x146/0x7c0 [ 473.532647] ? _raw_spin_unlock_irq+0x28/0x90 [ 473.537147] ? lockdep_hardirqs_on+0x415/0x5d0 [ 473.541734] ? trace_hardirqs_on+0x67/0x220 [ 473.546067] ? __lock_acquire+0x6ee/0x49c0 [ 473.550299] ? mark_held_locks+0x100/0x100 [ 473.554527] ? __lock_acquire+0x6ee/0x49c0 [ 473.558763] ? perf_trace_lock_acquire+0xf5/0x580 [ 473.563597] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 473.568775] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 473.573798] ? validate_nla+0x32f/0x810 [ 473.577789] rtnl_newlink+0xbad/0x1610 [ 473.581758] ? rtnl_link_unregister+0x250/0x250 [ 473.586450] ? mark_held_locks+0x100/0x100 [ 473.590739] ? __lock_acquire+0x6ee/0x49c0 [ 473.595001] ? perf_trace_lock_acquire+0xf5/0x580 [ 473.599846] ? __update_load_avg_se+0x5ec/0xa10 [ 473.604514] ? __lock_is_held+0xb6/0x140 [ 473.608588] ? mark_held_locks+0x100/0x100 [ 473.612828] ? debug_smp_processor_id+0x1c/0x20 [ 473.617505] ? perf_trace_lock_acquire+0xf5/0x580 [ 473.622356] ? finish_task_switch+0x146/0x7c0 [ 473.626860] ? __lock_acquire+0x6ee/0x49c0 [ 473.631103] ? finish_task_switch+0x146/0x7c0 [ 473.635610] ? mark_held_locks+0xb1/0x100 [ 473.639767] ? mark_held_locks+0x100/0x100 [ 473.643997] ? debug_smp_processor_id+0x1c/0x20 [ 473.648660] ? perf_trace_lock_acquire+0xf5/0x580 [ 473.653504] ? finish_task_switch+0x146/0x7c0 [ 473.658016] ? __mutex_lock+0xa67/0x1300 [ 473.662079] ? find_held_lock+0x35/0x130 [ 473.666197] ? __lock_is_held+0x90/0x140 [ 473.670272] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.675817] ? rtnl_link_unregister+0x250/0x250 [ 473.680493] rtnetlink_rcv_msg+0x463/0xb00 [ 473.684726] ? rtnetlink_put_metrics+0x560/0x560 [ 473.686838] ------------[ cut here ]------------ [ 473.689487] ? netdev_pick_tx+0x300/0x300 [ 473.689506] ? netlink_deliver_tap+0x22d/0xc20 [ 473.689528] ? find_held_lock+0x35/0x130 [ 473.695140] WARNING: CPU: 0 PID: 35 at net/batman-adv/bat_iv_ogm.c:597 batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 473.699334] netlink_rcv_skb+0x17d/0x460 [ 473.703895] Kernel panic - not syncing: panic_on_warn set ... [ 473.703895] [ 473.707959] ? rtnetlink_put_metrics+0x560/0x560 [ 473.735680] ? netlink_ack+0xb30/0xb30 [ 473.739563] ? kasan_check_read+0x11/0x20 [ 473.743713] ? netlink_deliver_tap+0x254/0xc20 [ 473.748307] rtnetlink_rcv+0x1d/0x30 [ 473.752031] netlink_unicast+0x537/0x720 [ 473.756092] ? netlink_attachskb+0x770/0x770 [ 473.760499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.766037] netlink_sendmsg+0x8ae/0xd70 [ 473.770101] ? netlink_unicast+0x720/0x720 [ 473.774339] ? selinux_socket_sendmsg+0x36/0x40 [ 473.779000] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.784535] ? security_socket_sendmsg+0x8d/0xc0 [ 473.789285] ? netlink_unicast+0x720/0x720 [ 473.793535] sock_sendmsg+0xd7/0x130 [ 473.797257] ___sys_sendmsg+0x803/0x920 [ 473.801228] ? copy_msghdr_from_user+0x430/0x430 [ 473.805998] ? lock_downgrade+0x880/0x880 [ 473.810142] ? kasan_check_read+0x11/0x20 [ 473.814286] ? __fget+0x367/0x540 [ 473.817739] ? iterate_fd+0x360/0x360 [ 473.821539] ? __fget_light+0x1a9/0x230 [ 473.825507] ? __fdget+0x1b/0x20 [ 473.828871] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 473.834407] __sys_sendmsg+0x105/0x1d0 [ 473.838291] ? __ia32_sys_shutdown+0x80/0x80 [ 473.842710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 473.847461] ? do_syscall_64+0x26/0x620 [ 473.851434] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.856796] ? do_syscall_64+0x26/0x620 [ 473.860771] __x64_sys_sendmsg+0x78/0xb0 [ 473.864831] do_syscall_64+0xfd/0x620 [ 473.868628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 473.873813] RIP: 0033:0x45a639 [ 473.877015] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 473.895912] RSP: 002b:00007f4b60201c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 473.903619] RAX: ffffffffffffffda RBX: 00007f4b60201c90 RCX: 000000000045a639 [ 473.910884] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 473.918147] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 473.925411] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4b602026d4 [ 473.932704] R13: 00000000004c8d75 R14: 00000000004df5e0 R15: 0000000000000006 [ 473.940035] CPU: 0 PID: 35 Comm: kworker/u4:2 Not tainted 4.19.86-syzkaller #0 [ 473.947518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 473.954091] batman_adv: batadv0: Adding interface: veth139 [ 473.956904] Workqueue: bat_events batadv_iv_send_outstanding_bat_ogm_packet [ 473.956915] Call Trace: [ 473.956936] dump_stack+0x197/0x210 [ 473.957036] panic+0x26a/0x50e [ 473.957052] ? __warn_printk+0xf3/0xf3 [ 473.963230] kobject: 'iosched' (00000000dfedb14a): kobject_cleanup, parent (null) [ 473.969813] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 473.969830] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.969843] ? __warn.cold+0x5/0x53 [ 473.969852] ? __warn+0xe8/0x1d0 [ 473.969871] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 473.972546] batman_adv: batadv0: The MTU of interface veth139 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 473.976063] __warn.cold+0x20/0x53 [ 473.976079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.976095] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 473.976111] report_bug+0x263/0x2b0 [ 473.976231] do_error_trap+0x204/0x360 [ 473.976247] ? math_error+0x340/0x340 [ 473.982373] batman_adv: batadv0: Not using interface veth139 (retrying later): interface not active [ 473.983337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 473.992209] kobject: 'iosched' (00000000dfedb14a): calling ktype release [ 473.998576] ? wake_up_klogd+0x99/0xd0 [ 473.998588] ? vprintk_emit+0x264/0x690 [ 473.998612] ? error_entry+0x7c/0xe0 [ 473.998628] ? trace_hardirqs_off_caller+0x65/0x220 [ 473.998649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 474.005446] kobject: 'iosched': free name [ 474.007798] do_invalid_op+0x1b/0x20 [ 474.007816] invalid_op+0x14/0x20 [ 474.019815] kobject: 'loop0' (00000000e9142d81): kobject_cleanup, parent (null) [ 474.042476] RIP: 0010:batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 474.042490] Code: a4 ff ff e8 83 29 97 fa 48 c7 c7 00 55 fb 87 e8 8b 8d 81 fa e9 7d a4 ff ff e8 6d 29 97 fa 48 c7 c7 c0 51 fb 87 e8 75 8d 81 fa <0f> 0b e9 65 a4 ff ff e8 55 29 97 fa 48 c7 c7 c0 51 fb 87 e8 5d 8d [ 474.042498] RSP: 0018:ffff8880a989fcc8 EFLAGS: 00010282 [ 474.042510] RAX: 0000000000000024 RBX: ffff88808c0a8388 RCX: 0000000000000000 [ 474.042517] RDX: 0000000000000000 RSI: ffffffff815595f6 RDI: ffffed1015313f8b [ 474.042531] RBP: ffff8880a989fd30 R08: 0000000000000024 R09: ffffed1015d05079 [ 474.062783] kobject: 'loop0' (00000000e9142d81): calling ktype release [ 474.066036] R10: ffffed1015d05078 R11: ffff8880ae8283c7 R12: ffff8880856b4a40 [ 474.066046] R13: ffff8880869e8dc0 R14: ffff88808c0a8340 R15: ffff8880856b4a40 [ 474.066079] ? vprintk_func+0x86/0x189 [ 474.066104] ? batadv_iv_send_outstanding_bat_ogm_packet.cold+0x3f/0x46 [ 474.066201] process_one_work+0x989/0x1750 [ 474.072235] kobject: 'queue' (00000000fa2655ee): kobject_cleanup, parent (null) [ 474.079147] ? pwq_dec_nr_in_flight+0x320/0x320 [ 474.079164] ? lock_acquire+0x16f/0x3f0 [ 474.079182] ? kasan_check_write+0x14/0x20 [ 474.079200] ? do_raw_spin_lock+0xc8/0x240 [ 474.085688] kobject: 'queue' (00000000fa2655ee): calling ktype release [ 474.091614] worker_thread+0x98/0xe40 [ 474.091644] kthread+0x354/0x420 [ 474.095901] kobject: 'queue': free name [ 474.099635] ? process_one_work+0x1750/0x1750 [ 474.099651] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 474.099672] ret_from_fork+0x24/0x30 [ 474.103427] kobject: '0' (000000007d3cbfc9): kobject_cleanup, parent (null) [ 474.114884] Kernel Offset: disabled [ 474.292046] Rebooting in 86400 seconds..