[info] Using makefile-style concurrent boot in runlevel 2. [ 27.022002] audit: type=1800 audit(1545085754.479:21): pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.987793] sshd (5984) used greatest stack depth: 15744 bytes left Warning: Permanently added '10.128.0.61' (ECDSA) to the list of known hosts. 2018/12/17 22:29:27 fuzzer started 2018/12/17 22:29:29 dialing manager at 10.128.0.26:34701 2018/12/17 22:29:29 syscalls: 1 2018/12/17 22:29:29 code coverage: enabled 2018/12/17 22:29:29 comparison tracing: enabled 2018/12/17 22:29:29 setuid sandbox: enabled 2018/12/17 22:29:29 namespace sandbox: enabled 2018/12/17 22:29:29 Android sandbox: /sys/fs/selinux/policy does not exist 2018/12/17 22:29:29 fault injection: enabled 2018/12/17 22:29:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/12/17 22:29:29 net packet injection: enabled 2018/12/17 22:29:29 net device setup: enabled 22:33:06 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x80000031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0xff, 0x0) mlock2(&(0x7f0000f99000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000324000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x2000000000002) [ 258.948260] IPVS: ftp: loaded support on port[0] = 21 22:33:06 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x9) [ 259.225233] IPVS: ftp: loaded support on port[0] = 21 22:33:06 executing program 2: r0 = msgget(0x1, 0x0) msgsnd(r0, 0x0, 0x0, 0x0) [ 259.560324] IPVS: ftp: loaded support on port[0] = 21 22:33:07 executing program 3: r0 = gettid() ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lstat(0x0, 0x0) getcwd(0x0, 0x0) getgroups(0xf5b8ad03, 0x0) shmctl$IPC_SET(0x0, 0x1, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x1ea) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(0x0, 0x0, 0x0, 0xffffffffffffff0c, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) io_submit(0x0, 0x154, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) chmod(0x0, 0x0) tkill(r0, 0x1000000000016) [ 260.021686] IPVS: ftp: loaded support on port[0] = 21 22:33:07 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setitimer(0x4, 0x0, 0x0) [ 260.365002] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.372823] bridge0: port 1(bridge_slave_0) entered disabled state [ 260.392432] device bridge_slave_0 entered promiscuous mode [ 260.521914] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.532270] IPVS: ftp: loaded support on port[0] = 21 [ 260.545725] bridge0: port 2(bridge_slave_1) entered disabled state [ 260.553095] device bridge_slave_1 entered promiscuous mode [ 260.669054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 22:33:08 executing program 5: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x9, 0x40000000000031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@acquire={0x40106309}], 0x0, 0x0, 0x0}) [ 260.825258] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.071676] IPVS: ftp: loaded support on port[0] = 21 [ 261.269086] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 261.397285] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.403739] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.427799] device bridge_slave_0 entered promiscuous mode [ 261.443388] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 261.515774] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.522188] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.543968] device bridge_slave_1 entered promiscuous mode [ 261.648251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 261.728358] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.755484] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.768598] device bridge_slave_0 entered promiscuous mode [ 261.780494] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 261.889110] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.921332] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.928608] device bridge_slave_1 entered promiscuous mode [ 262.049285] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.102733] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 262.111100] team0: Port device team_slave_0 added [ 262.145077] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.240576] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.249573] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.262304] device bridge_slave_0 entered promiscuous mode [ 262.274703] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.306248] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 262.315652] team0: Port device team_slave_1 added [ 262.384142] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.416705] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.424059] device bridge_slave_1 entered promiscuous mode [ 262.436136] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.451075] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.497121] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 262.531692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 262.582592] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.638610] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 262.675024] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 262.765435] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.771795] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.780869] device bridge_slave_0 entered promiscuous mode [ 262.788030] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.802155] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.812832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.910621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.936347] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.942708] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.977664] device bridge_slave_1 entered promiscuous mode [ 262.992814] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.009588] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.068870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.088717] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 263.194361] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 263.205953] team0: Port device team_slave_0 added [ 263.216310] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.226923] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 263.234268] team0: Port device team_slave_0 added [ 263.258546] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 263.320941] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 263.345828] team0: Port device team_slave_1 added [ 263.364092] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 263.386492] team0: Port device team_slave_1 added [ 263.486269] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.505308] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.581520] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.622807] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.645048] bridge0: port 1(bridge_slave_0) entered disabled state [ 263.655924] device bridge_slave_0 entered promiscuous mode [ 263.669197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.707823] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 263.730506] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.749294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.787094] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.793454] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.800980] device bridge_slave_1 entered promiscuous mode [ 263.810094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 263.819841] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 263.831767] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.845972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 263.886522] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 263.896382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.914214] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 263.948370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 263.963373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 263.974377] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 263.996425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.004821] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.055109] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 264.062708] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.077684] team0: Port device team_slave_0 added [ 264.108691] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 264.126816] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 264.195393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.208709] team0: Port device team_slave_1 added [ 264.247706] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 264.255557] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 264.326454] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 264.333286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 264.355641] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 264.486447] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 264.508714] bridge0: port 2(bridge_slave_1) entered blocking state [ 264.515228] bridge0: port 2(bridge_slave_1) entered forwarding state [ 264.522244] bridge0: port 1(bridge_slave_0) entered blocking state [ 264.528679] bridge0: port 1(bridge_slave_0) entered forwarding state [ 264.542596] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 264.554073] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 264.582347] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 264.617703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 264.635622] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 264.668041] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 264.704742] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 264.716139] team0: Port device team_slave_0 added [ 264.729642] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 264.756881] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 264.764772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 264.836111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 264.893464] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 264.906000] team0: Port device team_slave_1 added [ 264.933072] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 264.945577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 265.051463] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 265.074328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 265.097003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.186656] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 265.193507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 265.201780] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.238224] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 265.275982] team0: Port device team_slave_0 added [ 265.310665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.366056] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.385391] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 265.408369] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.414731] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.421456] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.427891] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.439722] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 265.459910] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 265.471147] team0: Port device team_slave_1 added [ 265.478561] bridge0: port 2(bridge_slave_1) entered blocking state [ 265.484950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 265.491615] bridge0: port 1(bridge_slave_0) entered blocking state [ 265.498029] bridge0: port 1(bridge_slave_0) entered forwarding state [ 265.527983] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 265.537822] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 265.555830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 265.572701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 265.641029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 265.766898] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 265.848436] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.865466] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 265.898241] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 265.914327] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 265.930980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 266.029128] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 266.043983] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 266.059790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 266.353860] bridge0: port 2(bridge_slave_1) entered blocking state [ 266.360277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 266.367061] bridge0: port 1(bridge_slave_0) entered blocking state [ 266.373442] bridge0: port 1(bridge_slave_0) entered forwarding state [ 266.391094] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 266.856274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.007295] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.013681] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.020407] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.026836] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.040718] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 267.474080] bridge0: port 2(bridge_slave_1) entered blocking state [ 267.480508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 267.487223] bridge0: port 1(bridge_slave_0) entered blocking state [ 267.493587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 267.520051] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 267.905194] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 267.912421] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 270.170296] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.526442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.550620] 8021q: adding VLAN 0 to HW filter on device bond0 [ 270.619884] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 270.922680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.018201] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.112936] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 271.139602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.148993] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.301750] 8021q: adding VLAN 0 to HW filter on device bond0 [ 271.424557] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 271.432886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.445598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.506616] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 271.512762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 271.523398] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 271.616079] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.836749] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 271.866618] 8021q: adding VLAN 0 to HW filter on device team0 [ 271.958558] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.136367] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.270197] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 272.277396] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 272.285870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 272.441662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 272.685491] 8021q: adding VLAN 0 to HW filter on device team0 [ 272.722346] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 272.867131] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.185805] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.192083] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.205914] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.325491] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.331715] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.345743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.737562] 8021q: adding VLAN 0 to HW filter on device team0 [ 273.745597] 8021q: adding VLAN 0 to HW filter on device team0 [ 274.545744] mmap: syz-executor0 (7464) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 22:33:22 executing program 1: syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x200, 0x4000) 22:33:22 executing program 2: 22:33:22 executing program 1: 22:33:22 executing program 2: 22:33:22 executing program 1: 22:33:22 executing program 2: 22:33:22 executing program 0: 22:33:22 executing program 2: 22:33:22 executing program 1: 22:33:23 executing program 3: 22:33:23 executing program 4: 22:33:23 executing program 5: 22:33:23 executing program 2: 22:33:23 executing program 1: 22:33:23 executing program 0: 22:33:23 executing program 3: [ 275.943546] binder: 7590:7591 unknown command 0 [ 275.951273] binder: 7590:7591 ioctl c0306201 20a20000 returned -22 [ 275.959235] syz-executor4 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 22:33:23 executing program 1: 22:33:23 executing program 0: 22:33:23 executing program 3: 22:33:23 executing program 2: shmget(0x2, 0x2000, 0xfffffffffffffffc, &(0x7f0000275000/0x2000)=nil) 22:33:23 executing program 4: setuid(0xee01) shmget(0x1, 0x7000, 0x0, &(0x7f0000ff8000/0x7000)=nil) 22:33:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x15, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000000c3893879ceb7c4885fe67b18b62d72224c2beb8cd3a617590c9a6641513b227c0bbb2e4d106c24d3b6cc9ddc27caff1c64eab987a5b2c35aad1d942ae67aea3e9897d296da885f579cf1ac74557278928a463c44e1993466a0c22f1546844642096a06237ff946df904cd1308850ba63c44fef1476e5847ee911bd220436bf53c76d3ba6d00dc1281109c40d424b711673f442b517f8bb2aa212c9a9893cae65a8877e4b19e6"], 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x41}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c", 0x3b}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) 22:33:23 executing program 1: r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{}], 0x1) 22:33:23 executing program 0: r0 = semget(0x3, 0x6, 0x0) semctl$GETPID(r0, 0x0, 0x4, 0x0) 22:33:23 executing program 3: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x80000) sendfile(r1, r2, &(0x7f0000000100), 0x6) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f00000013c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x40000, 0x0) connect$l2tp(r4, 0xfffffffffffffffd, 0x0) 22:33:23 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x77, &(0x7f0000000000)=[@in={0x2, 0x0, @multicast2}], 0x10) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x2, 0xfffffffffffffffd]}, &(0x7f0000000080)=0x8) 22:33:23 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x315) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000005c0)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000200)=ANY=[], &(0x7f00000002c0)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}}, 0x4000) r3 = socket$inet6(0xa, 0x40000000000001, 0x8010000000000084) rt_sigsuspend(&(0x7f00000001c0)={0x8}, 0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x14) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f0000000340)) fchown(r3, 0x0, r4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) setsockopt$llc_int(r2, 0x10c, 0x7, &(0x7f0000000580)=0x9, 0x4) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x9, 0xffffffffffffffe1, 0x100000001, 0x9, 0x81}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000500)=@assoc_value={r5, 0x4}, &(0x7f0000000540)=0x8) listen(r3, 0x18) r6 = socket$inet6(0xa, 0x5, 0x0) accept4$nfc_llcp(r1, &(0x7f00000003c0), &(0x7f0000000440)=0x60, 0x80800) openat$ppp(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r6, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 22:33:23 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') socket$bt_hidp(0x1f, 0x3, 0x6) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x400, 0x7ff, 0x1, 0x8, 0x3, 0x3e, 0x1, 0xb0, 0x38, 0x281, 0x5, 0x7, 0x20, 0x1, 0x3ff, 0xffffffff, 0x3}, [{0x6474e551, 0x2, 0x49d2, 0x0, 0x7, 0x80, 0x7, 0x7e3}], "7f4ed01f433f9adc251263d2015ee2d092eacf3021222697e572d85a5eea3332949fe19a4a67d152a58737f58ab9d55f22e549e2faded2e8", [[], [], [], []]}, 0x490) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x91) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)) [ 276.334945] hrtimer: interrupt took 48957 ns 22:33:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0xd190, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={0x0}) 22:33:23 executing program 4: clone(0x40002102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) setitimer(0x2, &(0x7f0000000100)={{0x0, 0x2710}}, &(0x7f0000000140)) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, 0xffffffffffffffff) 22:33:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpuacct.usage_user\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x15, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000000c3893879ceb7c4885fe67b18b62d72224c2beb8cd3a617590c9a6641513b227c0bbb2e4d106c24d3b6cc9ddc27caff1c64eab987a5b2c35aad1d942ae67aea3e9897d296da885f579cf1ac74557278928a463c44e1993466a0c22f1546844642096a06237ff946df904cd1308850ba63c44fef1476e5847ee911bd220436bf53c76d3ba6d00dc1281109c40d424b711673f442b517f8bb2aa212c9a9893cae65a8877e4b19e6"], 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x41}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) r1 = socket$kcm(0x2, 0x5, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="bdc3f5c47317ab4ca2fb53056600a58c67b1ffc57c5428c2fd378b4b911dc474760a340235932635476a0c92e7ce56b7e9b27f312e0a656966d91c", 0x3b}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f0000000000)) 22:33:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x20000000000009, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x6, 0x2) getsockopt$inet_buf(r0, 0x0, 0x20, 0x0, &(0x7f0000000000)) 22:33:24 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x10000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000140)=0x8001) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xfff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XT\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZ') r3 = msgget$private(0x0, 0x208) msgctl$IPC_STAT(r3, 0x2, &(0x7f0000000280)=""/4096) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f0000000180)=0x100000, 0x8402) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 22:33:24 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bond0\x00', &(0x7f0000000000)=@ethtool_link_settings={0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) getsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f0000000040), &(0x7f00000000c0)=0x14) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f00000001c0)=0x2, 0x8) 22:33:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18a251298e99be84d806096bddb800000000000000000000000000000063010400000000009500000000000000cde39e4dcf9da5f4b7f36e8e9289fce01e54db09e7e7004d"], &(0x7f0000000240)='GP)g\xa4\x05\xbb\xb3\x13(Z\xa1\x01\x19\xb8\xeb^\x82\x89\xb6Q\xc6\x12\xc6\x127B\xfc\nAV\xc6\x80O\xa7VU\xe353j1\xaa\xf6\x11Y\xb87D\xbb\x87\xe9=\x15\x96g\xf5+\xf36[\xda\x02~\x82cj\xaf\x95\xfbK%-.j\xf2f\xa5\x9d.\xfa\xac\xe9\xdc@\x1dr\x13\n\x82\xb7\x01\x88\xd6[\x80\x84q\xd8\x11\xe4+\xfbe~]\x7fm\xa13\xd2\xdb\xc3X\xf2[\xcc5~\r\x94\x17\xbd\xf900[\xde\xb7P\x04E\xeev\xd9\xce\na\xd4\x8ble\xe8-\xb8\xd5\xf5;=q\xe2\xfa\xc1\xb20[\x81\xe1\v\x9aH', 0x800a, 0x1000, &(0x7f0000000940)=""/4096}, 0x48) 22:33:24 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x101006, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x3, 0x0, 0x10003, 0xe6}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f0000000100)={r1, 0xfb}) r2 = memfd_create(&(0x7f0000000200)='em1\x00', 0x0) write$binfmt_aout(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000002"], 0x6) ioctl$FICLONE(r0, 0x40049409, r2) write$P9_RWRITE(r2, &(0x7f00000000c0)={0xb}, 0xb) sendfile(r0, r2, &(0x7f0000000080), 0x800) 22:33:24 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x191200, 0x0) listen(r0, 0xf4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in={0x2, 0x4e20, @empty}], 0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080), 0x8) 22:33:24 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000040), 0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000240)={0xfffffffffffffffd}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r2, 0x80045300, &(0x7f0000000000)) 22:33:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/rt6_stats\x00') sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0xffe9, &(0x7f00000002c0)=ANY=[], 0xfffffe21}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x15f) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000001400)=[{&(0x7f00000000c0)="3892de4ce264829f54cdc05d98a6171d28c35d98ccc973ce39a424e59f90843c9f550dec5d128d653295", 0x2a, 0x75}, {&(0x7f0000000100)="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", 0xfd, 0x100}, {&(0x7f0000000200)="fbfe796fdc82a3d760dda55c0ac98adb1c50be7cf967eac1ecfaf2e452c0916ec18d7183eddd724de18cdbd79d75a7b59d481d09b074e31594262fe50af7e972233554746dc3611c9b020b475d724efde2542e93a7a9524356eeadf3b33e466c991e17770e3778890f182aaf8fbf0e93cbd911630bc6fd71b51dde580b3f35c71ec2f903b3c2455208b559369ae31575b9eeacb60e24715e70233cfc526223b45ee1c3b6efc67301c7408e", 0xab, 0x1}, {&(0x7f00000002c0)="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", 0x1000, 0x5}, {&(0x7f00000012c0)="c497111e70f2326c4675bdb0681cff1389360ecfa7400eb479f915299cbb52ea8a1c4d58212e3285873b6e59bffbf93988d8b7be12a95a928c4b1cbc5bbc3d67041a33e2bbd868323e146aa2b8fc2cd03f87e984a9d14ff9d724ae0622119a3b7364f28178e230361b3df908a434255ac5b4c844f3f7448c81803e5c0511164fbac3de045676b1c473009210c6ea1b965ff5decaa2a4f7b73a35e38f0f763b405c363bb9a7dca9c97fe14fe443e84214ece063594238248f3fea449a7c2abb2dacd5640662b114816cb4a233132ca90f6dde8d0621", 0xd5, 0xfffffffffffff2b3}, {&(0x7f0000001540)="509cff9ca89817e088d6c404000000cd2216e768b85389d203009528719286d6b61b4e1ab977e69f13aa0bb2fb169205dd84710598d0359bc5000000000000000000000000000013b2cb005462749ff3ff20b2745ed05abe49025a2b541b912cac78022c7a98c5d656edb193342314612ba5ed196b9078be2a1a259f671c5e0c311cc7e2fc1c86c2dde04aa10bc2ab6606c9062346e1f3f073d0e65d1997f98245e73b8e7743593b70bc5c0d68e77667dfe9ee7d7e070040ea030a38e0a2b6fc3ba58d50de7bffb8a44282b5734ac6ebdbd529d3118644dc19c8254acd6c69b12f92a884cf7c1dbf2c5a5418424b7218f23e64efe5c1eb0243c06a5f02562207017fcadc44dc", 0x106, 0x10000}], 0x1000, &(0x7f00000014c0)=ANY=[@ANYBLOB='noattr2,pquotauota,nouuid,permit_directio,obj_user=]%%,fsmagic=0x000000006,\x00']) 22:33:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x101000, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000480)={0x7, 0x9, 0x20}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x8200) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x101002, 0x0) sendmsg(r2, &(0x7f0000000400)={&(0x7f0000000040)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(rfc4309(rfc4106(gcm(aes))))\x00'}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)}], 0x1, &(0x7f0000000240)=[{0xb0, 0x1ff, 0x400, "605c1800fc9d3e0b820793def66b6f62dacd38d29fce3762bb19bc0b31bb5f9ad21915ecfce248e687e984bb623d031c79762b82e9c81a2a6247ec4cf598030d542f9ac2b2a4b2655bf1abf726db2346b1e7fdfb4004b4d3487c00077f16da734b8e2a5a5d887f520f70366e854c0cd7409f14b43edcd8ec000a3c86d5e63fcafcb10187ff279f859c27547f6732139d75672e912a11c722b5"}, {0xf0, 0x1ff, 0xb7, "b547bcdaf385e6c9a2a8f142e1096027ecf0ba20b701d07895a2511c9c6718d2256fdde570edf86250ee1ffd988636049f5e4f7e0a5c14a2b8bce1b3e22b4ab048ad0836cbf804bfbc8a019dfbf109271b95cd0a0892b88937fa9316a45570ff6317e49a8b6070bd93d4ee49caec4e49cfe61b74b061869d0b047e9466400c9f93b067ced7ef5aa2dfde85980d98e299263cfb74c7c8470f2ebb66828ad36705b717554097b7ceb19712e1e82cc873186cb2bdd43c7149c714cb24235b3a7ee748e440aaf3ee435c5c1ee773dfa2c2c9a02012a4928a138a0428443d"}], 0x1a0}, 0x4000014) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) unlink(&(0x7f0000000180)='./file\xff\xff\x00') r4 = memfd_create(&(0x7f00000000c0)='\x93\xcbR\xe0O-wr\xb1\x91\xf5\x1d\xa1U\x88p^\xa3\xa9\xbd\x89\xbbR9\x7f\xab\xf1]4\xbfqd`\xbb\x9d\x96\xc2\x90\\wh\v\xe0\x04.\xb5$\nN\x82{B\xcf{\xa8\xb5\x8eAj\x1942E\xac!=\xa3^`<{\xaf\xa1z\x8d\x8f%\xa8\x97\xb1\xf8r\x1e\x9c\xea\xfa\xfd\x9f\xafJ\xc8$\x0e\x8f\xca\f\x17\x85\aQM\x91\x9c\xb0\xfeb\x96j\xae\xc50A\xe8\xa3DQX(\x0f\f\xb9\xc6\r$\x93B\x80\xfb\r)b\x1cm\xd5\x7f\\e\xe7\xf9\xcf\x0f1\x95\x12,\xddB\x94\xb4/\xd6\x92a\x1f\xc6\xb9Jv\xe7\xca', 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000004c0)=0x6) mmap(&(0x7f00002e4000/0x3000)=nil, 0x3000, 0xffffffffffffffff, 0x32, r2, 0x400000000000000) name_to_handle_at(r4, &(0x7f00002e4000)='./file\xff\xff', &(0x7f0000000000)={0x2f}, &(0x7f0000001ffc), 0x1400) 22:33:24 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x1f, &(0x7f0000000540)=0x6b9, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r6 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') setxattr$security_capability(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.capability\x00', &(0x7f00000006c0)=@v2={0x2000000, [{0x3, 0x8}, {0x80000000, 0x44}]}, 0x14, 0x1) accept4$llc(r5, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000740)=0x10, 0x80000) ptrace$getsig(0x4202, r3, 0xffff, &(0x7f0000000500)) getpgid(r3) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="bdbad330f6c73b164e967d51250707807003fc559a4591e6e2833e0048af98bf28c25c0035"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) setxattr$security_capability(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x42, 0xfdb5}, {0x864f, 0x6}], r4}, 0x18, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r7, 0x117, 0x5, 0x0, 0x20) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:33:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/vsock\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000c80)={{{@in=@local, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000d80)=0xe8) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) pread64(r0, &(0x7f0000000040)=""/41, 0x29, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x0, @local}}, 0x0, 0x1, 0x0, "d0d6da7076e758bde75e37467d5bcc6e6f33a354ca80942257501777b59fa0b6fc4c6fcbb4cc3be715b69f49252dcaa248f70c0036517e49ec4b86db5c037f9b72bbda52ae894a7af084010fd24bd1f3"}, 0xd8) socket$pppoe(0x18, 0x1, 0x0) sendto$inet(r2, &(0x7f0000000000)="d5a02543e3ca", 0x6, 0x2000560e, 0x0, 0x0) poll(&(0x7f0000000080)=[{r0, 0x200}], 0x1, 0xed5) pread64(r1, &(0x7f0000000f80)=""/172, 0xac, 0x0) 22:33:24 executing program 2: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) recvfrom$llc(r0, &(0x7f0000000140)=""/175, 0xaf, 0x1, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x880, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') sendmsg$NBD_CMD_STATUS(r3, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x3000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x20040080}, 0x40094) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[], 0x48d) recvmmsg(r2, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) fchdir(r1) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) 22:33:24 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x103000, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mime_type)vboxnet1,$trusted\xee,vmnet1keyring.posix_acl_access\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB=',\x00']) futex(&(0x7f000000cffc)=0xfffffffffffffffd, 0x800000000086, 0x0, &(0x7f0000000100)={0x77359400}, &(0x7f0000048000), 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8000, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000680)=0xe8) getresgid(&(0x7f00000006c0)=0x0, &(0x7f0000000700), &(0x7f0000000740)) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000780)={0x208, 0x0, 0x7, [{{0x1, 0x1, 0x7, 0x8, 0xe9b3, 0xfff, {0x5, 0x8, 0x0, 0x1, 0x100, 0x8004, 0xffffffff, 0x0, 0xffffffff, 0xffffffffffffffff, 0x28b, r4, r5, 0x7, 0x10000}}, {0x6, 0x8000, 0xa, 0x10000, '/dev/zero\x00'}}, {{0x2, 0x3, 0x3, 0xdf, 0x8000, 0x26a, {0x2, 0x2, 0x396c, 0x3, 0x4, 0xa37d000000000, 0x5, 0x1, 0x2c2e1df1, 0x100000000, 0xffff, r6, r7, 0x3, 0xff}}, {0x5, 0x8, 0x1, 0x7e1, '&'}}, {{0x6, 0x3, 0x3f, 0x6, 0x8e, 0x7, {0x2, 0x7f, 0x4, 0x5, 0x3ff, 0x51, 0x61, 0xfffffffffffffffe, 0x7f22, 0x100000001, 0x0, r8, r9, 0x80, 0x8}}, {0x5, 0x9a, 0x11, 0x3, '\x10selfprocvboxnet1'}}]}, 0x208) tkill(r3, 0x1000000000016) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000300), 0xc) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x50) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000009c0)) r10 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r10, 0x10c, 0x3, &(0x7f0000000000), 0x4) 22:33:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xe}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)}, 0x10) r1 = socket$kcm(0xa, 0x2, 0x11) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000040)={'veth1_to_bond\x00', 0xffffffff80000001}) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x400003, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e21, @loopback}, 0x4b, 0x0, 0x0, 0x0, 0x81, 0x0, 0x4b, 0x11, 0x8}) 22:33:24 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000001100)='/dev/adsp#\x00', 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000001140)={{0x77, 0xffffffffc3967f5d}, {0xfffffffffffffc01, 0x80}, 0x0, 0x2, 0x7ff}) r1 = socket$inet6(0xa, 0x3, 0x6) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80201, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x6, 0x40, &(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r5 = fcntl$dupfd(r2, 0x0, r2) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000001280), &(0x7f00000013c0)=0x4) r6 = dup3(r4, r3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000001380)='./file0\x00', 0x0, 0x2) r7 = socket$inet(0x10, 0x3, 0xc) getsockopt$inet_mreqn(r5, 0x0, 0x0, &(0x7f00000002c0)={@local, @dev}, &(0x7f0000000340)=0xc) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x4, 0xa00) sendmsg(r7, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000009061f001cfffd940aa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000012c0)={0xea73, 0x0, 0x0, 'queue0\x00', 0xfff}) semget$private(0x0, 0x20, 0x402) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0xde, 0x3) r8 = creat(&(0x7f0000000240)='./file0\x00', 0x7) lstat(&(0x7f0000004280)='./file0\x00', &(0x7f0000008280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000045c0)='./file0\x00', &(0x7f0000008300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000008380)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@local}}, &(0x7f0000008480)=0xe8) getresuid(&(0x7f00000084c0)=0x0, &(0x7f0000009080), &(0x7f0000009040)) fstat(r0, &(0x7f0000008580)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000008600)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000008700)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000008740)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000008840)=0xe8) fstat(r0, &(0x7f0000008880)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000008900), &(0x7f0000008940)=0x0, &(0x7f0000008980)) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000089c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000008ac0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000008b00)={0x0, 0x0, 0x0}, &(0x7f0000008b40)=0xc) getgroups(0x4, &(0x7f0000008b80)=[0xee00, 0x0, 0xee00, 0xee01]) fstat(r0, &(0x7f0000008bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000008c40), &(0x7f0000008c80)=0x0, &(0x7f0000008cc0)) fstat(r6, &(0x7f0000008d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000008d80), &(0x7f0000008dc0)=0x0, &(0x7f0000008e00)) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000008e40)={0x0, 0x0, 0x0}, &(0x7f0000008e80)=0xc) r26 = getegid() fstat(r1, &(0x7f0000008ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r6, &(0x7f0000004240)='system.posix_acl_default\x00', &(0x7f0000008f40)={{}, {0x1, 0x4}, [{0x2, 0x1, r9}, {0x2, 0x4, r10}, {0x2, 0x3, r11}, {0x2, 0x4, r12}, {0x2, 0x6, r13}, {0x2, 0x7, r14}, {0x2, 0x2, r15}, {0x2, 0x1, r16}, {0x2, 0x2, r17}, {0x2, 0x4, r18}], {0x4, 0x5}, [{0x8, 0x1, r19}, {0x8, 0x2, r20}, {0x8, 0x4, r21}, {0x8, 0x2, r22}, {0x8, 0x0, r23}, {0x8, 0x2, r24}, {0x8, 0x2, r25}, {0x8, 0x2, r26}, {0x8, 0x7, r27}], {0x10, 0x4}, {0x20, 0x4}}, 0xbc, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(r8, 0x40104593, &(0x7f0000000300)={0x15, 0xb11, &(0x7f00000003c0)="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"}) ioctl$TUNSETLINK(r6, 0x400454cd, 0x20) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0xc202, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r6, 0xc1205531, &(0x7f0000000fc0)={0x81, 0x6, 0x4, 0x8, [], [], [], 0x7, 0x5, 0x9, 0x101, "bf342c7a604e8de6218216cff87bcf52"}) recvmmsg(r4, &(0x7f0000008000)=[{{&(0x7f0000000f00)=@in={0x2, 0x0, @remote}, 0x80, &(0x7f0000002500)=[{&(0x7f00000011c0)=""/121, 0x79}, {&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000f80)=""/49, 0x31}, {&(0x7f0000002480)=""/116, 0x74}, {&(0x7f0000001240)=""/4, 0x4}], 0x5, &(0x7f0000002580)=""/202, 0xca}, 0x20}, {{&(0x7f0000002680)=@tipc, 0x80, &(0x7f0000001400)=[{&(0x7f0000002700)=""/80, 0x50}], 0x1, &(0x7f0000002780)=""/60, 0x3c}, 0x8}, {{&(0x7f00000027c0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002840)=""/107, 0x6b}, {&(0x7f00000028c0)=""/24, 0x18}, {&(0x7f0000002900)=""/102, 0x66}], 0x3, &(0x7f00000029c0)=""/81, 0x51}, 0x3}, {{&(0x7f0000002a40)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002ac0)=""/10, 0xa}, {&(0x7f0000002b00)=""/59, 0x3b}], 0x2, &(0x7f0000002b80)=""/177, 0xb1}, 0x401}, {{&(0x7f0000002c40)=@alg, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002cc0)=""/4096, 0x1000}, {&(0x7f0000003cc0)=""/44, 0x2c}, {&(0x7f0000003d00)=""/114, 0x72}], 0x3, &(0x7f0000003dc0)=""/181, 0xb5}, 0x1}, {{&(0x7f0000003e80)=@ax25, 0x80, &(0x7f0000004140)=[{&(0x7f0000003f00)=""/134, 0x86}, {&(0x7f0000003fc0)=""/43, 0x2b}, {&(0x7f0000004000)=""/16, 0x10}, {&(0x7f0000004040)=""/179, 0xb3}, {&(0x7f0000004100)=""/62, 0x3e}], 0x5}}, {{&(0x7f00000041c0)=@ipx, 0x80, &(0x7f0000004400)=[{&(0x7f0000004240)}, {&(0x7f0000004280)}, {&(0x7f00000042c0)=""/40, 0x28}, {&(0x7f0000004300)=""/228, 0xe4}], 0x4, &(0x7f0000004440)=""/145, 0x91}, 0x8001}, {{&(0x7f0000004500)=@alg, 0x80, &(0x7f00000057c0)=[{&(0x7f0000004580)=""/64, 0x40}, {&(0x7f00000045c0)}, {&(0x7f0000004600)=""/223, 0xdf}, {&(0x7f0000004700)=""/161, 0xa1}, {&(0x7f00000047c0)=""/4096, 0x1000}], 0x5}, 0x4}, {{&(0x7f0000005840)=@generic, 0x80, &(0x7f0000006c00)=[{&(0x7f00000058c0)=""/35, 0x23}, {&(0x7f0000005900)=""/4096, 0x1000}, {&(0x7f0000006900)=""/4, 0x4}, {&(0x7f0000006940)=""/194, 0xc2}, {&(0x7f0000006a40)=""/126, 0x7e}, {&(0x7f0000006ac0)=""/158, 0x9e}, {&(0x7f0000006b80)=""/13, 0xd}, {&(0x7f0000006bc0)=""/9, 0x9}], 0x8, &(0x7f0000006c80)=""/116, 0x74}, 0x2}, {{&(0x7f0000006d00)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000007f80)=[{&(0x7f0000006d80)=""/112, 0x70}, {&(0x7f0000006e00)=""/250, 0xfa}, {&(0x7f0000006f00)=""/43, 0x2b}, {&(0x7f0000006f40)=""/57, 0x39}, {&(0x7f0000006f80)=""/4096, 0x1000}], 0x5}, 0x7fff}], 0xa, 0x40002120, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) 22:33:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xe004, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400100401000200027000f8", 0x16}], 0x0, 0x0) r0 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x200000, 0x0) r2 = dup(0xffffffffffffffff) r3 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, 0x0, 0x0) r4 = open(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r6 = getpgid(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0xc8ac, 0x0, 0x400, 0x8001, 0x7fffffff}, &(0x7f0000000340)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000380)={r7, 0x70, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x3, @mcast1, 0x8}, @in6={0xa, 0x4e24, 0xfffffffffffff94d, @dev={0xfe, 0x80, [], 0xf}, 0x80000001}, @in6={0xa, 0x4e23, 0x8052, @mcast1, 0x8001}, @in6={0xa, 0x4e21, 0x8, @empty, 0x5}]}, &(0x7f0000000480)=0x10) write$cgroup_pid(r1, &(0x7f00000004c0)=r6, 0x12) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa00000400, 0x0, 0x8000010004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) pselect6(0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$EXT4_IOC_RESIZE_FS(0xffffffffffffffff, 0x40086610, &(0x7f0000000100)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') ioctl$KDDELIO(r5, 0x4b35, 0x1000000000007a) fstat(0xffffffffffffffff, &(0x7f0000000500)) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000040)=0x233, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getdents(r4, 0x0, 0x0) 22:33:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7570706572f32b265c510c9ba86469623d2e2f66586c65302c6c197997c97542007765726469723d0000000000000003716f726b6469723d2e2f66696cb04b"]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x301001, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) r1 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000002c0)=[@window={0x3, 0x5f80, 0x7}, @timestamp, @window={0x3, 0x8, 0x20000000000}], 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000300)) chdir(&(0x7f0000000240)='./file1/file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) mount$overlay(0x0, &(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000400)='overlay\x00', 0x2000008, &(0x7f0000000440)={[{@xino_auto='xino=auto'}, {@metacopy_off='metacopy=off'}, {@xino_auto='xino=auto'}, {@metacopy_on='metacopy=on'}, {@xino_on='xino=on'}, {@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x31}}]}) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000040)=0x3) [ 277.501147] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.512271] bridge0: port 1(bridge_slave_0) entered disabled state 22:33:25 executing program 5: r0 = socket(0x11, 0x2, 0x9) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2800) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x8031, r2, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x1000000, 0x0, 0x20000) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000100)=""/161) connect$can_bcm(r0, &(0x7f0000000080), 0x47) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x4000, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r4, 0xc0305615, &(0x7f0000000200)={0x0, {0x8001, 0x7}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'irlan0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x9, &(0x7f0000000240)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xc0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0x7, 0xb, 0x9, 0xa, 0x100, 0xffffffffffffffff}, @alu={0x4, 0xffff, 0xd, 0xf, 0xf, 0xfffffffffffffffe, 0x4}, @map={0x18, 0xf, 0x1, 0x0, r4}, @call={0x85, 0x0, 0x0, 0x28}, @call={0x85, 0x0, 0x0, 0x3d}, @exit], &(0x7f00000002c0)='syzkaller\x00', 0x1000, 0x74, &(0x7f0000000300)=""/116, 0x40f00, 0x1, [], r5}, 0x48) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) r6 = syz_open_dev$video4linux(0x0, 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r6, 0xc100565c, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000000c0)={'lo\x00@\x00', 0x101}) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) mincore(&(0x7f0000a56000/0x4000)=nil, 0x4000, 0x0) accept$alg(r7, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000002840)=@int=0x7397, 0x4) [ 277.626634] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 277.668206] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 277.762501] overlayfs: unrecognized mount option "upperó+&\Q ›¨dib=./fXle0" or missing value [ 277.831177] device lo entered promiscuous mode [ 277.848997] rpcbind: RPC call returned error 22 [ 277.892023] device bridge_slave_1 left promiscuous mode [ 277.916156] overlayfs: unrecognized mount option "dont_hash" or missing value 22:33:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x20000000}) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x101, 0x2000) write$P9_RRENAMEAT(r2, &(0x7f0000000300)={0x7, 0x4b, 0x2}, 0x7) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x110, r3, 0xc02, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfffffffffffffffe}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x939fa2d61c478302}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x82e}]}, 0x110}, 0x1, 0x0, 0x0, 0x1}, 0x8811) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) [ 277.967543] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.968834] overlayfs: unrecognized mount option "upperó+&\Q ›¨dib=./fXle0" or missing value [ 278.085907] overlayfs: unrecognized mount option "dont_hash" or missing value [ 278.114164] device bridge_slave_0 left promiscuous mode [ 278.121747] bridge0: port 1(bridge_slave_0) entered disabled state 22:33:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2714, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x214) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xa0000, 0x0) [ 278.168681] kauditd_printk_skb: 9 callbacks suppressed [ 278.168696] audit: type=1804 audit(1545086005.629:31): pid=7748 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir080442925/syzkaller.u2B3lt/12/file0" dev="sda1" ino=16574 res=1 [ 278.174275] netlink: 'syz-executor1': attribute type 1 has an invalid length. [ 278.225563] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. [ 278.270856] audit: type=1804 audit(1545086005.719:32): pid=7738 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir080442925/syzkaller.u2B3lt/12/file0" dev="sda1" ino=16574 res=1 22:33:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000180)='trustedposix_acl_access\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r1, 0x4) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$VIDIOC_G_INPUT(r2, 0x80045626, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000140)) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22, 0x1f, @ipv4={[], [], @broadcast}, 0x1}, 0x1c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 278.426120] device lo left promiscuous mode [ 278.432299] device lo entered promiscuous mode 22:33:25 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x1f, &(0x7f0000000540)=0x6b9, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r6 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') setxattr$security_capability(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.capability\x00', &(0x7f00000006c0)=@v2={0x2000000, [{0x3, 0x8}, {0x80000000, 0x44}]}, 0x14, 0x1) accept4$llc(r5, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000740)=0x10, 0x80000) ptrace$getsig(0x4202, r3, 0xffff, &(0x7f0000000500)) getpgid(r3) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="bdbad330f6c73b164e967d51250707807003fc559a4591e6e2833e0048af98bf28c25c0035"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) setxattr$security_capability(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x42, 0xfdb5}, {0x864f, 0x6}], r4}, 0x18, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r7, 0x117, 0x5, 0x0, 0x20) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:33:25 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xc) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) 22:33:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2714, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x214) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xa0000, 0x0) 22:33:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x4040) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) clock_gettime(0x0, &(0x7f0000005840)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000005900)={0x0, 0x10, &(0x7f00000058c0)=[@in={0x2, 0x4e22, @broadcast}]}, &(0x7f0000005940)=0x10) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000005980)={r5, 0x489}, &(0x7f00000059c0)=0x8) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000005a00)=""/90) select(0x40, &(0x7f0000003080)={0xdada, 0x3, 0x1, 0x1, 0x5, 0xf15, 0x1, 0x7}, &(0x7f00000057c0)={0x50000000000, 0x749, 0xede6, 0x2, 0x80000001, 0x72c, 0x0, 0x401}, &(0x7f0000005800)={0x4, 0x3, 0x4, 0x8, 0x94, 0x1, 0x4, 0x7ff}, &(0x7f0000005880)={r3, r4/1000+10000}) r6 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r6, &(0x7f0000000000)={&(0x7f0000000040)=@un=@abs, 0x1f, 0x0}, 0xc020) sendmsg$kcm(r6, &(0x7f0000000300)={&(0x7f0000000100)=@un=@abs, 0x80, &(0x7f00000000c0), 0x3c, &(0x7f0000000200)}, 0x0) recvmmsg(r1, &(0x7f0000005600)=[{{&(0x7f0000000280)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000001340)=""/98, 0x62}, {&(0x7f00000013c0)=""/110, 0x6e}, {&(0x7f0000001440)=""/207, 0xcf}, {&(0x7f0000001540)=""/94, 0x5e}, {&(0x7f00000015c0)=""/247, 0xf7}, {&(0x7f00000016c0)=""/4096, 0x1000}], 0x6, &(0x7f0000002740)=""/229, 0xe5}, 0x2}, {{&(0x7f0000002840)=@nfc_llcp, 0x80, &(0x7f0000002a40)=[{&(0x7f00000028c0)=""/160, 0xa0}, {&(0x7f0000002980)=""/167, 0xa7}, {&(0x7f0000000200)=""/3, 0x3}], 0x3}, 0x212f4505}, {{&(0x7f0000002a80)=@un=@abs, 0x80, &(0x7f0000002e00)=[{&(0x7f0000002b00)=""/209, 0xd1}, {&(0x7f0000002c00)=""/85, 0x55}, {&(0x7f0000002c80)=""/108, 0x6c}, {&(0x7f0000002d00)=""/18, 0x12}, {&(0x7f0000002d40)=""/152, 0x98}], 0x5}, 0x8000}, {{&(0x7f0000002e80)=@nfc, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002f00)=""/55, 0x37}, {&(0x7f0000002f40)=""/47, 0x2f}], 0x2, &(0x7f0000002fc0)=""/165, 0xa5}, 0xa4e7}, {{0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000003080)}, {&(0x7f00000030c0)=""/163, 0xa3}, {&(0x7f0000003180)=""/4096, 0x1000}, {&(0x7f0000004180)=""/4096, 0x1000}, {&(0x7f0000005180)=""/68, 0x44}], 0x5, &(0x7f0000005280)=""/120, 0x78}}, {{&(0x7f0000005300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000055c0)=[{&(0x7f0000005380)=""/154, 0x9a}, {&(0x7f0000005440)=""/94, 0x5e}, {&(0x7f00000054c0)=""/228, 0xe4}], 0x3}}], 0x6, 0x12041, &(0x7f0000005780)={0x0, 0x989680}) [ 278.561738] input:  as /devices/virtual/input/input5 22:33:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x2714, &(0x7f0000af0fe7)=""/13, &(0x7f000033bffc)=0xd) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x214) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0xa0000, 0x0) [ 278.691641] input:  as /devices/virtual/input/input6 22:33:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x81, 0x15) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0x3, 0x1f, 0x7fff, 0x7, 0x400, 0x3e, 0x0, 0x8}}) syz_emit_ethernet(0x32, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100000000, 0x40000) ioctl$sock_inet_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) [ 278.879989] rpcbind: RPC call returned error 22 22:33:26 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x9, 0x404200) r1 = open(&(0x7f0000000100)='./file0\x00', 0x400000, 0x86) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1000) r2 = socket$kcm(0x10, 0x2, 0x0) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000240), 0x400) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0), 0x0, 0x0, 0xe4ec35509ae1933a}, 0x0) 22:33:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x1f, &(0x7f0000000540)=0x6b9, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r6 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') setxattr$security_capability(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.capability\x00', &(0x7f00000006c0)=@v2={0x2000000, [{0x3, 0x8}, {0x80000000, 0x44}]}, 0x14, 0x1) accept4$llc(r5, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000740)=0x10, 0x80000) ptrace$getsig(0x4202, r3, 0xffff, &(0x7f0000000500)) getpgid(r3) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="bdbad330f6c73b164e967d51250707807003fc559a4591e6e2833e0048af98bf28c25c0035"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) setxattr$security_capability(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x42, 0xfdb5}, {0x864f, 0x6}], r4}, 0x18, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r7, 0x117, 0x5, 0x0, 0x20) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:33:26 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0x4) listen(r0, 0x80) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @loopback}}, 0x10000, 0x0, 0x1f, 0x100000001, 0x80}, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x208000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000000c0)={r3}, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r2, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x4c, {0x600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) readahead(r2, 0x1ff, 0x800) 22:33:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x2) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) r2 = accept$inet(r0, &(0x7f0000000a40)={0x2, 0x0, @loopback}, &(0x7f0000000a80)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000b40)={0x0, @in6={{0xa, 0x4e22, 0x101, @ipv4={[], [], @loopback}, 0x4}}, 0x7fffffff, 0x863, 0x5, 0x4, 0x7}, &(0x7f0000000ac0)=0x98) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000c00)={r3}, 0x8) recvmmsg(r1, &(0x7f0000000b00)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x2}}], 0x1, 0x0, 0x0) 22:33:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x800000012) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000080)={@loopback, @empty, 0x0}, &(0x7f00000000c0)=0xc) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f0000000100)={r2, 0x9, 0x800, 0x5, 0x3, 0x7, 0x40}) 22:33:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) syz_open_pts(r0, 0x0) rt_sigprocmask(0x3, &(0x7f0000000040)={0x380000000000000}, &(0x7f0000000080), 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x102, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 22:33:26 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x1f, &(0x7f0000000540)=0x6b9, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r5, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {0x77359400}, 0x80, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x9) r6 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x10000, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r6, 0x0, 0x40, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) getsockopt$bt_rfcomm_RFCOMM_LM(r6, 0x12, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') setxattr$security_capability(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='security.capability\x00', &(0x7f00000006c0)=@v2={0x2000000, [{0x3, 0x8}, {0x80000000, 0x44}]}, 0x14, 0x1) accept4$llc(r5, &(0x7f00000002c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000740)=0x10, 0x80000) ptrace$getsig(0x4202, r3, 0xffff, &(0x7f0000000500)) getpgid(r3) sendmsg$NBD_CMD_CONNECT(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000000700)=ANY=[@ANYBLOB="bdbad330f6c73b164e967d51250707807003fc559a4591e6e2833e0048af98bf28c25c0035"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) setxattr$security_capability(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='security.capability\x00', &(0x7f0000000600)=@v3={0x3000000, [{0x42, 0xfdb5}, {0x864f, 0x6}], r4}, 0x18, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x100, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r7, 0x117, 0x5, 0x0, 0x20) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x1) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000140)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:33:26 executing program 4: ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x2) mkdir(0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000880)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 22:33:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000000880)={&(0x7f00000003c0)={0x2, 0x4e24, @multicast2}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000400)=""/42, 0x2a}, {&(0x7f0000000440)=""/234, 0xea}], 0x2, &(0x7f00000007c0)=[@mask_fadd={0x58, 0x114, 0x8, {{0x401, 0x4d}, &(0x7f0000000580)=0x200, &(0x7f00000005c0)=0x5, 0x68, 0x3, 0xbb9a, 0x3, 0x40, 0x6}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000600)=""/198, 0xc6}, &(0x7f0000000780), 0x8}}], 0xa0}, 0x4040000) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) fcntl$lock(r1, 0x7, &(0x7f0000000340)={0x2, 0x0, 0x5, 0x7ff, r2}) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget(0x1, 0x310) msgrcv(r3, 0x0, 0x0, 0x0, 0x3) r4 = msgget(0x1, 0x0) r5 = getuid() fstat(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)=0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000280)={{0xb7, r5, r6, r7, r8, 0xc0, 0x2}, 0x8001, 0x3, 0x6, 0x0, 0x200, 0x7, r9, r10}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)) 22:33:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x31, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r\x8d6a\xac\xd7\b\x11\xbd\t\xa11\xe9.\x84(\xa30xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000140)='sit0\x00') 22:33:27 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) socket$alg(0x26, 0x5, 0x0) mq_notify(r0, &(0x7f0000000240)={0x0, 0x32, 0x1, @thr={&(0x7f00000001c0)="020d6801f2178defcba451b12e515a316898", &(0x7f0000000200)="c7fc0196a0b698bded5dcbd5e77c50d192aa505a6b19b01f716fd68bf3de3a9064ac0bd81c4b81e607b5fb0d217e4923332c9755441e0ceb7958e5f0"}}) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) modify_ldt$write2(0x11, &(0x7f0000000180)={0x0, 0x0, 0x2f2e86ff4f663aed, 0x7, 0x401, 0x1, 0x6, 0x20, 0x4, 0xffffffffffff06a1}, 0x10) io_setup(0x800000100000001, &(0x7f0000000040)=0x0) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000140)="3170313b714b20a9628c25fd9af7d249", 0x10}]) 22:33:27 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x4000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000000c0)={{0x8, 0x61a0}, 0x0, 0x3, 0x11b, {0x7e25, 0x4c}, 0x0, 0xfffffffffffffffa}) socket$inet6(0xa, 0x3, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000002c0), &(0x7f0000000780)=0x2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_PIE_OFF(r1, 0x7006) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}}, &(0x7f0000000380)) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000007c0)=0x800000000000002, 0x4) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r3, &(0x7f0000000840)={0x2, 0x4e20, @loopback}, 0x10) ioctl$int_in(r3, 0x5473, &(0x7f00000001c0)=0x20) ioctl$int_in(r3, 0x5421, &(0x7f0000000900)) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000a00)="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", 0x481, 0x0, 0x0, 0x0) r4 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) mq_timedsend(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000280)) unshare(0x44000000) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000ec0)=ANY=[@ANYBLOB="b702000005000000bfa30000000000000703000000feffff7a0af0fff8ffffff79faf0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000003000095000000000000006cb819e0306062ff01000000000000847f02e4f2b891b4de32b28d9f50d70f79d1a834e512d31dc49412aba92c45ba4230b1ee2a34b4747cbbf3045a593e0551ffe36cdf6574d4ae7bd97690806887f8a3ed551c3d342cc424deff2909179c90363ecf8b4ca134e5a5b8abe1b3220e3bab8ed4cbd665af34143964b31b822cfa3bf4364adefd28b9280ccfc1851e03777c438e34dd9f78ad1b06b5ee80cdf5ad63986442b3d72865d22ada02ef44098975f36dfd3b3afa51577ebb5958e54645266f5456fccc35b6f377257d2c7a878e9e4c87cc0508cd444f1292885612c7f481b3fd0ddbf8bbe02b8579b70e4c0b9ff94acd91c5ba2774de1941c20d73e793401dfe4840cba9409f65202a196a61c3017ea84359a6dc77408556d4712bb7b7f00463ab9894a354c1a7359518f25f0a78346b6a915cb965a2be0ed4a2978f4739bedd5d13d5c34655fa2273800154959d0e4303968526876cfa338eb81f9d2b87061b20851a1412dc9a05d5e6ce1b7ca746a9e741171e6d71d6985091b845bc811bbd6a3bee6dd8765a019d73dc831844f3cb8d80d9a4a0392c8539d279449ce88322f18de43e3dbe1fb4a02e2c2630d571156aea02c44c453fd219fba91da01f75e85165de5ea0b8773cedaac6f1d45840980d778c"], 0x0}, 0x48) r5 = getpgid(0x0) syz_open_procfs(r5, &(0x7f0000000140)='net/sockstat\x00') 22:33:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) r1 = getegid() getgroups(0x1, &(0x7f0000000240)=[r1]) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="3114a3afdb75f0009e19b491cc12db0fa649e8b7f3390537db0b5a524ce4ad583f36195e711055c9530cde14ee0d46354bbb898689c67ab2a9bbb4f995e439683606140b1c7238b06d65eb0c15691bb08ac6606d17a26f6e3b7d20de73e6b376b9a48f9d19dadc913a7093746d4a86cf12b30874fe666a5248810027509eafbf782a60dadf75c3003e04cc8c6ae22a2e9e2dd2a02835605fd057dd4593125bac338feefab50f69db23b46a6a02d22a7419a337222432b4243069c6b36dd30f652754598a4cd2bae45593a4889461c2ad951517131d079f4f7991921db761773524afec48dea0660fc9a8073769928c7a7eeddab403c4db", 0xf7, 0xffffffffffffffff) r3 = add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r2, r3) 22:33:27 executing program 4: ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_G_FBUF(0xffffffffffffffff, 0x8030560a, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./bus\x00', 0x6, 0x2) mkdir(0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000880)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xc, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 22:33:27 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x40000) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x3ffffffffffffe, 0x2000) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES64=r0], 0x8) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/206, 0xce}, {&(0x7f0000000000)=""/6, 0x6}], 0x2) 22:33:27 executing program 3: prctl$PR_GET_FP_MODE(0x2e) r0 = socket$inet6_sctp(0xa, 0x100000000001, 0x84) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in={0x2, 0x0, @remote}], 0x10) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001580)=@assoc_value={0x0, 0x8001}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 22:33:27 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) mount$9p_unix(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=unix,'}) [ 280.056110] IPVS: ftp: loaded support on port[0] = 21 22:33:27 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x191000, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000000c0)={0x4, 0x100, 0x20, 'queue0\x00', 0x7}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB=',lowerdir=.:file0,workdir=.']) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000200)={0x5, 0x0, 0x3018, 0x400, 0x0, 0x2, 0x4, 0x1}) 22:33:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x20, 0x0, 0xb0, &(0x7f0000ffc000/0x3000)=nil, 0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001580)='cpu&5\n\n\n\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') 22:33:27 executing program 2: lstat(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000680)) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54010000", @ANYRES16=r2, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setresuid(0x0, 0xee01, 0x0) clone(0x41f9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000140)) ptrace(0x10, r3) ptrace$poke(0x5, r3, &(0x7f0000000000), 0x0) 22:33:27 executing program 3: r0 = getpgid(0xffffffffffffffff) capget(&(0x7f0000000000)={0x20080522, r0}, &(0x7f0000000080)={0x8, 0x4, 0x4, 0x5, 0x7, 0x6}) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x8000000001000, 0x0, 0x0, &(0x7f0000ffb000/0x3000)=nil}) ioctl(r1, 0xffffffffffffffc6, &(0x7f0000000040)) 22:33:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000000)) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r1, 0x0, 0x1}) [ 280.225141] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 22:33:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = accept4(r2, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000100)={0x100, 0x8, 0x7fff, 0xfffffffffffffff8, 0x8}, 0x14) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x4}, 0xfffffffffffffecd) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r6}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r6}}, 0x48) ioctl$TUNSETSNDBUF(r4, 0x400454d4, &(0x7f0000000640)=0x628) write$RDMA_USER_CM_CMD_DESTROY_ID(r5, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r6}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sendto(r2, &(0x7f00005c8f58), 0xfffffffffffffeee, 0x0, &(0x7f0000351ff0)=@ipx={0x4, 0x2000, 0x0, "a074edebb7e1"}, 0x10) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r7, &(0x7f0000000600)={0x5, 0x10, 0xfa00, {&(0x7f00000003c0), 0xffffffffffffffff, 0x2}}, 0x18) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') dup3(r2, r0, 0x80000) request_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0), &(0x7f0000000380)='hash\x00', 0x0) getpgrp(0xffffffffffffffff) syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) [ 280.283369] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 280.342509] overlayfs: option "workdir=." is useless in a non-upper mount, ignore [ 280.621293] IPVS: ftp: loaded support on port[0] = 21 22:33:28 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x160) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x1000, 0x1}) 22:33:28 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23}, 0x78) sendto$inet(r1, &(0x7f0000000000)="96", 0x1, 0x3fff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x2, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) recvfrom(r1, &(0x7f0000000340)=""/70, 0x46, 0x3, 0x0, 0x0) 22:33:28 executing program 5: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="2400000052001f001515f4070009049247959fb1f978d97f24115562ff2e3b930bea088f", 0x24) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x6, 0xfffffffffffffff9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e20, 0x7, @loopback, 0x6}}, 0x900000, 0x8}, 0x90) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x2) 22:33:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffb000/0x2000)=nil, 0x20, 0x0, 0xb0, &(0x7f0000ffc000/0x3000)=nil, 0x2}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001580)='cpu&5\n\n\n\x00\x00\x01\x00\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05') 22:33:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) get_mempolicy(&(0x7f0000000000), 0x0, 0x0, &(0x7f00002a4000/0x4000)=nil, 0x3) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0x0, 0x0]) fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee01, 0xffffffffffffffff, 0x0]) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000004c0), &(0x7f0000000500)=0x0, &(0x7f0000000540)) getresgid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) setgroups(0xa, &(0x7f0000000640)=[r3, r4, r5, r6, r7, r8, r9, r10, r11, r12]) 22:33:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt_cache\x00') preadv(r1, &(0x7f0000000480), 0x100000000000022c, 0x0) 22:33:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(r0) r1 = getpgid(0x0) r2 = getpgid(0x0) kcmp(r1, r2, 0x6, r0, r0) 22:33:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020300090a0000000000000000000000030006000000002000000000e00000010005000000ffffffe6000100000000000000000200000000030005000000000002000000e0008693cf8b39"], 0x4b}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x35, 0xfffffffffffffeff, 0x3d, 0x0, 0x9, 0xffffffff80000000, 0xb7, 0x8, 0x5456cdf9, 0x8, 0xffffffffffffffff, 0x7, 0x8, 0x5, 0x7, 0x80000000], 0xf000, 0x201}) ioctl$KVM_RUN(r3, 0xae80, 0x0) epoll_pwait(r1, &(0x7f0000000100)=[{}, {}, {}], 0x3, 0x7, &(0x7f0000000140)={0x500000000000}, 0x8) 22:33:28 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x22000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x600, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2000c080}, 0x40000) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000001c0)={0x5, 0x5, 0x1}) setsockopt$inet_int(r0, 0x0, 0xce, &(0x7f0000000040), 0x2) 22:33:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) getsockopt$inet_int(r2, 0x0, 0x15, &(0x7f0000000100), &(0x7f0000000140)=0x4) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x18, r1, 0x101, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4}]}, 0x18}}, 0x0) 22:33:28 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x37, &(0x7f0000000280)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dmmidi(0x0, 0x0, 0x8000) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000180)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x803}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) ptrace$setregset(0x4205, r3, 0x6, &(0x7f0000000140)={&(0x7f00000000c0)="06e880e17898faf77c99a4b25ed2bc0a7b35afde0e8f872c63047b41fe13c53c69e254", 0x23}) preadv(r2, &(0x7f0000000100)=[{&(0x7f00000012c0)=""/217, 0xd9}], 0x1, 0x0) 22:33:29 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x20) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x3, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f0000000040)={0x0, 0x0, {0x7, 0x6, 0xfffffffffffffffa, 0x4}}) close(r0) 22:33:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1084262d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = dup(r1) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, [{}]}, 0xfffffffffffffdab) ioctl$KVM_GET_REGS(r2, 0x8090ae81, &(0x7f0000000040)) 22:33:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000280)='net/xfrm_stat\x00') mount$9p_unix(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='9p\x00', 0x3000, &(0x7f0000000780)={'trans=unix,', {[{@aname={'aname', 0x3d, '(eth0-'}}, {@cache_none='cache=none'}], [{@fsuuid={'fsuuid', 0x3d, {[0x39, 0x33, 0x7f, 0x33, 0x76, 0x64, 0x61, 0x7f], 0x2d, [0x7b, 0x7f, 0x3f, 0x35], 0x2d, [0x7a, 0x65, 0x77, 0x3f], 0x2d, [0x65, 0x64, 0x77], 0x2d, [0x34, 0x33, 0x37, 0x77, 0x36, 0x0, 0x66]}}}, {@subj_user={'subj_user', 0x3d, 'REJECT\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'bridge_slave_1\x00'}}, {@hash='hash'}]}}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f00000003c0)={{0x3, 0x802, 0x9, 0x5, '\x00', 0x17f}, 0x3, 0x104, 0x4, r0, 0x1, 0x0, 'syz0\x00', &(0x7f0000000100)=['net/xfrm_stat\x00'], 0xe, [], [0xe55, 0x0, 0x9a, 0x2]}) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000240)=@get={0x1, &(0x7f0000000580)=""/219, 0x2}) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0xffffffffffffff7f) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000f40)=@filter={'filter\x00', 0xe, 0x4, 0x370, 0x108, 0x0, 0x0, 0x108, 0x0, 0x338, 0x338, 0x338, 0x338, 0x338, 0x4, &(0x7f00000002c0), {[{{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x14}, 0xffffffff, 0xff, 'bridge_slave_1\x00', 'veth1_to_bridge\x00', {}, {}, 0xff, 0x1, 0x8}, 0x0, 0x98, 0x108}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x20, 0xd1, 0xa2a, 0x0, 0x0, "db74f473152bf2766ed4a8344202e048b4b4f83a7adf0ec0b51763e66862659b638d3d922bfb547237f5cfae2c9b9a85c4e77527366ce5003e06e9d42ac87dc4"}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x0, 0xf, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x7}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) fcntl$getown(r2, 0x9) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000300)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000740)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000b00)={@local}, &(0x7f0000000b40)=0x14) accept4$packet(r1, &(0x7f0000000b80), &(0x7f0000000bc0)=0x14, 0x80000) accept$packet(r1, &(0x7f0000000c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c40)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@broadcast, @in=@dev}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000e40)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000002900)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f00000028c0)={&(0x7f0000002600)={0x14, r4, 0x0, 0x70bd2a}, 0x14}}, 0x4) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380), 0xc, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="420872652ac83e9d5dc3a22307470a2ccda5061b702d041417bb2042b3b0a80ede320000f6507f245d785c442e93b7623158f86994c379f502edf70b38c3b905700012f8321efaf66a013fe153e2e05be4220a76d9a2b8fa9752b474bb0a74e342529d0ad749ac7f704b049544e738fb11dedcb717995af45ccc7a5b8f7b2feddcbad42646e4b002c42b79382383d0a0819ed40babd66f24ccfdfed85da11d35fbd88947133c6993cdb3f9b30000000000000000000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x4048090}, 0x8000) r5 = accept4(r2, 0x0, &(0x7f0000000080), 0x0) shutdown(r5, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000cc0)='IPVS\x00') 22:33:29 executing program 1: r0 = syz_open_dev$usb(0x0, 0x205, 0x105002) r1 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x400005004) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, &(0x7f00000004c0)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)=')\x00', 0xfffffffffffffffa) keyctl$clear(0x7, r2) getgroups(0x0, &(0x7f0000000280)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r4 = accept$alg(r3, 0x0, 0x0) recvmmsg(r4, &(0x7f0000006240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvfrom$packet(0xffffffffffffffff, 0x0, 0x0, 0x40, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@ipv4, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) fallocate(r1, 0x0, 0x0, 0xa6ba0) setuid(r5) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r6, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x44030000000000, r1, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, 0x0) getpeername(r0, &(0x7f0000000240)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000380)=0x80) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000003c0)=0x3) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) 22:33:29 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x12, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5f7, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000001c0)={r2, 0x2, 0x8, 0x5, 0xd6c, 0x4, 0x400, 0x7ff, {r3, @in={{0x2, 0x4e22, @empty}}, 0x80, 0x6, 0x9, 0x8000, 0xb78}}, &(0x7f0000000280)=0xb0) [ 281.792199] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) [ 281.843764] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 22:33:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x1ff) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000100)="f3ad4029450ff0432047c2911c1c743e6509090985d04e92d9f4c4610dc2900400000089d06323660f3808e1") [ 281.894782] (unnamed net_device) (uninitialized): option min_links: invalid value (18446744073709551615) 22:33:29 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0x7fff, 0x400) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000600)={0x0, 0x76da, 0x30}, &(0x7f0000000640)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)={r1, 0x82, "63c119d7a25b82858d15b8d83e21c49fc419bf9adeedf2660a65552b523cb1af5bbf837bedd0e55a0f2aa4be1a447e4ad5bdd401ed5f13b75fec9622c2fb973b9a2b3632975a847e95dfd8d1ac1d343178d5b57b607f3968ef2bc93924aa4b23fbff2bb1597c84793986a490f4b4c970ab5e03aa9f9e2861a814147e6634b7e0e27a"}, &(0x7f0000000740)=0x8a) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x80000, 0x1001fa) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast2, @in6=@mcast1, 0x4e21, 0x2, 0x4e23, 0x4, 0xa, 0xa0, 0x80, 0x32, r4, r5}, {0x7, 0x7, 0x7, 0x31, 0xb082, 0xffffffff, 0x401, 0xb13d}, {0x2, 0x100000001, 0x3, 0x7a}, 0xfffffffffffff001, 0x0, 0x2, 0x0, 0x3, 0x3}, {{@in6, 0x4d6}, 0x2, @in=@multicast1, 0x3505, 0x3, 0x2, 0xe4, 0xe1, 0xfffffffffffffff7, 0x7fff}}, 0xe8) r6 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) process_vm_writev(0x0, &(0x7f0000001580)=[{&(0x7f0000000100)=""/45, 0x2d}, {&(0x7f0000000200)=""/47, 0x2f}, {&(0x7f0000000240)=""/74, 0x4a}, {&(0x7f0000000300)=""/93, 0x5d}, {&(0x7f0000000580)=""/11, 0xb}], 0x5, 0x0, 0x0, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000140)={[0x3, 0xfff, 0x0, 0x0, 0x7fffffff, 0x0, 0xe99]}) ioctl$KVM_RUN(r7, 0xae80, 0x0) [ 281.963520] (unnamed net_device) (uninitialized): option min_links: allowed values 0 - 2147483647 22:33:29 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000004c0)={0x6, 0x118, 0xfa00, {{0x6, 0xfffffffffffffffd, "6be741c2bb28b667c2cac554ee76175ab26a00cb0d163ec05a6195b4513fc240c29c05d4ce8017a10fbdbf9ae7c81aaef4b8cf118e93c5ff82e6140690bde7a59bce22a4173e3305b2e3bbc06011f157caec722d2cf2cad5f9f1a957f2a0404c1808ab2efb83e3f6f9e4774ac49d30e39f0bc383b531f401b66cd445b3d82c50b4fcc63bac3c3000cb4dcaebd8cd5d93a0e7878e8291fee55341d17751aaffddb9388425cfdbd7432223ad9390794a8200c6d843c3ed5a4f0b4b265094291078b057bc55715fec69bf5f4dae989db80a77e8586017cfc98ff8964d95a9e2185338250f47b143064515a26e80bb30325cbf0ececfcd08b0f157c87fada0224751", 0x95, 0xb7, 0x81, 0x7, 0x7, 0x0, 0x5}, r1}}, 0x120) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000180)={0x6, 0x118, 0xfa00, {{0xad, 0x4, "51c17f2371585b3d38915400628efc6aac4667ad740f01d9013b4d7338d9150426d3590b8969f42e2a4fab081a23df7ce3e8a797f97d1c04722fb9698cfdeb171efbfe96149e82e92bee019692ff9d5e79a2e9a4df9138defd63e588fbcd2f6fce579f11d09a9e9eb3acf19737710f51b9b851cc98a8af1f4201676c763b99cd01ce23d390035793bd0e43bc87e8488979f0efb42f4f3c0610c2cd52044715f2c662e66954c48799958553662bb61b3d8a7b6a0ccc9e13b0cf8940286cf4fd5af4eb96e8fe6d380c1279a53499bc42c62633f9e901fd64ffc14a625da30fa1b215b5f40d5c763f6c40c01d4734c976bbf586f2aedd0ecbba8e156b280e25191f", 0xc8, 0x3, 0x346e, 0x7fff, 0x100, 0x10001, 0x4}, r1}}, 0x120) socket$inet6(0xa, 0x803, 0x3) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000440)={0x5, &(0x7f0000000400)=[{0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000480)={r2, 0x3}) syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clock_adjtime(0x7, &(0x7f0000000300)={0x900000000000, 0x0, 0x3f, 0x7f, 0x8, 0x8, 0x9, 0x4, 0x800, 0x6, 0x5, 0xffffffffffffff7f, 0x8, 0xf8, 0x100, 0x5, 0x7fff, 0x80, 0x7ff, 0x6, 0x1, 0x9, 0x3, 0x8000, 0x1ff, 0x8}) prctl$PR_CAPBSET_DROP(0x18, 0x11) rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) syz_open_dev$mouse(0x0, 0x0, 0x0) 22:33:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) rmdir(&(0x7f0000000400)='./file0\x00') 22:33:29 executing program 4: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000100)=""/94, 0x5e}], 0x1, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='net/snmp6\x00', 0xfffffffffffffff9) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000002c0)="7b88d8868d818c5289475f1f0e04793a320747ea193e50c6fbd5a3a67ebd489d1f85382c4f47", 0x26, 0xfffffffffffffffd) r3 = request_key(&(0x7f0000000300)='encrypted\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)='net/snmp6\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f00000003c0)={r1, r2, r3}, &(0x7f0000000400)=""/144, 0x90, &(0x7f00000005c0)={&(0x7f00000004c0)={'sha512-ssse3\x00'}, &(0x7f0000000500)="1a68fd4586ead570b706cee74b785bb78887d8901dfb44d3171009a2bdf2f0733fe55983ba0fe6b2d557d89e68681c4cccccbaf2e65e2e333ea39d0ac995d4aa95c9c1309b87028d6feef354b833c9be79e648b0cb82b0665b51464dbca42e14bd03c1eb5ed04cba08472225ece92b1475744a389924c310b3a842fd6c2b489a7fb4c042eae7e31f50be923282b3e4cea0fd2a7d2b6f8ce26e74dee902a0a5125e4be7ca775e4c16e7cb107753a9b2114b5d3f", 0xb3}) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/snmp6\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000052, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000200)={0x0, 0x2b84, 0x0, 'queue0\x00', 0x3}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) 22:33:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect(r1, 0x0, 0x62982a1ebd643d42) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x10, r0, 0x180000000) tkill(r2, 0x1b) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x3, 0x0) 22:33:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x8, 0x2, [@gre_common_policy=[@IFLA_GRE_COLLECT_METADATA={0x4}]]}}}]}, 0x38}}, 0x0) mount$9p_xen(&(0x7f0000000000)='@wlan1:ppp0eth1keyring&-%(.ppp1.[ppp1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2002000, &(0x7f0000000100)={'trans=xen,', {[{@mmap='mmap'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@dont_appraise='dont_appraise'}]}}) 22:33:29 executing program 1: r0 = socket$inet6(0xa, 0x400000000000803, 0x4) ioctl(r0, 0x400001000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x1, 0x0) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)=0x0) r3 = getgid() chown(&(0x7f0000000000)='./file0\x00', r2, r3) perf_event_open(&(0x7f0000001000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) r4 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x9, 0xa00) ioctl$KVM_GET_REG_LIST(r4, 0xc008aeb0, &(0x7f00000001c0)={0x3, [0x3, 0x2, 0x8001]}) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc4c85512, &(0x7f0000001000)) 22:33:29 executing program 5: socketpair(0xe, 0x5, 0x2, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0xfffffffffffffc8e) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0xff80000000000000, 0x4, 0xfffffffffffffc01, 0x2}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={0xffffffffffffffff, r0, 0x0, 0x14, &(0x7f0000000440)='lo\x00\x96o\xd6Q\xb9\xa9\xd8J,\x00\xd2\x97\x04\x03\xdc\r\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={r4, r0, 0x0, 0x14, &(0x7f0000000400)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r', r5}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000700)="d06121c3d0c649e41fcf3f86d4d5e7e0f75b3f0c5d554fa7bf92c3b7c2576b4aceb50441790222fdc82accba911fcb43b8c1e37f7e74625bbb7c55fa36025d0c1f7cc615e9d686837ba8dc63c72cefdec542db346ffebb9ab036ff404399e8c3884ce3e8453aa7015b673cec8361ad54cb4ddc8c30a48c3047a1808fecd52152ccec9cad2d66bd98b5506831e0068be1999b9e082350d64d5ba6d43375f8d82e86eccd33bc6c47d1715055587ef183a8ab6d3e81c972233ed149b5f400964342897b2f95e01fce31235182f51c1039c9de5a5944da06ce7a7ef57fe4c8b78f585b07a4c97c71a36e4fa1c48e39b5439514b0d26006dfe45bc38a90613bee2e4ab587d9ec19d02f3138885c00461ae431276a7e691fe42361c6bacb2d7345dd17f41b3d706932b9dece1e3bd92143799fdcb89da5e169732d6d19cc72074b9122c6185881603077386e86d7e9974dbb602f0f550c677a7614a25f1be04b7012050b225e49a04c63391e2b1287e2a9a1d962059083410e89ecf4d6105b8379eb8a32f0fac52fe4a8be165df6dc55ecf4686dc3517a57380fa73c317ce4fc20a1a5beddfdc8cc8c29af9bd4ad00b25583de5a22ef4c6804d8057c1fbf67c268678e27dd4571eeb4bdd7d21086b17d2e905301d10d0922c291ede3c85af3b6e52e3e5cdeca8128ed4f26cbe42aa1e93d7536e1ab144321dbf0a11e61c1b44a65a2942c3b3e195eb5b9339addcf4033e00f1d831377ef05ffe4dd7cc46e316fe0cdb953621cbb11823a556c25c62e1f2b0e5352ad4ba2f06ee3aafb057dc34a40a2e897719853bd1e804eb921fda4e090b17c5345f13bbee57ef733bfe698e98b3a8cc251d326d2b15f96e4e1e6efb632510a614b2ebb9ff0f423cce2e3d4de4ef4708e66470a86630b5117c090a27a4ebca34b1670783a9240643b6b582ddfb3f814e533d83a50debc8a5018954411ebff67e79a116dc78726dae69b14f09a9a190b2b3d0a34860f05346cb80c42c970bc32db036a75167ae4047852a073869e815c3f9d7e3a6fe05a473d4bf93af942c6c7dafae6edd2fe3aaacc9f18a09ac16cfb23afded1b069ad61f273b93fa6ce0e4e016abd078b81f38b7c50d2cfd676239998b3a8570fd431082efeb98a41a8a9ab14aca7f7c1dffdb84aeb098ee6ae836a5af776c71493dc324bc094b6788ed5b6986ad29e32a27944d94a8238920fdb67032d310a0cee17b77f8fc02cb3cdbd61f740baf20af5122550b00f5a35944a46259ebb98ee58cfc24107bb041858edd0282c0b2873fa91786be43398ed0c7183bca397d0a9b1caaeea1254ef7b9a1427233a3f40b5c7f35fea6bf9e1b523f10b8945e3b2b92bc14506f923f7993c737b11bcc14b430ffcfa0b7d148fbcb4faef23d6c99a59be39fa626f2ff65f7b07ef1f9018d6737f879779ba30f55b9be785a5d7c2b37afcaed67f79a0caf51da0c61d12fb47d5896f2981b1db7ca70d5c352b46dcabbb4959c69b03024ffe66c9246aa5bccb19a1c114d089f270706fe60689df2ed0e41105c89c758df3cc5be564156f3a98a30435fa930c75df1c1b2201f1d6833054ecd61422a88ab619a22c5f7b7a1d3709f1cb937bedc02f0c808710c413fccb75444a7f4a17de2f8543e89df37140ac06d102cbc8bfca0544bb408442c17fc947f3494a9a688814289f88c4c8addf56b628a9fe6dd0ab3d7bb526d779f76111f2145dd740d05bb014072d5356b80182a3ae4e8d27e9cd01458dad02e158c648ae4f6114bb9c1f8fdd79584605934f042c99227565ba9c0ea9578fec23f8cb68b53009d7af0fff42e15a02cf1fb7448a3ba1d6957294693b650f29cb0428478257dbbddbe28df3a4ec643f383996bbf2269f4ed2183b7688ee80c309c2e9e02cac74e9ff60c9c3ebb23637c10070cd01cf1ebcd268b51528b438570813f440eb015066276e4d4c1cad2a6a236baede0fb248775365f478612c3c3bc41324d22c0c3bf9fa92347801d7b62b9bbd6b0abdab73fd956a54a5c4de09ae429469385440e3034e8b5d7643941971d8ee1460b26bc13822941da11b2304078bf2fab8eb44cddf288d2dfc5e0b38161d1733ea6c07043aae87502a90445e4d53f11150efdb72709094e3eee659325dd62eed81394240c8cdf8ee340c9b4efc14ea9d63f8b5f7480c88b9aa18a8be7fb32762398130a88ff443a9f0b565d3658b14036afeb5fde6dc8e958b0378d98a3a87c5738a9253d5c858f61caf58e753630e023015b0609ab0414731d504f670e299dabf53ab340b62ba91bf1f869abcdc98c32447fd7df53b4b097f0b4655ff751b0e3c16747079e7d849c9f3290a5f966a485a9a590b0e1356674477c8f661a66acff0ebcdce50c98384a4e871bebcb47aeb3beeceb13c990af8477120c36dc3b2cf01db5975de975b013c925fb61b63af7245b59e42d55aca1fd3babd506382060f32c1dc10605b164d5c09de9248db3013ff60b1528484c5667fb0d42cfb40c432be57c0de3d39505fe933a199b79f97aeb7c82d8b8a623580035dac2313c5c2c9f41a205ef5b5dd33f725cdcf95f8ab88742b958d7fd0c49f5904bc9326bc4415860dac038a0ec65c96d09125dc6c924e0e22d9f36890647885fa29b12d59f65e065dafd3d5ff6bde55db2c94e293db65437583b50bbb71b9d3a1798969db94dd4e5fe8d41368cfb545e51a6f20039d629093f2324c5b74ccedb6576942992c263a813aa7de274fcdf033f88bff238f4afc9c60b7cdb093476f571fa87fbd2547ec0a0d8a83a44e2020fcaa77cc81b8f3ba032cbf9d4ce5a71deabcc9da87128d82f7fe16953b4e4380fff7f91476a6d93b3efdd60af2908e4f34c00a2e05463bd1abd3aee7efd96b2a5eb9826f90aafd86fe3bc42dc996c6a27d4d1372a6b4f861228965ad1f7fd79b2761b3af05c07ab538e7008782e3da92025de4edad2c95f57c30d03c0720ef309e630ae617ce9405617f1d941ff1b543f003eefb0b5913885062a1c0607f9984214825c518f75a56bc54f7e05eb916f6fe9aac470af514e6731d13a94f64626f3874df157edffedb035ccfb1a1fd5bb8bdbfa4a9a8c911ed22e7c7faa552917c469dabcc519c5c3bebe1d4581f6e81a2f429686e99fd4f9da8d06b1987415266f6f1db851881498fea8802c6cfaece2b6651a9ede890f4092e74a6a77696af9b46f41c5f44cf6d28db030d29eba293ba48f6589f7e4696c5090c4d9f8e763576c0f27cbea8f18229a05d0f47f2e720dd4a212746215fabd8e073195c88cad359013368772118f9ae00655fbf783f53915877c536b614f33c9249485c9dd040e37095a6bf1ec02cf5a6ceb454026da0a004cb5f4baa498cecc540bc57e47fdae8e48abb8e93b910dcb5dced04f6e083f631445ceb88e2eb74771b49adbd91b03bc4ce2fa4f2936a3f7c019de36eeebe662ccc9b9b5993650b8807e7de78fe942b49e29b103cf7d733c6164f585f1dd88ba5f8cb04c2afa3b9eabeb7d3c4fec45ccf880bfb49ff41c4215ddc268b4114f3e07f5bb71af5cfa878be9b6b9685f3b445d572ad8b4a2188fb60c1021c428465f3b036b58b6a09ee6283e13479b992c6b2d3f67c2ec8433325c0dafd32d5e68c9669723ae4f0de8d372ae1b49612081d87c2eea8ff1519af05a011664130e7bd16cb0eef8aaf9bf0ad16fa9a0ebbbf5389528c3cdd8f50323968543bec2c1f74a47ac3ab065992d7c854b6a32e6d98fe59873beff5a7d08a278a6e85edab215736f8fc61428b1b33651b8a0d84cd7caa57e4f462ab0298245c78a2cc919723b399a8bbdcd08888e6704c3da4045e1e5dca36b2b369ee99c78ba69b07d02d41852f38dda76a4f7f289668d7b0d8f8a2f9d4cbbde3fc1d065f0ee29e158ddaf5c3f77bd016f15ee5b4e134062b8bedb04d68bf94d99618d1d20548703d68f13db174ea7f1a779c374470c35b6654adbfcb039f7c8852e8a6f4cf36db01a3fa5c87ef1a418f7a7d66eb0390da623f843cdc7e71ef8abb2d80c8153af1b063653e6e6e31afd638f31f4823ab4787fcf0cc2eb2332a52bff7d776f4ba40e63da1760849e2f10a8274545a3e8708e2b221a3e06720396c9d88833235d89ca88b4f4ae32080ce5d4ea180b1fe40e6f750c005238b9e701e7a3c3a1b98c5db024cd75fd5221d1bab779f3e2a6da5d53f9cd17b94493f68d99dfd7d2eb524a13f12a5fe232829815dfdf6da5e0848fd8086aa16260feac771617b2c3504846cce915befd43e31b646c6e7927e7a588f5ca63e15b9912620c3a95b9e62b57e18751a4954dc19035bed6dfc2459d9ed26e83bfd1d87930ffbbb124ed0fe5ac01cbb842c3965c3cea43f37f5a290b3860a9f0067572b10fb158b8ebb428748dfb765a353781c5bda2809808bd5f887b1a58735561a8444e0de3b20597c1ba8e4ad64c98156c0dfe9e9b6bdc8e53afad6efb99fd06828dc3f5e20d3c5a77a1b19853ab899ae3949d95b1d5d7b15ba5c168c33bb936cd2a50e29cd72685086510fa72827387e1bee998eface152ce731935feabe0c2ae927ae59f83bc7d17893c1e0c16bbc461f0e0deb6e332fd446826bc8cfadaaa457ab63197705ce8001e976ceea2ba8024c1e0b4c0afd7caf92508e91f09c0d0646b9329362485e0ceef71c2420f3caf2ae624d03f14b31420eaff3231dd339a71e13cbb6c4db06c3af0075f4f6157d824cc071b7650b917667663270f4b327250e3080b2a05d3e54b072519b9879f52b4ea7e11106e9746f23bc4f0b425354a1e0dbf0b3bf21515ddb40f7ef0d7873078e6ec3fb56d7589eecde034b0212894c595f5c713b9f63bdb571d5d792b3fb5757421ecfd89e3ab1aa0af57bc4bff4752daa3863174add442bf44ec7ef98fa01da0355e561c191b073319996a419f467304e19ec4ef2a68c21a272799c8b341473cb19b9db6c902210ff9ca493e30f9cad40487a88f7b6610a1e1e14531ff78dc4d879c06818867f7f42d06d1eab31cb8eeb8f2ac646379748572c91ddc7fce22863d4de0a0187897a94cc5cc1f26f5e3beecb27a1eec95ff732513336c2d15ccf489529b3bab665cbf7fdf57ba12ca3913787e218e137c67bebd3000150a3fc633fe7c77888efbccf0802ad42d68fafbc75c7a4bb6287d725a2d4c5268ca730bae436de20bb45ab37c867e02b0b95fb9b9e697e0da4a857f8acfabecf2e4bee0f28039ba83041f4703c7c75d8fa0b27685358a95e93e0c1fa8ac25b1f183810d107d342e3a220d6cbdd99d5fc46b37e46bbe29006bb3dac5957dffd60256fb4461938d0aa16d8e086f7912b196cf35cf1b329398ca1130a3d2984d75c2c9248e6869b66d7040d71be20aa51d0e68bca33d3014633d0690cd08fe9f895562a4cba287a89f8db731fc9dbb7164feaf2e50ad6bdcc19d2d3001d3c758dc87d388f6d49d9395ad1c30fe163fb21e0e166290733610c2f813bb74e42c5e82123a478c29d8392df9491c917097cc39d0f56eab596d24a0fd794deb3ec2d23a10cc83e120a79b8f0eca5958618c6f2985f33c643869afbb9267ff5abacbd5ef5a88de2bc0d55cf8a9e1b0fbd2b1cef72f754591f90daa3f9e785f267c2d714efcd2559ce49645f93d303037e4a9604ae73b918ecc2ba93633500fc17c3cca74e704e42ed09b638685e592a8b5da2e110ea71c913a28b736f0ed48d525bcf23df15c44b9f0f8302d7c752be1532a5499650a2bff21feab3b1b54839650ce79aeacbe866ce89b86308c481dc3e6a268e1289be5a9bd415c87b9e", 0x0}, 0x18) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0x4, &(0x7f0000002500), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x22a, 0xfffffffffffffff9, 0x1}, 0xffffffffffffff55) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000600)={r3, &(0x7f0000000500), 0x0}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xf, 0x6, 0x80000000, 0x5, 0x8, 0xffffffffffffffff, 0x10001}, 0x2c) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) ioctl$sock_kcm_SIOCKCMUNATTACH(r7, 0x89e1, &(0x7f00000003c0)={r0}) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) r9 = socket$kcm(0xa, 0x2, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f0000001700)={0x0, @bt={0x3ff, 0x0, 0x1, 0x1, 0x0, 0x8, 0x8, 0x428, 0x6da0, 0xfffffffffffffff9, 0x4, 0x6, 0x1, 0x3ff, 0x10, 0xe}}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x22) socketpair(0x11, 0x804, 0x5, &(0x7f0000000200)) r10 = gettid() perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x3, 0x39, 0x961, 0x8, 0x0, 0x695d, 0x8, 0x0, 0x3, 0x3f, 0x7ff, 0x0, 0x35f, 0x2, 0x5c1, 0x9, 0x5, 0x800, 0x504, 0x100, 0x8, 0xffffffff, 0x80000001, 0x5, 0x8001, 0xb6, 0x800000000000, 0x8, 0x3b2e, 0x188, 0x98a, 0x1, 0x10001, 0xfffffffffffffffd, 0xffffffffffffff80, 0xffffffffffffffff, 0x0, 0x87b, 0x5, @perf_bp={&(0x7f0000000240), 0x2}, 0x20, 0x0, 0x832, 0x0, 0x8, 0x3, 0x1}, r10, 0x6, 0xffffffffffffff9c, 0x1) socket$kcm(0x29, 0x800002, 0x0) write$cgroup_int(r8, &(0x7f0000000180)=0x2, 0x12) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x8916, &(0x7f0000000000)={r7}) perf_event_open(&(0x7f0000000500)={0x4000002, 0x70, 0x2, 0x1a, 0x9, 0x3, 0x0, 0x3ff, 0x91460, 0x2, 0x7fffffff, 0x1e, 0x6, 0x2, 0x80000000, 0xa8, 0x7ff, 0xfffffffffffff555, 0x474eb7df, 0x1, 0x7, 0x8, 0x9b, 0x20, 0x2, 0x3, 0x2, 0x6, 0x7, 0xffffffff8fee0f47, 0x41, 0xb2, 0x3, 0x7, 0x7, 0x4, 0x7, 0x3, 0x0, 0x80000000, 0x6, @perf_bp={&(0x7f0000000100), 0x9}, 0x2824c, 0x3, 0x9, 0x2, 0x100000000, 0x1000, 0x100000000}, r6, 0xa, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, 0x0) 22:33:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)={0x80000000, 0xc, [0x5b, 0x3, 0x0]}) r1 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x10000000100132, 0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000040), 0x0, &(0x7f0000001280), &(0x7f00000001c0)={0x0, 0x2710}) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/21, 0x4d0d6200, 0x800}, 0x18) fcntl$getown(0xffffffffffffffff, 0x9) 22:33:29 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:29 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000540)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x8) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x10201, 0x2, 0xf001, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x4, 0x10000000006, 0x8, 0x8}, {0xfff, 0xffffffffffffffff, 0x2, 0x200}, {0x401, 0x3, 0x150b, 0x80000000}]}) 22:33:30 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) r3 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x0, 0x2, 0x2, 0x0, {0xa, 0x4e23, 0x47, @local, 0xf0}}}, 0x32) poll(&(0x7f0000000100)=[{r1}], 0x1, 0xfffffffffffffffa) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x200, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0xfffffffffffffffe}) r4 = syz_open_pts(r1, 0x2) dup3(r4, r1, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 22:33:30 executing program 2: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socket$inet_udp(0x2, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x6000, 0x40) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x801004005fe) r1 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) [ 282.621089] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 22:33:30 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=@fragment, 0x8) sendto(r0, &(0x7f00000000c0), 0x8, 0x0, &(0x7f0000000180)=@nl=@unspec, 0x80) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$getenv(0x4201, r1, 0x7, &(0x7f0000000080)) [ 282.704057] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 282.704057] 22:33:30 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x1a8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000740], 0x0, 0x0, &(0x7f0000000740)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'bridge0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @dev, [], @remote, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x70, 0xa0, 0x118}, [@common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}]}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x220) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x7ff}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e24, 0xfffffffffffffffc, @dev={0xfe, 0x80, [], 0xa}, 0xffffffff}}, 0x2d0, 0x7f, 0xffffffffffff0000, 0xffffffffffffff55, 0x100}, &(0x7f0000000080)=0x98) 22:33:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000040)={0x4, 0x0, 0x1ff, 0x6, '\x00', 0x80000001}) close(r0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000001e000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 282.813279] overlayfs: filesystem on './file0' not supported as upperdir 22:33:30 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={&(0x7f0000000140), 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x18, 0x201, 0x0, 0x0, {0x1d, 0xd601}, [@typed={0x14, 0x9, @ipv6=@mcast1}]}, 0x28}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) 22:33:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080), 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="145f420000000000000007ff0000000056cd26d806000000000000000000080000000000000008000500ac14141b080003000100000f011a047776579c992971d6bcdcf9524d1793ba376e5d0566266582ea5cd2f5cc48ecde88bd08a505de223206737ac5da54aa02ec1faaf249481a0b9bbe017db6945eb292d8a0ba"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000), 0xc, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="00040300006bfcdbd725"], 0x1}}, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x3, 0x6000, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) r5 = getuid() syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0xa, &(0x7f0000000b00)=[{&(0x7f0000000500)="cd6204028a39e7e1baacb5904bb2a241133922f59f4652512db5a2f5e9899fb42d2ac7c1b0f7e4783bb1508b1814d7bc27f0cc8f446c172d8b71ef45e5b7e7ec68a3c7e5d56cf8112109d25f16a3bec73201722f21d7fe366a80a4a1dff81d5f260f4731d20cf7ef045da1a7bdb0761b383e90c7d5c86e95674c2cf0b21ea6b627e1f081d60ccfcb6fd6abf081d2d4d91e17a878653814a7ca028c2edc8a4b940ca40e3c0f9e3288ae903f1043586bbdfc01d9136fb76090d31ba380f7d6f555db95d22762e2b7999a04269eafcf07ec4776f68d0d104b2dbad6b908", 0xdc, 0x3}, {&(0x7f0000000600)="af6ed006f7bdcba6903295a6c943f5fdb72b78945c2e6081fba2303cb6704651db8bc2ef8ef2f9c85a931721adea29d9436ecbfa0529ee762c4b403895eff047edb02d5cbd793cdabc155e489a3f046bc3218070123fe4be37c766aee925249014c13b7e0ef453fb5e132c112c1116bc093e688928e69f411764e2fef9651e55a95b5f99fd40fc25a1a3c85dd4f955f777d9dc681d06f44964befab4f5906c45c44eae537df6b0c83892", 0xaa, 0x1}, {&(0x7f00000006c0)="3e9bbb9fc4b9e828dbeff94ce259095627f09a7a288c64a1639419605e2073a904453a032d6a36d18b61fb95af41ed769204881bbe266f4883c459f7b4248ce19348c992785c172b1ae9dd4efa213d7bf6c3431648d862899ba074", 0x5b, 0x1f}, {&(0x7f0000000740), 0x0, 0x400}, {&(0x7f0000000780)="ffd2f70a7990281666cede000857a1385ba223d1580af06e7bb6d1ff98f543dff19c5408491fa508160d201e958952a08bae496b66c2bb6f0c147b7748ba3f29be23d1ded87a37d7f8c0c74084edf23d9db091b9edd0d4c7ac34fccacc09de8e15194743264a43d59b2f8cc9062312328714f4f0aeb0c6b3e2f20f2b437d8affc117a76ebd54a3ce577f627895b6dce55cfc8a3165dcdfefe5f5aeef7a2542", 0x9f, 0x401}, {&(0x7f0000000840)="9719fecc9ab62c4d54882a2e262604facc2e439980f33f70a65246b5fc353f61ce12f381017d33d44008c33f0199f068ea172267297a81d8a5a663ed62143968244d98fdefc3fc65a399a3b40b6b0e18d4073e13e735801e281fe6a51218c0b13b4684569889ba19791241ae6a0a6343b9e7c5b5f65e32370b83050689f2a5f4941965a107853dbad67faa645476da7bc11e6b568c48dd3a4b3a1d1a715e7f86169d46101e11fe35", 0xa8, 0xb247}, {&(0x7f0000000900)="f87c3a5e398f783c54a97cc3cd8f07c713ec7af407685987133d2b74314cc77bcd029b13027a75c4214d6c2a028e9f076e74ddbc8e6a843828dfcf94888c8e47c8277fdc007570bec5b074d032ea4309db00a63758353f301c515f937ceaae7de0cb93", 0x63, 0x4}, {&(0x7f0000000980)="246601206ed20cf655ed95681d2b221e193c34ab33d1ee36f70da01a045672927e8fa03022aa5b41ffe88db600e4fea802d9f3514d2988f73ba5556efac1934e85939a7c766ad32c4893a192d1242be016452be80cd2e6512e39fb07efa5453786c88ab2026a8a0fed1257c4ec174dd01b6b020bc0344f7e557f5ef852756da86abfb2de4aba0bca0662bf11521bad2c9259b5c713ca12cf36b0fe071e80c9da9a4a106637f46c4f1e73badcb24a955f9aea3e8461066009305ae6a4bc62d132e2338a3f6de610", 0xc7, 0xfffffffffffffff8}, {&(0x7f0000000a80)="e308db37160a164f28b4077ab23c6311a317a68d4854cfcbb61abc79b1072aac95843b7d66e70ed5e5df35", 0x2b, 0x1ff}, {&(0x7f0000000ac0)="ac76778404ddc5a36096ee923b8ed849f3309a15898054aeac0f8ce877c1e893b40dac66a412dc6a9da436bc4e72", 0x2e, 0x10001}], 0x10, &(0x7f0000000c00)={[], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_eq={'uid', 0x3d, r5}}, {@appraise_type='appraise_type=imasig'}]}) setsockopt$llc_int(r4, 0x10c, 0x0, &(0x7f00000001c0)=0x7fff, 0x4) ioctl$KVM_RUN(r3, 0xae80, 0x0) 22:33:30 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x485, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) clone(0x13102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r1, 0xc0185500, &(0x7f0000000000)=ANY=[]) socketpair(0x1f, 0x6, 0x8, &(0x7f0000000000)) [ 282.974606] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 282.999029] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 282.999029] [ 283.116833] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 283.124544] netlink: 'syz-executor2': attribute type 9 has an invalid length. 22:33:30 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) [ 283.176167] ntfs: (device loop0): parse_options(): Unrecognized mount option func. [ 283.185886] vhci_hcd: default hub control req: 0500 v0000 i0006 l0 [ 283.198997] netlink: 'syz-executor2': attribute type 9 has an invalid length. 22:33:30 executing program 4: getpeername(0xffffffffffffffff, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x485, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000080), &(0x7f00000000c0)=0xc) clone(0x13102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0xc000000100079) ioctl$KVM_SET_CPUID(r1, 0xc0185500, &(0x7f0000000000)=ANY=[]) socketpair(0x1f, 0x6, 0x8, &(0x7f0000000000)) [ 283.235627] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. [ 283.272178] ntfs: (device loop0): parse_options(): Unrecognized mount option . 22:33:30 executing program 5: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) unlink(&(0x7f00000003c0)='./bus\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') preadv(r1, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0xf6}], 0x1, 0x80000000) lsetxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)=@known='trusted.overlay.redirect\x00', &(0x7f0000000180)='smaps\x00', 0x6, 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) [ 283.345169] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 283.351124] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 283.377681] audit: type=1804 audit(1545086010.829:33): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir384453122/syzkaller.P9kc7j/18/bus" dev="sda1" ino=16593 res=1 [ 283.379976] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 283.379976] [ 283.480545] audit: type=1804 audit(1545086010.919:34): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir384453122/syzkaller.P9kc7j/18/bus" dev="sda1" ino=16594 res=1 [ 283.577335] ntfs: (device loop0): parse_options(): Unrecognized mount option func. 22:33:31 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/82, 0x52}], 0x1) ioctl$int_in(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x4) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x3) ioctl$VIDIOC_S_HW_FREQ_SEEK(0xffffffffffffffff, 0x40305652, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x3, 0x5}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000400)={0x9, 0x8002, 0x4000000000000000, 0x80000000, r2}, &(0x7f0000000500)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000200)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, 0x0) r3 = semget$private(0x0, 0x0, 0x6ac) semctl$GETZCNT(r3, 0x7, 0xf, &(0x7f0000000100)=""/36) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000280)) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000440)={0x7, 0x1, @start={0xff, 0x1}}) syz_open_procfs(0x0, &(0x7f0000000140)='net/softnet_stat\x00') 22:33:31 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x69e, 0x4) ioctl$TIOCSSOFTCAR(r0, 0x40096102, &(0x7f00000001c0)) 22:33:31 executing program 4: socketpair$unix(0x1, 0x40000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = getuid() syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x2400) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="b800000000000000010000000000000003000000000000000000000000000000feffffffffffffff0300000000000000ff0f0000020000000400000000000000010100000000000009000000000000001f0000000000000008000000000000000000000000000000ff7f00000500000001000000ff000000e80e0000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="01000000040000150700000000000000000000000000000000002f6465762f70746d780000000000000000000000000000000000"], 0xb8) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000000)=0x2) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000532000)=0x19) 22:33:31 executing program 5: ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000001c0)='/dev/usbmon#\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) pipe(0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f00000002c0)={0x1, 0x0, "60f5a3f6efd4174105cd433cb6f71a40516eb81045434c8d", {0x100, 0x6}}) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x0, 0x1, 0x3, 0x3}}, 0x26) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000200)=@random={'os2.', '--)\xb9ð0bdevuservboxnet0@\x00'}, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x100, 0x800) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000001880)={0x7, 0x0, [{0xf000, 0x75, &(0x7f0000000380)=""/117}, {0x3002, 0x1000, &(0x7f0000000640)=""/4096}, {0x0, 0xc4, &(0x7f0000000400)=""/196}, {0x4, 0x9a, &(0x7f0000001640)=""/154}, {0x10004, 0xa4, &(0x7f0000001700)=""/164}, {0x2000, 0xaa, &(0x7f00000017c0)=""/170}, {0x100000, 0x32, &(0x7f0000000500)=""/50}]}) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) connect$can_bcm(0xffffffffffffffff, &(0x7f0000002ff0), 0x10) r5 = syz_open_dev$usb(&(0x7f0000001980)='/dev/bus/usb/00#/00#\x00', 0x2, 0x101000) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r5, 0x111, 0x1, 0x4, 0x4) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000100)={0xd, 0x5, {0x53, 0xfffffffffffffffe, 0x0, {0x3}, {0x0, 0x97}, @const={0x6, {0x80000001, 0x9, 0x0, 0x8}}}, {0x52, 0x40, 0x0, {}, {0xf744, 0x964}, @ramp={0xfffffffffffffffc, 0x3a, {0x5, 0x0, 0x6a, 0x8}}}}) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000300)=""/16) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) [ 283.617675] ntfs: (device loop0): parse_options(): Unrecognized mount option appraise_type. 22:33:31 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) [ 283.665509] ntfs: (device loop0): parse_options(): Unrecognized mount option . 22:33:31 executing program 4: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f00000001c0)=r2) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)="2b004ca0514c9e16", 0x8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r0, r3}, &(0x7f0000000080)=""/107, 0x6b, &(0x7f0000000280)={&(0x7f0000000580)={'rmd128-generic\x00'}, &(0x7f0000000240)}) 22:33:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x2c) gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x200000001, 0x20000000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b0f, &(0x7f00000000c0)='ip6gre0\x00') getresuid(0x0, 0x0, &(0x7f00000001c0)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/sequencer2\x00', 0x40042, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r3, r2) 22:33:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000000b80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x2, &(0x7f00000000c0)={&(0x7f0000000240)={0x14, 0x1d, 0xfffffffffffffffd, 0x0, 0x0, {0x1f}}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x500002}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x154, r1, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x202}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfffffffffffffffd}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6ed6}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x16}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4e}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x154}, 0x1, 0x0, 0x0, 0xc041}, 0x20004810) [ 283.855437] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 22:33:31 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x1fff, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000200)={@local, @local}, &(0x7f00000001c0)=0xffffffffffffffc4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@in={0x2, 0x4e22}, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fffd000044811fee7f51f50e124dd9a74aa4e0bf6c5f87d03b5828f34865ccc61405000000d51518dfff20a5ace1ca2569f0eef5"], 0x18}, 0x0) 22:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, &(0x7f00000000c0), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2e0) [ 283.915981] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 283.915981] 22:33:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000a80)='/dev/vbi#\x00', 0x3, 0x2) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x9, 0x0) getsockopt$inet6_dccp_int(r2, 0x21, 0xb, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) r4 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_REINJECT_CONTROL(r4, 0x4030ae7b, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x2, 0x1}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r5, 0x2}, 0x8) 22:33:31 executing program 0: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x1) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000003c0)={0x6, 0x2, [{0x0, 0x0, 0x8}, {0x3, 0x0, 0x101}, {0x401, 0x0, 0x8}, {0x5, 0x0, 0x80000000}, {0xe5, 0x0, 0x20}, {0x8, 0x0, 0xe1c}]}) r1 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000380)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) r5 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x8, 0x10000) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) dup3(r1, 0xffffffffffffffff, 0x80000) sendmmsg$alg(r4, &(0x7f00000000c0)=[{0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x1}], 0x1, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0xd, 0x2, {{0x20, 0x4}, 0x6}}, 0x18) ioctl$VIDIOC_SUBDEV_G_SELECTION(0xffffffffffffffff, 0xc040563d, &(0x7f0000000040)={0x0, 0x5, 0x1, 0x0, {0x1000, 0xffffffffffffffe0, 0xff, 0x7}}) ioctl$TIOCGSID(r5, 0x5429, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x8, 0x0, 0x34640046, 0x0, 0x737, 0x420, 0x1, 0x0, 0xed27, 0x1, 0xb, 0x400, 0x0, 0x8001, 0x2daea2b5, 0x0, 0x8001, 0x8001, 0x5, 0x80000001, 0x7, 0x67dd, 0x80, 0x7, 0x1, 0x10001, 0x0, 0x800, 0x8000, 0x3, 0x0, 0x1, 0x80, 0x20, 0x0, 0x0, 0x100000001, 0x0, @perf_bp={0x0, 0x1}, 0x1000, 0xfffffffffffffff8, 0x100000000, 0x3, 0x0, 0x2, 0x1}, 0x0, 0xd, r5, 0xa) finit_module(r2, &(0x7f0000000240)='aead\x00', 0x3) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e23, @loopback}}) sendmmsg$alg(r4, &(0x7f0000000f40)=[{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)="1d162c4e3f617c5f67860fd3accc30c40ea4bb4c446fda251586b72c9fa5c7f88e1a18c1c167036c94340fc6144b0b990050ff05113889741fefeed0cbebf3b27e105bbfbe866bb4fcf4059fe3b1353a4208325600abc757cb445f69ca67de4dcfa0e07153656d74dca91dbbc7dc99ae370221c19e58893bb676f81ffdebbcdd593a", 0x82}], 0x1, 0x0, 0x0, 0x4001}, {0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000c00)}], 0x1, 0x0, 0x0, 0x20000000}], 0x2, 0x2000c000) recvmmsg(r4, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x0, 0x0, 0xffefffffffffffff}}) [ 284.119609] xt_helper: cannot load conntrack support for proto=7 22:33:31 executing program 1: r0 = open(&(0x7f00007e2ff8)='./file0\x00', 0x80040, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) fcntl$setlease(r1, 0x400, 0x0) write$FUSE_IOCTL(r0, &(0x7f0000000000)={0x20, 0x0, 0x7, {0x0, 0x0, 0xfff, 0xfff}}, 0x20) fcntl$setlease(r0, 0x400, 0x0) 22:33:31 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x70, 0x200, 0x5, 0xa8af, 0x0, 0x0, 0x0, 0x0, 0xa, 0xef, 0x200, 0x47, 0x3ac, 0x0, 0x9, 0x3, 0x7fff, 0xffffffffffffffc1, 0x3, 0x3, 0x1, 0x9, 0x800, 0x1, 0x3, 0x7, 0x8, 0x5, 0x8, 0x10001, 0x724ae1a4, 0x1, 0x80, 0x401, 0xffffffffffffffaa, 0x1ff, 0x2, 0x0, 0x100000001, 0xd8fde441b05dc3a, @perf_config_ext={0x8, 0x58f825c2}, 0x0, 0x480000000, 0x3, 0x0, 0x7, 0x1549, 0x8}, 0xffffffffffffff9c, 0xc, 0xffffffffffffff9c, 0x8) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400207) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/196, 0xc4}], 0x1, 0x0) io_setup(0x8, &(0x7f0000000100)=0x0) io_getevents(r3, 0x0, 0x0, 0x0, 0x0) close(r2) socket(0x4000040000000015, 0x805, 0x0) io_submit(r3, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r2, &(0x7f0000000140), 0x700000000000}]) r4 = getuid() ioprio_set$uid(0x3, r4, 0x1) 22:33:31 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00', 0x19, 0x2, 0x268, [0x20000540, 0x0, 0x0, 0x20000748, 0x20000778], 0x90, &(0x7f00000000c0), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0xd, 0x0, 0x0, 'ip6gre0\x00', 'gre0\x00', 'bridge_slave_1\x00', 'veth1_to_bridge\x00', @remote, [], @remote, [], 0xb0, 0xb0, 0xe8, [@mark_m={'mark_m\x00', 0x18, {{0x0, 0x0, 0x0, 0x2}}}]}}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}, {{{0x15, 0x0, 0x0, 'ip_vti0\x00', 'syz_tun\x00', 'sit0\x00', 'bond0\x00', @remote, [], @local, [], 0xc0, 0xc0, 0xf0, [@helper={'helper\x00', 0x28, {{0x0, 'RAS\x00'}}}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2e0) 22:33:31 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x280000, 0x10) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") syz_emit_ethernet(0x300606, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300003, 0xffffff32, 0x0, @ipv4={[], [], @multicast2}, @mcast2={0xff, 0x4}, {[], @icmpv6=@time_exceed={0xffffff83, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 22:33:31 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x4}, &(0x7f00009b1ffc)) r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7fff, 0x0) mq_timedreceive(r1, &(0x7f0000000180)=""/50, 0x32, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) rename(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') process_vm_readv(r0, &(0x7f0000000640)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x354, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) tkill(r0, 0x1000000000014) ptrace$setopts(0x4200, r0, 0x8, 0x100066) [ 284.444656] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem [ 284.515869] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 284.515869] 22:33:32 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000100)) syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000040)) r0 = memfd_create(&(0x7f0000000540), 0x2000000000100000) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000740)={0x1, 0x480000}, 0x2) syz_mount_image$gfs2(&(0x7f0000000780)='gfs2\x00', &(0x7f0000000800)='./file0\x00', 0x101, 0x1, &(0x7f0000000e40)=[{&(0x7f0000000d40)}], 0x0, &(0x7f0000000ec0)={[{@meta='meta'}, {@nobarrier='nobarrier'}, {@nosuiddir='nosuiddir'}, {@discard='discard'}, {@nosuiddir='nosuiddir'}]}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000400)=r0, 0x4) r1 = socket$netlink(0x10, 0x3, 0xd) signalfd(r1, &(0x7f0000000680)={0x80000001}, 0x8) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000300), 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000880)={0x0, 0x0, 0x5, 0x0, [], [{0x9, 0x9218, 0x0, 0x81}, {0x3ff, 0x100, 0x0, 0x0, 0x2, 0x6}], [[], [], [], [], []]}) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000006c0)=[&(0x7f0000000540)='\x00#\xe8\xe36\xbd\x11\xd9\x00\xbc%W9\x11\xb5\xe6\xd1\\\x12\xa86\xfb5\xac\xf1\x16\x87\xf4\xaek\xf1\xffi\xdf\xa5\x0e\x8e\xbf\xc5\xff\xb1\x1a#', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000840)=']\x00', &(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', &(0x7f00000007c0)='}md5sum\x00', &(0x7f0000000440)='[md5sumcgroup\x00'], &(0x7f0000000780), 0x1000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/22, &(0x7f0000000380)=0x16) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000640)='-trusted\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)='%posix_acl_access\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='GPL\x00', &(0x7f0000000240)='\x00'], 0x800) write$P9_RLINK(r0, &(0x7f0000000340)={0x7, 0x47, 0x1}, 0x7) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0), 0x0) [ 284.611700] xt_helper: cannot load conntrack support for proto=7 22:33:32 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) syz_open_dev$video(0x0, 0x0, 0x40) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x1015, 0x2, 0x101, "881a1b74725ff6e58f8f40e16ba7bd8c", "7cb4029fae0c862afaabae79919a4cdb4cfa7e92d9ce8168f63677a1a50d1e3b208bf91e576fe4d4405054d0fc647c55d4713576456f563e0057f71eb59ef1be97a9ae8cab88c0557c652b9a5d3d83b891a5cf5f4ced3f12b7724e79bb7fe56758f204f9f6a22956ee70bb772e0ac0f490f3d73ab8e98adac75d89fc072bf9f0dce92b643cd1cc0505929e0c82f5b3408e61a06dfc55bcd3b8abffef2468e09de7fa1d3b302a9161fada0ceafe1e19d1e145e2d56cee515d725094976fdc8f036ef28ca7fdd155cb1603649fbe52fbbaac59c227dcde8c9e0afe723ae46051bce251e9c2dfc00e2f7bc9388f47ea89748423cbbc14c57846c9e486f9b50affd72a00466b817a71a7bd0c1ffcfa8acf2daeca2ea725bbe91aa1ee818bcfc9fd36b5df0db6ad64a275fc3871097b15a8384648d20b3cb3f71659d0346cc71c825d16c070e1ad303f87125c397c1b2b90714144838e75c29fb5075878bf004f6211d162947f39ab608b489b7c6274b6b82b03648500e0bdb03f59d10cf2ebcceb9d569094696a1af0f94e856b115748d5490126e302ccd0fcb62dabd4b0668e6352286ccc15151315b2888db52102cfb5576b3013b0d5ffed9d18f7c718972d72a3c6c723d0988f8278dcee3cb91cd64c1f41b38dce9ac6ac2cba7be3f56e382c516adf11f21987cb37d24979709058e65defc4e0380677239dec8bc202b3e27202ebc32ebf65b9139e7f2b617871f71818337394b0de490201f851257127f1a2b3d46d25464f7047ddc93d8d474415a78f98a7adfef6f4899c1637e0f010aace3457b842e404e0bcef72ba6a983d4f369ed1892067c73dbf7f697d04f7094ab90d2644e4319afcec9960b5d209594d2baf0c50f56e4dba1456c1bf3c227092f1d8b7fd82dc6fc591f18fada108576721c00f8b06dad9c158f15046a321b048066df2afb28f8a8d25791b584532edea47f4f7f7cc18035525cd24d60771a1e7360d49702a0a52ff56db0ed46ef522582202969d01dcb922694ad565eb44e515c629086d18caa067ccb1bf598766eb2179bbb30b4c0d47d55a84e3d2399ed871f5ce570c00116398d81e77f975c121ccb45348ce989baeb61786ef14c3d15401fa860bbf1b9281341518045df1e3c423ac4f0c97940225dc0e51db3c7871a796d289e1826a8dbe052305664fc728db9a1f5257227457a97d2685d3f9b31fa33c27609e18f4a1e139e47d8c8879fe81d87767d755eb0aed83168d88e141a1d35784e08e1a06a2d2f02f108f32c8b73718cb37208909be9067dbeac1c41a6824dac438807f6db40b18486a4e8ac3bf4c40ba48b1753d285129422cd19317468250fb18578c7605c463e06e68a1397b2759133a72ce700ac7033eafac1ac659c10ef579922b076cf6aa1cb8cf4176438cbb5ec84fec6fe49a9c1df95d9309eef44e73a128802162215c88e31298f33b6e8ec861fe6abdd6115036f1153f110def93707a1b6b9e312a302ff3752bcedfa8a1213b3a988eb5592d61d094e8535f1cf074172e1d89ad89f014e19b55ad08c98ef3c14ec2ba7104e1a2109029527a0b4d9c0a1586e2d911bd1ba6b135722517bb555ad433c9d3ebe33addceb1f9a0f0248b4cd4fd9b3b7a3460e0cb152986b77be71c883b18fc975c8d46476f23d962064d22f0636e0e9e4c574ea52b5d57b85b7896c1a1e635f1ca98b2e75281cd09054ee18c96a7d8243ec3a3e2a49d7193adff07694cfac4c0d8baa12da4c3a90e1832ca38f4abe0cf59f4ce5d4d231ec1e3ce05059806e02d4f9b6dff7363268b93285077027bf972bf163952a3c5f7d83c426b99f49924b74729adba190a9522a59c11d1287510d5672b44c583343465129607181d475854947b04596070b3f56eca2aa852632e1d25df20291b4e3e8195ac28227b2bd083e475f7b4d4f3867abf5c4bcd4ed31d09dcff1a0906eb7347bfa1e4d9ae21909028430aba7406c6271142601aefc54a0801fc3f3ac094bdc39d7398e369ffc01789863c1d4486d01d8904c89ef3c8d601ba61f4950f98ff738158a44464bb178bc5d22a47594b0094dfbc16afb642c86fd647253a615103a5816d263778a0945b3bcc4b85234671c8178e8d2270eecdb5f0e949d4f65cfbc2d950535441b33c48ab44b69278b647f8861c4f84724d11f976b9e9f7c232af6746dcd9c6b52acd23b4ece8cc69e94847d45599f710fa5d8897b5924ff39531ee36df0ee042333c131416d75f8cddf6435b8b283220893d02704c4a46d0a3fc6e53371a161837fdcb3a1e3db3320a438cf537d4a843dd4d2d0cc78790a810621442205ab68b25e46d3fcd14591b13da07b73abd4f77e04bc1bf1cb8368854ae68484d7cf9a9a51e7869d190288d20b1ae38b4a2b66d1788b12c6b2291ca4d505e104a538a5964ccb8a4cbf21ee789a34d108c6e2a263eccd5a66b835fb97e63bbe93a904a788a2eaca9b416d63401412731ce4223d2b31bc8bc1b9860aeaafeecb03417c93a6c862a433630b9f8cfbf010ffc40b7c34f52899ff9e9e2efcf6ea3711cddf06ba83fdc9228a13c79903cb5b52869706d8d4f0be657ce8c6adb7df547dcbee6f2d4ba354239e237129da34a210118038b23039508e2742582aa9fda126190c13900b78d9edd4cbda9f72f9096a4ae1c9212a9bde17470e07929e380cf60d1c84268959457b981a09a3d3307b154f2832b9bfa4b998393988e5079ec9dbe53da97d034df3cc47519a63b491d3372f6cf5cd8c2435889faac77cca1475a61d61ee13e9a6d26241ff78550c70fba5c18a25e766da9b7bed4f8095bd062eef4651c4cb7cef418b125f86680a574fd4a55800fc3922fa9e9eed76bf2c5df9bc9b1ab2293cba44ff939dce77ec787f178d30a91116e408c37cc4051f743405ab440a572dbda185bca41422df0634e5f88cc943334171524b762038d7c35be23db5fe11001e98ad831dcf2d3dba49484d5fe2ed4c089ab1e8c0dd8940e607d9b745659b6c76baed9bf75ecdbcaa325f662e5030e4bfa2d4788d50ff0595e766c706b644760355ea9c940dacac271b8d56958e1c29ff02c4ae9087535cc2b69e7c03434b767af0e6271e21f758493d578c6f17364d5d3a52c860a46bda3aa9d544d890f065aa3fd62963d2cb7ba59967e2f0a19fc2e6ba634aeb5c707e76509301512a3c742e4ad77cc18f00ce462889dac44ddfc97788e11d1e7ae4c14e9eec27a43fe252e3cfb013a127cf71ca0fe933d7f1ec2ab45f80f718b032938dcd8d244032c6f5ec9130c7e55b3c9f54454cdc8df67e43eb08183df29fbc190ac4d89f0d2441e62e0c1c93b8d9704cfa4678c65ff32952bcaa6a670928b9cd1c854c99b9e389b5aeacce24f4605a8530f6f79dc2b19a808500ba7c3a164bc4a6d1542d45251ab4e278c55e8c44e9f2c0f149fd5e0d8f2966c1bb67856abb547b7b994944f4ab57dd533652d211b12d9174c6affc3c057bafdb7f1d79665ca145ea63608882b731b6271837844b33ded334141036a1c21b0178571d376b7569b3a28f64ff84c8291c3c360b64e4f043aef165e22993d3fc28e7e310a64a64085d00047f086dcae3177b55287ea8ee995321c61b949a0d7e8729585fbe689499863fb5f6a5c615c5d186b1c2f681054f0479734ebe762a3dd0781d1e0765e0e9a58334933e52b1fb233c832a9d78f7b6605a997de70e208b09289abb812f989caae3f313e1022c561d0199fdf4c7a096459b9cd9ca6304a0a9b7604ae9098fdec936924ba829df48320acd5e906cf552098cd9d0e688685c3634c43b8eb51cbd4ea32f0feb7f1dadb21444d936b29875adc3c8e93c2240b3f29f4c07306b5297356b2c1c0587988c368d77666c4722f6d3a55081c0c97766e48a9f95887340c9c649fb2ad68b17c560ec14fb2ad4179c85310924f31bbeb72be0eac692b841c30a3d6d6935650a5eed0f0ef142ada2bd45a49c63863eab181d6a43b5dcda8319332876aebc850fa7ae5d42bc3289e44a22ee22b69835890c8034d19d1f670f8b9fa77ac478faea4878a7e4dead183427122f5df8e11e1c397414499195824a46455c824dadd961044ac93c4bd3509162ac8417db05dd3cd0a59df8b2ae376b2e63d2cfed1c8158e131da7f55962598d41406132032266dba404a48bffe4c75f016e21bd705387e966842d87d150f0206f3c7797ef314c1ca481c8b4e01e08fb4faea5d72dcc5e7ff50c0b440678ae0839e2d08fecda0182d8cf109b17cb80bc9c827c295b6db7e59efa9e92bda626601cb0037492855a48e872c53aa55d63883181e8a4e299e638c1a6233bce853e5d337d0ed59a53ae0aa3a5c2c88679f4ef8a7a91514e63d70513f3591c80100a9564d4748bd407e901120057a7a27a7e397fcb253223b506ea548b64036821fbaae7d0599a4684ce703305bb89b2901108137169e6656abf133b4d94cb84a741b9d781b6816e7bb47e82d9328faa467ea27a2628abd912b930e676750ff43b3767f97d7217e5336bf29694ef886cb870f4e6758995172f41190f6d364e638e602e65ab05ff2e525b387bf02fe699cbd9bbceae6db5a811f6adecbe21a8015a286c54087b417e5e16681b6c10b9d49e759b9ca3078a118ace84a384a4f9a1e720a1546a208a92e1f37a49ea3e577e0f72fb4b4ea0022c8460356a2dbf58a5cfe4bd646d107b6706a52661b566964183afb1b4e63ecf2e13db72727a1c288cf8a86229df83ad5de6da464ebcedb2a4b41da6f9038622f386843f10d4500a55e3f4468d8f5d7463dea178a86238ce2fec3d2b4ebda7ecf1962abc4123f5cfb38cbbe5635c37a24a501b40eadf88f1982cd8d5ec5eeba149be752f645705f5b7498b20d15c51912f32a38234349047056433f161712ab9a694d7f37d15e2d959effbe116db5417a6f9f3d95a53074fa68732c5832dcfe0dcc462a0e40fb4ed1ba3e10484102b1e127cdf0106cc494c8b780c0eaa80064c0a93ec2986c3616a1b2e2cb7dbfed50bad776572884810a3dd6847210f762790dd19cb59ff76710fa76e2fe137c2e6903378a004b732e2a076adcb346c0a453d47c5869b326dfa6c0fef8ce89485752ba92f96b441831534f30db545e5a509de1b15cb7840ed4faa59ca153957fd7819a84dcf6db1d50ef668b96b25c87534400e4a17631ecc9d06536e4a71a85d93413f9fa0cd6203eb7b49a87c4660f4ae860622562e3444fc0902a3c23daa61e9c0a832c0872fbcfea77036830aecf78f7447351cf70d9838f968000e1bc1ba0c703e75050af9399f946a6bf70f5380c2ba82650c2e26ee1f8bf7e8410a4639ae3d5b9143e47a179e5f3499455b2aacbc0530ccacc6787cdb3e87c3df068c1c98ec80768683be754ccd238c22122c6593ec3aee9075e0be9773323d96accc157556e23951464a2f5d0bdb812afe8fa5788fa22a268dc3d9dbe3fa9e1a203ce84cc39b5d2ea2074326cf0b858a298b9b1086b578b43939e67cb61b13ae0aaf05309bc00e9014627f44cdbacbc66188f8ffa49d0883399a712db4c54c77d092d8f09b47b37079188562de8a0220ff57e72cc1551b1213487e2c7874f10aa526e3a20c6ce068a4eb21f6a0bd2049bc413183dd472d71d05c7fc6548a647c109a496bf253e9aec459466768e6a62c5dd969a7fd076831472eef09522026515a6c8a230c0a9da6f60dafdfb8b8d0bd2d6832daf8fcd1c0a83b7f0d55a8bfba17b87c3eec37d34ee1fa09c3e1a2bbb44178b7d53f80586a0499a04fa5bc1e6e39ee817d39e52d"}, 0x1015, 0x0) r1 = syz_open_dev$mouse(0x0, 0x0, 0x0) mount$9p_fd(0x8000a0, &(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}}) 22:33:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000500)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c7e5bc1bc098d250f65302c6c6f7700000000723d2e3a66696c65302c776f726b6469723d2e2f66696c6531"]) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$KVM_XEN_HVM_CONFIG(0xffffffffffffffff, 0x4038ae7a, 0x0) recvmmsg(r0, &(0x7f0000001e80)=[{{&(0x7f0000000540)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/212, 0xd4}], 0x1, &(0x7f0000000700)=""/117, 0x75}, 0x1ff}, {{&(0x7f0000000800)=@rc, 0x80, &(0x7f0000000980)=[{&(0x7f0000000880)=""/69, 0x45}, {0x0}, {&(0x7f0000000780)=""/17, 0x11}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4}, 0x7ff}, {{&(0x7f0000000a00)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, 0x0}, 0x6}], 0x3, 0x121, &(0x7f0000001f40)) fstat(r2, &(0x7f0000001f80)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002000)={{{@in=@rand_addr=0x5, @in=@remote, 0x4e21, 0x7ff, 0x4e23, 0x4, 0xa, 0x80, 0x80, 0x5e, r3, r4}, {0x8, 0xf58, 0x5, 0x9, 0x101, 0x1, 0xccf3, 0x4}, {0x11ac0c7a, 0x1f, 0x1, 0x200}, 0x8, 0x6e6bbd, 0x2, 0x0, 0x1, 0x2}, {{@in=@remote, 0x4d2, 0xff}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x3, 0x2, 0x0, 0x6}}, 0xe8) getresgid(0x0, &(0x7f0000000bc0), &(0x7f0000000c00)) fsetxattr$system_posix_acl(r1, &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x1}, {}, {0x2, 0x4}], {}, [{0x8, 0x3}], {0x10, 0x4}}, 0x44, 0x2) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='./file0\x00') renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f0000000040)='./file0/f.le.\x00') tkill(0x0, 0x37) getpgrp(0xffffffffffffffff) 22:33:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x666, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000180)=0x580, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x400000, 0x0) setsockopt$inet_int(r2, 0x0, 0x6, &(0x7f00000001c0)=0x9, 0x4) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@nl=@proc, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000080)=""/36, 0x16}, 0x2000) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) [ 284.778995] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 22:33:32 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000040)=0x40000000, &(0x7f0000000080)=0x1) getsockopt$inet6_opts(r0, 0x29, 0x33, 0x0, &(0x7f0000000180)) [ 284.879352] overlayfs: unrecognized mount option "low" or missing value 22:33:32 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x4013, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40002, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000080)={0x7, 0x33, 0x1}, 0x7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x3) r1 = pkey_alloc(0x0, 0x2) pkey_alloc(0x0, 0x1) pkey_alloc(0x0, 0x0) pkey_alloc(0x0, 0x1) pkey_free(r1) 22:33:32 executing program 2: r0 = accept(0xffffffffffffff9c, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=@security={'security\x00', 0xe, 0x4, 0x3d0, 0x218, 0x0, 0x0, 0xf8, 0xf8, 0x338, 0x338, 0x338, 0x338, 0x338, 0x4, &(0x7f0000000100), {[{{@ip={@loopback, @multicast2, 0xffffff00, 0xff, 'lo\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x7c, 0x2, 0x4}, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x6, 0xa, [0x2e, 0x12, 0x1, 0x39, 0x7, 0x3d, 0x1e, 0x1e, 0x37, 0x3b, 0x13, 0x11, 0x2f, 0xf, 0x4, 0x34], 0x0, 0x3}}}, {{@ip={@multicast1, @local, 0xff000000, 0xffffff00, 'syzkaller1\x00', 'bond_slave_1\x00', {}, {0xff}, 0x2b, 0x2, 0x44}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x1, 0x7f}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x10001, [0x1, 0x4, 0x3, 0x295d, 0xd3e, 0xbea], 0xfffffffffffffffd, 0x3}, {0x8, [0xff, 0x0, 0x8, 0x6, 0xafe, 0x44], 0x1, 0xffff}}}}, {{@uncond, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0x4, 0x80000001}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x800, [0x5, 0x7fff, 0x3, 0x7, 0x1000, 0x5ea9], 0x4, 0xff}, {0x3, [0x8000, 0x9, 0x5, 0x100000000, 0x7ff], 0xf543, 0x7fffffff}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x430) r1 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x3ff, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000000)={0xfdfdffff, 0xfffffffffffffffd, 0x1}) readv(r1, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/76, 0x4c}], 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000640)) [ 284.927098] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 284.927098] 22:33:32 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000003c0), 0x4) prctl$PR_SET_UNALIGN(0x6, 0x3) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) r5 = geteuid() getgroups(0x2, &(0x7f0000000940)=[0xee00, 0xffffffffffffffff]) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010004000000000002000500", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r2, @ANYBLOB="027dc334", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="00243c00be15edcad9c21a6d76ccd043c028ed9dca2ceefaa4bdd25737e2e1b44d65e46b1d898b04b6d51c70ea860eb359c5236c4d44fc389aaeaa6323a1693a15df2b497d9696c820ff2c6bcab7f999a369223370d1e77095ef959af265903d9aa40229fbeab0145302c2ffe9136c6921ed5157b2fd6bc6b29b3386d5e47215154c0d539a3a775d496367bc9d3f1d6a4164db99fe93effc2491d2f1976e4576697424a4c881598393847cc232a463676ab4cba6cb9a0c7399134759d73e939b3d37241a856bd94a364ffb4eb1b98223dd8f0892c409a565f638f5f722738326cb804efe14804486c301ddebc33417853d9194cdbad0c7374f72210c24df4db04dd36b30db92b7d3ef1b78a2bcbc", @ANYRES32=0x0, @ANYBLOB="040000000000000008000300", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000700000000002000040000000000"], 0x7c, 0x3) mq_getsetattr(r4, &(0x7f00000000c0)={0xbab, 0x4, 0x1, 0x100, 0x4, 0x3, 0x1ff, 0x3f}, &(0x7f0000000540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="74fc000000ff7f0000000000000000ee3f772b090000"], &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='squashfs\x00', 0x0, &(0x7f0000000380)='#\x1a*(\x00') ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000180)={0x1, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e21}, 0x308, 0x4, 0x3ff, 0x10000, 0xa988, &(0x7f0000000140)='gretap0\x00', 0x1, 0xfffffffffffffff7, 0xa536}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x400000000000c) sendmsg$nl_xfrm(r6, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r7 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)='ppp0vmnet1\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, r5, r7) 22:33:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) [ 285.048664] overlayfs: unrecognized mount option "low" or missing value [ 285.087367] gfs2: not a GFS2 filesystem 22:33:32 executing program 1: socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000000200)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x400800) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xfffffefffffffff8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000004c0)='notify_on_release\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x7ffff000) 22:33:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_triestat\x00') ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000100)) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x50000000, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000040)={0x0, 0x0, 0x81}) [ 285.222066] gfs2: not a GFS2 filesystem [ 285.245249] EXT4-fs (loop3): mounting ext2 file system using the ext4 subsystem 22:33:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000040)) r0 = memfd_create(&(0x7f0000000540), 0x2000000000100000) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000740)={0x1, 0x480000}, 0x2) syz_mount_image$gfs2(&(0x7f0000000780)='gfs2\x00', &(0x7f0000000800)='./file0\x00', 0x101, 0x1, &(0x7f0000000e40)=[{&(0x7f0000000d40)}], 0x0, &(0x7f0000000ec0)={[{@meta='meta'}, {@nobarrier='nobarrier'}, {@nosuiddir='nosuiddir'}, {@discard='discard'}, {@nosuiddir='nosuiddir'}]}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000400)=r0, 0x4) r1 = socket$netlink(0x10, 0x3, 0xd) signalfd(r1, &(0x7f0000000680)={0x80000001}, 0x8) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000300), 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000880)={0x0, 0x0, 0x5, 0x0, [], [{0x9, 0x9218, 0x0, 0x81}, {0x3ff, 0x100, 0x0, 0x0, 0x2, 0x6}], [[], [], [], [], []]}) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f00000006c0)=[&(0x7f0000000540)='\x00#\xe8\xe36\xbd\x11\xd9\x00\xbc%W9\x11\xb5\xe6\xd1\\\x12\xa86\xfb5\xac\xf1\x16\x87\xf4\xaek\xf1\xffi\xdf\xa5\x0e\x8e\xbf\xc5\xff\xb1\x1a#', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='\x00', &(0x7f0000000840)=']\x00', &(0x7f0000000580)='/dev/snd/pcmC#D#p\x00', &(0x7f00000007c0)='}md5sum\x00', &(0x7f0000000440)='[md5sumcgroup\x00'], &(0x7f0000000780), 0x1000) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/22, &(0x7f0000000380)=0x16) execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000640)='-trusted\x00'], &(0x7f00000002c0)=[&(0x7f0000000140)='%posix_acl_access\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='GPL\x00', &(0x7f0000000240)='\x00'], 0x800) write$P9_RLINK(r0, &(0x7f0000000340)={0x7, 0x47, 0x1}, 0x7) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x2, &(0x7f00000000c0), 0x0) 22:33:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103f, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2200302, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) process_vm_readv(r1, &(0x7f0000000640)=[{&(0x7f0000000580)=""/143, 0x8f}], 0x354, &(0x7f0000001540)=[{&(0x7f0000001400)=""/90, 0x5a}], 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='\x00', 0x0, 0x0) tkill(r1, 0x1000000000014) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x2, @empty, 0x1f}, 0x1c) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000200)=0x3) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x440, 0x0) ioctl$PIO_UNIMAPCLR(r4, 0x4b68, &(0x7f0000000040)={0x2, 0xfffffffffffffffa, 0x1}) write$cgroup_int(r3, &(0x7f0000000080), 0x297ef) [ 285.324983] EXT4-fs (loop3): invalid inodes per group: 3221241856 [ 285.324983] 22:33:32 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) tgkill(r0, r1, 0x15) r2 = socket(0x40000000015, 0x805, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xffffffff80000000, 0x801) ioctl$VT_ACTIVATE(r3, 0x5606, 0x6) accept4$inet(r2, 0x0, &(0x7f0000000040), 0x800) getsockopt(r2, 0x114, 0x271c, &(0x7f0000000000)=""/13, &(0x7f000033bffc)=0xd) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) semget(0x0, 0x2, 0x100) socket$inet6(0xa, 0x807, 0x80000000) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x9, 0x400000) sched_setaffinity(0x0, 0xfffffe75, &(0x7f00000000c0)=0x9) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setflags(r5, 0x2, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r4, 0x10, &(0x7f00000003c0)={0x2}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) r7 = socket$inet6(0xa, 0x400000000001, 0x0) clock_settime(0x8, &(0x7f0000000240)={0x0, 0x1c9c380}) r8 = dup(r7) setsockopt$inet6_tcp_int(r8, 0x6, 0x12, &(0x7f0000000000)=0x7f, 0x4) bind$inet6(r7, &(0x7f0000000300)={0xa, 0x800004e20, 0x1, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000004c0), 0x0, 0x20000008, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) r9 = dup2(r8, r6) write$binfmt_misc(r9, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a305e3761f3bae3a97934f16d7a33434bb891b9b12d976a0244080fc0fb3381d7416d0f8ad856868149c86e941e9ed6b0811e115544d2636be5b9f480f4bf26b33cea7e9ed07977047b6bac5568d60b4c597c7764339fae37075bca73983fd7482b9134aa77d477a9242f58195b20c952151be0f2526d6d4e47f6dae46d17017e4b0b12de2d9fe8697bc4fe4c4ab0e58d11029ce16b7eb6000000000000000000000000000000"], 0xa9) r10 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r10, 0x2007fff) sendfile(r8, r10, &(0x7f0000d83ff8), 0x8000fffffffe) getpriority(0x1, r4) 22:33:32 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mountinfo\x00C\x88\xf7P\xc8=\x14\xc4\xa3\xa9\xac\x14\x88\xa4wf\n\xe7c\x89\x178\xacek\xb3\xe8\x91\x94\x1f\x02\xf1&PGP/l-\xd9\xf6U\xefq1\xea\xbf1\x10\xd68\xf0\xd2\xe6\xa4\x9a+\xc4\xa0\x8dc\xe2\xdaz\xf4~l7\x97#R\x87_\x12[\xcf>\xa7\xf0K{P[j\x06\xbe\xed\xb2\xa8n0\xa8k\xc0\xd3zd8\xb9\x9aE\xea\"\xb1\xf4\xfb\x05') readv(r3, &(0x7f0000000080)=[{&(0x7f0000d1d000)=""/203, 0x979}], 0x1) mount(0x0, &(0x7f0000852000)='.', &(0x7f0000000000)='debugfs\x00', 0x0, &(0x7f0000d1cfff)='\xd6') 22:33:32 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) [ 285.673157] gfs2: not a GFS2 filesystem 22:33:33 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x9, 0xff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000140)={r1, 0x2}, 0x8) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000005fd4), 0x1a1, 0x0, 0x0}) 22:33:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:33 executing program 1: socket(0xa, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r2 = pkey_alloc(0x0, 0xf7ffffdffffffffc) pkey_free(r2) r3 = dup3(r1, 0xffffffffffffffff, 0x80000) futimesat(r3, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={{0x0, 0x7530}}) flock(0xffffffffffffffff, 0x2) flock(0xffffffffffffffff, 0x100000000000001) gettid() gettid() syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xc0, 0x80) dup2(0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)=0x0) timer_settime(r4, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, &(0x7f0000040000)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xfffffe2d) setsockopt$packet_int(r5, 0x107, 0x9, &(0x7f0000000000), 0x4) pipe(&(0x7f0000000300)={0xffffffffffffffff}) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000040)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) bind$inet(r7, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) ioctl$KDMKTONE(r6, 0x4b30, 0x40) 22:33:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000003c0), 0x4) prctl$PR_SET_UNALIGN(0x6, 0x3) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) r5 = geteuid() getgroups(0x2, &(0x7f0000000940)=[0xee00, 0xffffffffffffffff]) lsetxattr$system_posix_acl(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000010004000000000002000500", @ANYRES32=r1, @ANYBLOB="02000100", @ANYRES32=r2, @ANYBLOB="027dc334", @ANYRES32=0x0, @ANYBLOB="02000600", @ANYRES32=0x0, @ANYBLOB="02000300", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=r3, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="040000000000000008000300", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="10000700000000002000040000000000"], 0x7c, 0x3) mq_getsetattr(r4, &(0x7f00000000c0)={0xbab, 0x4, 0x1, 0x100, 0x4, 0x3, 0x1ff, 0x3f}, &(0x7f0000000540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="74fc000000ff7f0000000000000000ee3f772b090000"], &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='squashfs\x00', 0x0, &(0x7f0000000380)='#\x1a*(\x00') ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000180)={0x1, {0x2, 0x4e21, @local}, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e21}, 0x308, 0x4, 0x3ff, 0x10000, 0xa988, &(0x7f0000000140)='gretap0\x00', 0x1, 0xfffffffffffffff7, 0xa536}) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x400000000000c) sendmsg$nl_xfrm(r6, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000540)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r7 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)='ppp0vmnet1\x00', 0xfffffffffffffff9) keyctl$get_persistent(0x16, r5, r7) 22:33:33 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r1, r2) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x80000000, 0x20000) getsockopt$inet6_buf(r3, 0x29, 0x1c, &(0x7f0000000040)=""/68, &(0x7f0000000100)=0x44) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000280)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000002c0)={r4, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x0, 0x5}, 0x90) 22:33:33 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x88) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x37a}}, 0x8, 0x8, 0xd02, 0x3ff, 0xe0}, &(0x7f0000000200)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r1, 0x40}, 0x8) r2 = gettid() mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='\xb6\x15\xa3\x13\xd1\n\xfdm\xe9lB\x1dc\xfb\xff\xff\x00\x00\x00\x00\x87\xae\xcfMNr\xe1\x1a\xfa\x93\x91uC=\xc6\x18\x19\x8f\x18\xc0\xd6@\xe1\xfa\x85\xffW\x8a+\xf9\xd3\xa8om\xfe\xd1\xe2\xe1\xea\xba\x00\x0e\xa2\xcb)u\x12\xad', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x8832, 0x4) init_module(&(0x7f0000000000)='\x00', 0x1, &(0x7f0000000100)='em0/\x00') ptrace$setopts(0x4206, r2, 0x4, 0x0) tkill(r2, 0x3a) wait4(0x0, 0x0, 0x0, 0x0) 22:33:33 executing program 0: r0 = socket(0x20010, 0x803, 0x212) sendto(r0, &(0x7f0000000180)="1a0000001800e7ef007b0000000000001da108913916b585c668", 0x1a, 0x0, 0x0, 0x0) 22:33:33 executing program 3: syz_mount_image$ext4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:33 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x204000) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000140)={{0x7ce, 0x8}, 'port0\x00', 0x2, 0x2, 0x3, 0x0, 0x2, 0x3, 0x8, 0x0, 0x6, 0x3b01}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0x7, &(0x7f00000000c0)=ANY=[@ANYBLOB="00e078f60574a16cbfc8618b2a064d5f55d3a8521001ef99454124f2c1ac70bf9fd2fee6125fcb7a7759efccef0fc1c7466660b6fb816d93dbd2e9dc6e3f50dea0359f66c5c81f9e30994bd684b8"], 0x1) 22:33:33 executing program 0: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r0) r1 = socket(0x19, 0x0, 0x200003fc) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000000)={'veth0_to_team\x00', 0x3}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x178, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200008c0], 0x0, &(0x7f0000000200), &(0x7f00000008c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x0, 0x0, 'veth0_to_bond\x00', 'veth0_to_team\x00', 'team0\x00', 'ip6tnl0\x00', @random="332ba8a637a5", [], @broadcast, [], 0x70, 0x70, 0xe8}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x3000, 0x0, "a635501f760dbbcc40ed47ab1f7cfc92126f3aea60227ac7e55b962553c6c6cac2328d67f4c4fea332686396eac43e47551c45ddc3b37c7958d3ef9a0af53ea3"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc}]}, 0x1f0) 22:33:33 executing program 1: r0 = socket$inet6(0xa, 0x40000000000002, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000140)={0x0, 0x4ef5, 0x9ac, [], &(0x7f0000000100)=0x81}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x2}, 0x5) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000002c0)={@pppoe={0x18, 0x0, {0x2, @local, 'teql0\x00'}}, {&(0x7f00000001c0)=""/169, 0xa9}, &(0x7f0000000280), 0x69c0f7aec0db3d50}, 0xa0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x80100, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f00000004c0)=""/179, &(0x7f0000000040)=0xfffffea8) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f0000000380)={0x0, 0x1, [0x365, 0x0, 0x200, 0x2, 0x3, 0x8, 0x0, 0xfff]}) 22:33:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x25fc, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8010aebc, &(0x7f0000000380)) 22:33:33 executing program 5: socketpair$unix(0x1, 0x100000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x21, 0x7) r1 = open(&(0x7f0000000000)='./file0\x00', 0x210000, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r1, 0x7, 0x1}, 0x14) remap_file_pages(&(0x7f00000e9000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000040), 0x2, 0x4) 22:33:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000240)=@assoc_value, &(0x7f0000000280)=0x8) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='*\'\xc2\x81\x10route\x00\xa6\x9eH)\xee\xcc\xc6X\xa3\xd6\xba\xaahL\x11X\x1a\xe2\xd4-\x92\xe2\xfb\x11U\xed\xc8\x1e\xce:g\xe0\x9b\xb7\xf7\x1f9\xc1\xf6\xdbca@B\xff\xff\xc6\x98\xd2{\xfa\xb0\xfc\xda\xf0\xf9]\x00\x96C\xdf\x1a\x90<\xeaqgA\xcaN\xc3\xfe\xbf\x86\xdc\xed1\xbe\x19)\xd3\x10ux\x9c\xbe\x13\x9du\"\x8e\xe3\xde\xcc\x85G\x94\x91W\xb3\xa7Fop\xed)6oIE\xef\x94b\xab\xc9@\xeeo:e\xf7\xb3\x11\x7fA>/y!A\x10\xec\xe0\x8b\x04;a\x10E\x17h0b\xb6\xbdO\x8e7:\x9c[WP,\x89D\xd2\x1e\x1aCcC\xc9\x93\xb5\xfe\xeb\xafS\xbc))\x06\xb2F\xe4-erZ\xee0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={r5, 0x100000001}, &(0x7f0000000100)=0x8) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000180)={0x7b, 0x0, [0x40000020]}) 22:33:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)) userfaultfd(0x80000) r0 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x9, 0x101000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/protocols\x00') r2 = creat(&(0x7f0000000900)='./bus\x00', 0x0) sendfile(r2, r1, &(0x7f0000000180), 0x10013c93a) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r4 = accept$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) sendmmsg(r4, &(0x7f00000011c0)=[{{&(0x7f0000000600)=@sco={0x1f, {0x8, 0x400, 0x81, 0x9, 0x6a8, 0x5}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="e9713c959eb1c2ce28fbe186726074ac631647c8cba831f8570bc985773c7bdf6546bfeeeb6668a12f05d8233ff6461ae473b88741d0358a283ead50", 0x3c}], 0x1}, 0xdc5}], 0x1, 0x800) accept4$packet(r0, 0x0, &(0x7f00000002c0), 0x80800) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x408000}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)={0x98, r3, 0x200, 0x70bd28, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x7c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) close(r1) connect$pptp(r1, &(0x7f00000006c0)={0x18, 0x2, {0x0, @remote}}, 0x1e) 22:33:33 executing program 2: socket$inet_tcp(0x2, 0x3, 0x6) getpgid(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300), 0x4) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'team0\x00', 0x2}, 0x18) ioctl(r1, 0x800000000008982, &(0x7f0000000080)) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="290100000600000000000000000000000400000000000000030000000000000000000000000000000069127fbcdab56d0f1f4cb25800000000000021bff4c99eef500ade32c424020f322903f5bad93a000000000000000000000000"], 0x5c) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r2, 0x540d) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x82) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000005c0)=ANY=[], &(0x7f0000000100)) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f00000003c0)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000002c0)={0x0, 0x6}, 0x8) ioctl$PERF_EVENT_IOC_RESET(r3, 0x2403, 0x2) r5 = memfd_create(&(0x7f00000005c0)='veth1_to_bond\x00', 0x0) syz_open_dev$usbmon(&(0x7f0000000840)='/dev/usbmon#\x00', 0x0, 0x400880) r6 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7, &(0x7f0000000480)=0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0xbd, &(0x7f00000014c0)}, &(0x7f0000000100)=0x10) io_submit(r7, 0x2000000000000281, &(0x7f00000000c0)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x80000000000, r6, &(0x7f0000001000), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0)={0xffff, 0x5, 0xc65b, 0x9, 0x80, 0x5, 0x1ff, 0x4, 0x20, 0x5, 0x7}, 0xb) pwritev(r5, &(0x7f0000000340)=[{&(0x7f0000000140)="27518757f0c7cd660eeb5e594affe19adb208f751d9076b43db9d625", 0x1c}], 0x1, 0x81806) sendmsg(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f00000004c0)=@pppoe={0x18, 0x0, {0x0, @local, 'yam0\x00'}}, 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000e00)=ANY=[], 0x0, 0x840}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) memfd_create(&(0x7f00000009c0)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bR,\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xe4\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00Gw\x80C\xb0\xbd\x18\xbc\x7f\xe1\x80Zx\\Z\x1e\x11GrX\xe4Ho \x85\xa9!b\xba~\xf9Y4\x8a\xcaF\x8f\xa4*o\xfa\x15!\xe0wJ\xa6\x929B\xbc\xe9\xff\x1b\xebC\xe5\xed\x06\x7fJ-/)\xb5s\x8f\x1c$7W\x06\xdck%\xc2\x83-\x90\xc5v\xeb\x8b\xfcxi\xea|et@[0+Z\xd5\x13\xed\xc9i\xc8N\xa1\xbb(\x02\xd1M\xdd\x9a\x17#\xba\x06;3sq\xbf\'\x9f;\xc9\xc1\xc59\xba^t\xe2\x0f\xb0.X$]3\xc0\xe9\x84[k\xac\x8f<+\xdf4^\xadc\xab\xa1\xfa\xc2\x80\xb7\xe6\xf7\x7fx\x04\xaf\x16\xdfw\xe2\x05\xe3fm\xc4bMy\xf8\x1e', 0xffffff7fffffd) openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) 22:33:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{}, {r1, r2/1000+30000}}) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0x46) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000240)=""/33, 0x21}], 0x1) write$binfmt_elf64(r0, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 22:33:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c600000000000000ec6d5ebe5a0000ffff53ef3f7403", 0x3d, 0x400}], 0x0, 0x0) 22:33:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x1f) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0xc739acf) r2 = semget(0x0, 0x0, 0xc0) semctl$SETVAL(r2, 0x4, 0x10, &(0x7f0000000140)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000100)={0x56, 0x10, 0x20, {0x8, 0xcbed}, {0x4, 0x3}, @ramp={0x4, 0x0, {0x2, 0x4, 0x81, 0x8}}}) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e20, @loopback}, {0x1, @random="a9b134ac1b22"}, 0x38, {0x2, 0x4e20, @empty}, 'yam0\x00'}) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) getsockopt$inet6_int(r3, 0x29, 0x10000000000011, &(0x7f0000534000), &(0x7f0000000000)=0x3d9) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000240)=0x5, 0x4) 22:33:34 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2e, 0x100) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f0000000400)='devtmpfs\x00', 0x0, 0x0) r1 = inotify_init() getpeername$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000200)=0x6e) inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x1000000) 22:33:34 executing program 2: syz_mount_image$reiserfs(&(0x7f0000001280)='reiserfs\x00', &(0x7f00000012c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7a64000000000000a2805304000000000000004e9b477d3fdfa9"]) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0x2, &(0x7f0000000000)) finit_module(r0, &(0x7f0000000040)='/dev/ashmem\x00', 0x3) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000000880)=""/4096) [ 286.836776] QAT: Invalid ioctl [ 286.847336] QAT: Invalid ioctl [ 286.867550] QAT: Invalid ioctl [ 286.871075] QAT: Invalid ioctl 22:33:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 286.904146] QAT: Invalid ioctl 22:33:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) getitimer(0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000200)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}, 0xfffffffffffffff1) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000040)=0x3, 0x4) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) request_key(0x0, 0x0, 0x0, r2) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = dup(0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ptrace$peek(0x1, r5, &(0x7f0000000140)) setsockopt$inet6_tcp_int(r3, 0x6, 0x37, &(0x7f0000000240)=0xfff, 0x4) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000000c0)={0x1f}, 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000280)) sendfile(r1, r6, &(0x7f0000000080), 0x80000003) [ 286.960127] QAT: Invalid ioctl [ 286.963731] QAT: Invalid ioctl [ 286.979113] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "zd" [ 287.049248] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 287.113928] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "zd" 22:33:34 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003180)=[{{0x0, 0x0, &(0x7f0000002880)=[{&(0x7f00000016c0)=""/53, 0x35}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() tkill(r2, 0xb) wait4(r2, 0x0, 0x2, 0x0) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={[], 0x0, 0x0, 0x4b2, 0x3, 0x67, r2}) ptrace$setopts(0x4206, r2, 0x6, 0x12) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) r4 = getegid() fchownat(r1, &(0x7f0000000100)='./file0\x00', r3, r4, 0x400) ptrace$cont(0x1f, r2, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) r5 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0], 0xa, 0xa, 0x1, 0x3}) 22:33:34 executing program 1: r0 = socket$inet6(0xa, 0x805, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") syz_read_part_table(0x8cffffff, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="52444b64a7011cf659000000bd2600000000efffffff0f00af56fa5e39081a839a3c", 0xffdd, 0xfffffffffffffffd}]) 22:33:34 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x0, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x301100, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000280)={0x5, &(0x7f00000006c0)=[{}, {}, {}, {}, {}]}) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000180)={0x5, 0x40, 0x122, 0x100}) write(r0, &(0x7f0000000080)="b4d7e5b6605e9c72aaefdf7a398957", 0xf) r5 = gettid() getgid() writev(r0, &(0x7f0000000500)=[{&(0x7f0000000480)="2b1cbccc40004dd548226dbf7865af0dc9725484e5699dfe9f02d29fd620910b60499e1aaf7d636cf32399ed1ff8ec7e26c97b9f42be07a0eb907d11cdb44393ae5f3fa533acef1f26301abd3d0fdf80fe8018bbf20ac026656b471e3e887124d3b9c9", 0x63}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) ioprio_get$pid(0x1, r5) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x4000c0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000000)) tkill(r5, 0x1004000000016) close(r3) r7 = dup2(r0, r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000600)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000100)={[{0x7, 0x2, 0x3, 0xe2fe, 0xffffffffffffff81, 0x4, 0x4, 0xffffffffffffb1b0, 0x10000, 0x1, 0x3, 0x2}, {0x716, 0x7, 0x8, 0x8, 0x0, 0x800, 0x2, 0x4, 0x1, 0x0, 0x2, 0x6b74, 0x8000}, {0x1, 0x0, 0x1406, 0xea7, 0x5, 0x20, 0x4, 0x1, 0x80000001, 0x81, 0x8245, 0x2, 0x2}]}) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) timer_delete(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xfed1) r8 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r8, &(0x7f0000000680)={&(0x7f0000000200)=@in={0x2, 0x0, @rand_addr=0x1000c0586300}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="ec", 0x1}], 0x1}, 0x0) 22:33:34 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_buf(r0, 0x107, 0xf, 0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)={0x7, 0xffffffffffffffff, 0x400, 0x800000003, 0x6, 0x5, 0x8, 0x3f, 0x20, 0x7}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendto$llc(r1, &(0x7f00000001c0)="ed57fa49d78f802c812d61da89b7f23ad1683f7c81a539422f47d8de5591443f8c044a60407272244f41e93e2ad491a3bb3f709593445d1f173bfdd4bb4a813a25e7c40c1ad29ac56c057c36827a809734f6ecd86208975a81c4e9671e692837d4c8da199ea1e8df29bd59e2911d74d0d83e0dde0f50b51d0cc2dec2896978077c", 0x81, 0x24000000, &(0x7f0000000280)={0x1a, 0x335, 0x3, 0x1, 0x7, 0xffffffff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x0, 0x70bd29, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 22:33:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:33:34 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x84000, 0x0) mkdirat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x1ff) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x4001c0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000180)={{0xa, 0x7, 0x800, 0x3, 'syz1\x00', 0xffff}, 0x3, 0x1, 0xff, r2, 0x1, 0x9, 'syz0\x00', &(0x7f00000000c0)=['\x00'], 0x1, [], [0x1, 0x3ff, 0x5, 0x1]}) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r4 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r4, &(0x7f0000000040)={0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @dev}, 0x10) close(r4) [ 287.319070] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:33:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000280), 0x13f, 0x5}}, 0x20) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) r4 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x4, 0x28000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000180)=""/244) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000000)={0x7, 0x8, 0xfa00, {r3}}, 0x10) 22:33:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:33:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xed460, @remote}, 0x1c) listen(r0, 0x7) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000080)="10a070a463e9695036a0ae4f67e90dfd9181d72cfcc743a3ddc1e73942f5dfab594f4241197dfea761d7b5513edf7dd3af91165bf17f3d301c6f328edd3064d0e431c21ef93884392fa9b57891f24c10c7d92d28dda467", 0x57) r2 = accept(r0, 0x0, 0x0) recvfrom$unix(r2, 0x0, 0x785f000000000000, 0x0, 0x0, 0x0) 22:33:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0xfffffffffffffffd, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3f, 0x88041) getsockopt$inet6_dccp_int(r2, 0x21, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = eventfd2(0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0x4, 0x0, 0x10000, 0xffffffff}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f00000001c0)={r4, 0x1}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000300)={0x0, 0x0, 0x0, r3}) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000200)={0x1}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000180)={0x0, &(0x7f0000000100), 0x0, r3}) 22:33:35 executing program 1: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0x100000001, 0x4, {0x1, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0x96000]}}}) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x1) close(r0) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x4, 0x400000) 22:33:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='net/ip_tables_targets\x00') sendfile(r1, r2, 0x0, 0x10000000000443) r3 = getpid() ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000040)=r3) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x5, 0x800) 22:33:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x100, 0x0) lseek(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) ppoll(&(0x7f0000000640)=[{r0, 0x100}], 0x1, &(0x7f0000000800)={r2, r3+10000000}, &(0x7f0000000880)={0x10000}, 0x8) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r4, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x60, &(0x7f0000000780)=ANY=[@ANYBLOB="480000000000000014010000010000000000000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0203080000000000", @ANYPTR=&(0x7f00000008c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000c60d5957c44a75001a0000e2", @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="c600000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0f00000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="ffff070000000000", @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='*\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='M\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f400000000000000", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="db00000000000000"], @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}, 0x0) [ 287.689116] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:33:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1b2) r1 = socket$tipc(0x1e, 0x0, 0x0) listen(r1, 0x1) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x1, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000200)=@req={0xff00000000, 0x690d, 0x80000000, 0x7}, 0x10) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000240)={{0x8, 0x8}, 0x3}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x200}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6621a1921d28a1c410537bafbe294721d1a0b9913a598b92f4dde43b3bbfa91b8de0dfbc713b30457bd02c78d91dca950a32c5f2a5894c182d1c477afd0309261147323baba78316a6ce738a4c10d5f3552fbdb8a141672ed9e89fe1f62052d4fa304f1e6f27ecef28467f157a8247c3db47c13a7aca0db8a617b2338660a51fc02ee49c56a6b803e02c61465200b75182471665f5688ed5561b550f4912b9e09a20bdea6618c53b624a9b451ecfd30be146e25403033f3ddb43e9645e4df350aa101e7313e2bb367f7c14b08e565a21d55750f21c470d9d"], &(0x7f00000001c0)=0xa) 22:33:37 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={&(0x7f0000000000), 0xc, &(0x7f00000daff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="c40000001900050b0000000000000000ffffffff0000000000000000000000007f00000100000000000000000000000000000000000000da06000000000000007fb376465e105e9b5bb71e65470b31bec4a2a147e1dc8a776d1c73b72b7a69c5cad45a510c0fe7c9f88570b8fe168cad", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0010000200000000000000"], 0xc4}}, 0x0) 22:33:37 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000001c0)={'team_slave_0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="17"]}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@gettclass={0x24, 0x2a, 0x200, 0x70bd25, 0x25dfdbfc, {0x0, r2, {0xffe0, 0xffee}, {0x1, 0x8}, {0xffff, 0xffff}}, ["", "", "", "", ""]}, 0x24}}, 0x1) 22:33:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1b2) r1 = socket$tipc(0x1e, 0x0, 0x0) listen(r1, 0x1) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x1, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000200)=@req={0xff00000000, 0x690d, 0x80000000, 0x7}, 0x10) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000240)={{0x8, 0x8}, 0x3}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x200}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6621a1921d28a1c410537bafbe294721d1a0b9913a598b92f4dde43b3bbfa91b8de0dfbc713b30457bd02c78d91dca950a32c5f2a5894c182d1c477afd0309261147323baba78316a6ce738a4c10d5f3552fbdb8a141672ed9e89fe1f62052d4fa304f1e6f27ecef28467f157a8247c3db47c13a7aca0db8a617b2338660a51fc02ee49c56a6b803e02c61465200b75182471665f5688ed5561b550f4912b9e09a20bdea6618c53b624a9b451ecfd30be146e25403033f3ddb43e9645e4df350aa101e7313e2bb367f7c14b08e565a21d55750f21c470d9d"], &(0x7f00000001c0)=0xa) 22:33:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23}, 0x1b2) r1 = socket$tipc(0x1e, 0x0, 0x0) listen(r1, 0x1) r2 = socket$inet6(0xa, 0x5, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x1, 0x0) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f0000000200)=@req={0xff00000000, 0x690d, 0x80000000, 0x7}, 0x10) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000240)={{0x8, 0x8}, 0x3}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x200}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r4, @ANYBLOB="6621a1921d28a1c410537bafbe294721d1a0b9913a598b92f4dde43b3bbfa91b8de0dfbc713b30457bd02c78d91dca950a32c5f2a5894c182d1c477afd0309261147323baba78316a6ce738a4c10d5f3552fbdb8a141672ed9e89fe1f62052d4fa304f1e6f27ecef28467f157a8247c3db47c13a7aca0db8a617b2338660a51fc02ee49c56a6b803e02c61465200b75182471665f5688ed5561b550f4912b9e09a20bdea6618c53b624a9b451ecfd30be146e25403033f3ddb43e9645e4df350aa101e7313e2bb367f7c14b08e565a21d55750f21c470d9d"], &(0x7f00000001c0)=0xa) 22:33:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 22:33:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)=0x1000) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x8000000000) [ 290.393368] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 290.397367] sched: DL replenish lagged too much [ 290.439182] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. 22:33:37 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000001640)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 22:33:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 22:33:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8923, &(0x7f0000000380)={'bpq0\x00\v\x00\xfe\x00\x00\x00\x00\x00\xfa\xff\x00', r2}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x1212}) r3 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x8001, 0x80000) ioctl$EVIOCGABS3F(r3, 0x8018457f, &(0x7f00000001c0)=""/210) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) write$P9_RGETLOCK(r4, &(0x7f00000000c0)={0x26, 0x37, 0x1, {0x2, 0xede7, 0x4, r5, 0x8, 'vmnet0(}'}}, 0x26) 22:33:38 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x80000000002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x8000000000000053, 0xfffffffffffffffb, 0x6, 0xfffffffffffffffe, @buffer={0x0, 0x24, &(0x7f00000001c0)=""/36}, &(0x7f0000000140)="24f6170e9d92", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read(r0, &(0x7f0000000380)=""/42, 0xd2) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x100) ioctl$VIDIOC_SUBDEV_S_CROP(r2, 0xc038563c, &(0x7f00000000c0)={0xfffffffffffffffc, 0x0, {0x7, 0xfffffffffffffe01, 0x6, 0x7ff}}) 22:33:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000040)={0x2, 0x100, 0x2, {0x4, 0x6, 0x6, 0x7813}}) io_setup(0x8, &(0x7f0000000000)=0x0) close(r1) syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) io_submit(r3, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) [ 290.570542] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:33:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 22:33:38 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x400000) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040), &(0x7f0000000080)=0x14) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x26) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x6e}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 290.754749] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 290.755041] [ 290.762203] ====================================================== [ 290.768529] WARNING: possible circular locking dependency detected [ 290.772036] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 290.774842] 4.20.0-rc7+ #154 Not tainted [ 290.774847] ------------------------------------------------------ [ 290.774854] kworker/0:3/6258 is trying to acquire lock: [ 290.774858] 000000007123f6e5 (&mdev->req_queue_mutex){+.+.}, at: v4l2_release+0x1d7/0x3a0 [ 290.774963] [ 290.774963] but task is already holding lock: [ 290.789125] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 290.791708] 00000000c6f5e32a ((delayed_fput_work).work){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 290.791772] [ 290.791772] which lock already depends on the new lock. [ 290.791772] [ 290.838038] [ 290.838038] the existing dependency chain (in reverse order) is: [ 290.845653] [ 290.845653] -> #3 ((delayed_fput_work).work){+.+.}: [ 290.852178] process_one_work+0xc0a/0x1c40 [ 290.856939] worker_thread+0x17f/0x1390 [ 290.861434] kthread+0x35a/0x440 [ 290.865386] ret_from_fork+0x3a/0x50 [ 290.869632] [ 290.869632] -> #2 ((wq_completion)"events"){+.+.}: [ 290.876067] flush_workqueue+0x30a/0x1e10 [ 290.880807] vim2m_stop_streaming+0x7c/0x2c0 [ 290.885789] __vb2_queue_cancel+0x14f/0xd50 [ 290.890641] vb2_core_queue_release+0x26/0x80 [ 290.893796] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 290.895687] vb2_queue_release+0x15/0x20 [ 290.895748] v4l2_m2m_ctx_release+0x1e/0x35 [ 290.895766] vim2m_release+0xe6/0x150 [ 290.902290] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 290.906749] v4l2_release+0x224/0x3a0 [ 290.906815] __fput+0x385/0xa30 [ 290.906832] ____fput+0x15/0x20 [ 290.937371] task_work_run+0x1e8/0x2a0 [ 290.941800] exit_to_usermode_loop+0x318/0x380 [ 290.946906] do_syscall_64+0x6be/0x820 [ 290.951366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 290.957071] [ 290.957071] -> #1 (&dev->dev_mutex){+.+.}: [ 290.962814] __mutex_lock+0x166/0x16f0 [ 290.964068] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 290.967228] mutex_lock_nested+0x16/0x20 [ 290.967243] vim2m_release+0xbc/0x150 [ 290.967260] v4l2_release+0x224/0x3a0 [ 290.986415] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 290.986867] __fput+0x385/0xa30 [ 291.000103] ____fput+0x15/0x20 [ 291.004361] task_work_run+0x1e8/0x2a0 [ 291.008807] exit_to_usermode_loop+0x318/0x380 [ 291.013905] do_syscall_64+0x6be/0x820 [ 291.018306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.024013] [ 291.024013] -> #0 (&mdev->req_queue_mutex){+.+.}: [ 291.030407] lock_acquire+0x1ed/0x520 [ 291.034726] __mutex_lock+0x166/0x16f0 [ 291.039125] mutex_lock_nested+0x16/0x20 [ 291.043693] v4l2_release+0x1d7/0x3a0 [ 291.049515] __fput+0x385/0xa30 [ 291.053360] delayed_fput+0x55/0x80 [ 291.057525] process_one_work+0xc90/0x1c40 [ 291.062271] worker_thread+0x17f/0x1390 [ 291.066761] kthread+0x35a/0x440 [ 291.070666] ret_from_fork+0x3a/0x50 [ 291.074882] [ 291.074882] other info that might help us debug this: [ 291.074882] [ 291.083016] Chain exists of: [ 291.083016] &mdev->req_queue_mutex --> (wq_completion)"events" --> (delayed_fput_work).work [ 291.083016] [ 291.096055] Possible unsafe locking scenario: [ 291.096055] [ 291.102101] CPU0 CPU1 [ 291.106755] ---- ---- [ 291.111412] lock((delayed_fput_work).work); [ 291.115897] lock((wq_completion)"events"); [ 291.122828] lock((delayed_fput_work).work); [ 291.129843] lock(&mdev->req_queue_mutex); [ 291.134159] [ 291.134159] *** DEADLOCK *** [ 291.134159] [ 291.140391] 2 locks held by kworker/0:3/6258: [ 291.144891] #0: 000000006d9c712d ((wq_completion)"events"){+.+.}, at: process_one_work+0xb43/0x1c40 [ 291.154173] #1: 00000000c6f5e32a ((delayed_fput_work).work){+.+.}, at: process_one_work+0xb9a/0x1c40 [ 291.163538] [ 291.163538] stack backtrace: [ 291.168032] CPU: 0 PID: 6258 Comm: kworker/0:3 Not tainted 4.20.0-rc7+ #154 [ 291.175119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.184486] Workqueue: events delayed_fput [ 291.188706] Call Trace: [ 291.191340] dump_stack+0x244/0x39d [ 291.194993] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.200258] ? vprintk_func+0x85/0x181 [ 291.204162] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 291.209865] ? save_trace+0xe0/0x290 [ 291.213594] __lock_acquire+0x3399/0x4c20 [ 291.217749] ? mark_held_locks+0x130/0x130 [ 291.222037] ? update_load_avg+0x387/0x2470 [ 291.226374] ? lock_unpin_lock+0x4a0/0x4a0 [ 291.230622] ? update_load_avg+0x387/0x2470 [ 291.234987] ? unwind_next_frame.part.7+0x1ae/0x9e0 [ 291.240003] ? zap_class+0x640/0x640 [ 291.243714] ? zap_class+0x640/0x640 [ 291.247437] lock_acquire+0x1ed/0x520 [ 291.251246] ? v4l2_release+0x1d7/0x3a0 [ 291.255222] ? lock_release+0xa00/0xa00 [ 291.259226] ? perf_trace_sched_process_exec+0x860/0x860 [ 291.264674] ? print_usage_bug+0xc0/0xc0 [ 291.268749] ? v4l2_release+0x1d7/0x3a0 [ 291.272721] __mutex_lock+0x166/0x16f0 [ 291.276602] ? v4l2_release+0x1d7/0x3a0 [ 291.280598] ? v4l2_release+0x1d7/0x3a0 [ 291.284581] ? mutex_trylock+0x2b0/0x2b0 [ 291.288639] ? __lock_acquire+0x62f/0x4c20 [ 291.292884] ? mark_held_locks+0x130/0x130 [ 291.297113] ? mark_held_locks+0x130/0x130 [ 291.301354] ? set_next_entity+0x493/0xc70 [ 291.305628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.311180] ? update_load_avg+0x2470/0x2470 [ 291.315588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.321128] ? zap_class+0x640/0x640 [ 291.324835] ? zap_class+0x640/0x640 [ 291.328546] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.334126] ? __perf_event_task_sched_out+0x33a/0x1bf0 [ 291.339490] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 291.345070] ? fsnotify+0x50e/0xef0 [ 291.348691] ? __lock_is_held+0xb5/0x140 [ 291.352773] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.358335] ? locks_remove_file+0x3c6/0x5c0 [ 291.362752] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 291.368311] ? ima_file_free+0x132/0x650 [ 291.372383] ? fsnotify_first_mark+0x350/0x350 [ 291.376969] ? ima_file_check+0x130/0x130 [ 291.381135] ? vivid_remove+0x460/0x460 [ 291.385130] mutex_lock_nested+0x16/0x20 [ 291.389187] ? mutex_lock_nested+0x16/0x20 [ 291.393417] v4l2_release+0x1d7/0x3a0 [ 291.397215] ? dev_debug_store+0x140/0x140 [ 291.401459] __fput+0x385/0xa30 [ 291.404739] ? get_max_files+0x20/0x20 [ 291.408626] delayed_fput+0x55/0x80 [ 291.412250] process_one_work+0xc90/0x1c40 [ 291.416480] ? mark_held_locks+0x130/0x130 [ 291.420712] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 291.425378] ? __switch_to_asm+0x40/0x70 [ 291.429433] ? __switch_to_asm+0x34/0x70 [ 291.433486] ? __switch_to_asm+0x40/0x70 [ 291.437540] ? __switch_to_asm+0x34/0x70 [ 291.441609] ? __switch_to_asm+0x40/0x70 [ 291.445667] ? __switch_to_asm+0x34/0x70 [ 291.449733] ? __switch_to_asm+0x40/0x70 [ 291.453786] ? __switch_to_asm+0x34/0x70 [ 291.457855] ? __switch_to_asm+0x40/0x70 [ 291.461909] ? __schedule+0x8d7/0x21d0 [ 291.465798] ? lock_downgrade+0x900/0x900 [ 291.469944] ? zap_class+0x640/0x640 [ 291.473654] ? zap_class+0x640/0x640 [ 291.477396] ? find_held_lock+0x36/0x1c0 [ 291.481475] ? lock_acquire+0x1ed/0x520 [ 291.485446] ? worker_thread+0x3e0/0x1390 [ 291.489641] ? kasan_check_read+0x11/0x20 [ 291.493788] ? do_raw_spin_lock+0x14f/0x350 [ 291.498104] ? kasan_check_read+0x11/0x20 [ 291.502258] ? rwlock_bug.part.2+0x90/0x90 [ 291.506521] ? trace_hardirqs_on+0x310/0x310 [ 291.510934] worker_thread+0x17f/0x1390 [ 291.514931] ? __switch_to_asm+0x34/0x70 [ 291.519005] ? process_one_work+0x1c40/0x1c40 [ 291.523497] ? zap_class+0x640/0x640 [ 291.527207] ? find_held_lock+0x36/0x1c0 [ 291.531305] ? __kthread_parkme+0xce/0x1a0 [ 291.535572] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 291.540669] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 291.545797] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 291.550433] ? trace_hardirqs_on+0xbd/0x310 22:33:38 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000040)) 22:33:38 executing program 5: socket$inet6(0xa, 0x803, 0x3) r0 = memfd_create(&(0x7f0000000000)=']vmnet0,\x96securitywlan0trustedfvmnet1lomime_type\x00', 0x4) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000100)={0x0, "aba9bb4f562340e45c2ad0044edd1c93717a400ab022b9b7e36d4e7fa57da225", 0x2, 0x2, 0xff, 0x9, 0x7}) ioctl(r0, 0x100000890f, &(0x7f00000006c0)="0a5c2d023c126285718070") socket$inet6(0xa, 0x80003, 0x800000000000006) r1 = socket$netlink(0x10, 0x3, 0x4) poll(&(0x7f00000000c0)=[{r1, 0x2001}], 0x1, 0x80) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000007680)={0x0, 0x0, &(0x7f0000007640)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5"]}, 0x48}}, 0x0) 22:33:38 executing program 1: prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000ffe000/0x1000)=nil) r0 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000e00)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$packet_buf(r0, 0x107, 0x4000000000000017, &(0x7f0000651000)=""/240, &(0x7f0000000040)=0x4a9) 22:33:38 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102801fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() r2 = shmget(0x3, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) getresgid(&(0x7f0000000100), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r5 = syz_open_dev$vbi(&(0x7f0000000680)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000700)=0xe8) getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f00000004c0)={{0xe1, r3, r4, r6, r7, 0xb6}, 0xe2e, 0x0, 0x401, 0x3, r1, r1, 0x6}) setsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000180)="53083f3485065393614c0d93bcadc512b67c8395ee5c7d0c768ebe0378d4f4e9125b26f031c58616d3c3c78d18eb145e3013f7b2b076f3815cc9afd537a5f3ccd5c8ba14fe901d21e87f3cdba728784fafde5728361bf16f6e443fd4706b0797614fb545c594cd7205b44c737e594a4334e79453c69969e3af5d2a8a0d725fd169f768b7e2ce24f9c66bebd048e8df441a9deef965c17a3849d84cd2fe71abaa291b1ba1290e5e47032da6d347961ad45376df0c4bc41c9afea427", 0xbb) sched_setscheduler(r1, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(r0, 0x29, 0x80400000000048, &(0x7f0000000080)="04cfdf7e", 0x4) 22:33:38 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:38 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000002c0)=""/120) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x60}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x10000, 0x4) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000340)=ANY=[@ANYBLOB="b9643371085985f2c9da7613ef00e7072f681ce9e25317af5d6834a8974e687acaa01e726aad5e7d5ac79229086c46a880a37be824"]) [ 291.554764] ? kasan_check_read+0x11/0x20 [ 291.558935] ? __kthread_parkme+0xce/0x1a0 [ 291.563170] ? trace_hardirqs_off_caller+0x310/0x310 [ 291.568262] ? trace_hardirqs_off_caller+0x310/0x310 [ 291.573365] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 291.578464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.584000] ? __kthread_parkme+0xfb/0x1a0 [ 291.588230] ? process_one_work+0x1c40/0x1c40 [ 291.592729] kthread+0x35a/0x440 [ 291.596095] ? kthread_stop+0x900/0x900 [ 291.600063] ret_from_fork+0x3a/0x50 [ 291.605356] : renamed from bpq0 22:33:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffff9) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000000101002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040)={0x7, 0xee80, 0x1, 0x274f, 0x7}, 0x14) sendmsg$nl_xfrm(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f0000000980)=ANY=[@ANYBLOB="b800000019ff0f000000000000f30000ff0100000000000000000000000000010000000000f0ffffff000000000000010000000000009dbc36a171b836771c77", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}}, 0x0) [ 291.610709] kobject: 'bpq0' (00000000212cadef): fill_kobj_path: path = '/devices/virtual/net/bpq0' [ 291.644522] block nbd0: Receive control failed (result -22) [ 291.651001] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 291.659426] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 291.661296] kobject: '' (00000000212cadef): kobject_uevent_env [ 291.670676] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 291.688880] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 291.692582] kobject: '' (00000000212cadef): fill_kobj_path: path = '/devices/virtual/net/' [ 291.702761] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 291.713732] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 291.727080] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 291.728450] block nbd0: Device being setup by another task [ 291.733347] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 291.748810] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 291.759781] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 291.784155] block nbd0: shutting down sockets [ 291.798830] kobject: 'bpq0' (00000000539c887d): kobject_add_internal: parent: 'net', set: 'devices' [ 291.817087] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 291.823535] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 291.837687] kobject: 'bpq0' (00000000539c887d): kobject_uevent_env [ 291.844477] kobject: 'bpq0' (00000000539c887d): fill_kobj_path: path = '/devices/virtual/net/bpq0' [ 291.854702] kobject: 'queues' (00000000bb594e85): kobject_add_internal: parent: 'bpq0', set: '' [ 291.864488] kobject: 'queues' (00000000bb594e85): kobject_uevent_env [ 291.871259] kobject: 'queues' (00000000bb594e85): kobject_uevent_env: filter function caused the event to drop! [ 291.881810] kobject: 'rx-0' (00000000e9ae4007): kobject_add_internal: parent: 'queues', set: 'queues' [ 291.891738] kobject: 'rx-0' (00000000e9ae4007): kobject_uevent_env [ 291.898451] kobject: 'rx-0' (00000000e9ae4007): fill_kobj_path: path = '/devices/virtual/net/bpq0/queues/rx-0' [ 291.909049] kobject: 'tx-0' (00000000849483f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 291.919088] kobject: 'tx-0' (00000000849483f0): kobject_uevent_env [ 291.925651] kobject: 'tx-0' (00000000849483f0): fill_kobj_path: path = '/devices/virtual/net/bpq0/queues/tx-0' [ 291.940268] kobject: 'rx-0' (000000005b22bf3a): kobject_cleanup, parent 000000007bbcc9c2 [ 291.942997] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 291.948561] kobject: 'rx-0' (000000005b22bf3a): auto cleanup 'remove' event [ 291.962036] kobject: 'rx-0' (000000005b22bf3a): kobject_uevent_env [ 291.968436] kobject: 'rx-0' (000000005b22bf3a): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 291.978501] kobject: 'rx-0' (000000005b22bf3a): auto cleanup kobject_del [ 291.985568] kobject: 'rx-0' (000000005b22bf3a): calling ktype release [ 291.992169] kobject: 'rx-0': free name [ 291.996183] kobject: 'tx-0' (000000002db26702): kobject_cleanup, parent 000000007bbcc9c2 [ 292.004672] kobject: 'tx-0' (000000002db26702): auto cleanup 'remove' event [ 292.011820] kobject: 'tx-0' (000000002db26702): kobject_uevent_env [ 292.011867] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 292.018223] kobject: 'tx-0' (000000002db26702): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 292.037204] kobject: 'tx-0' (000000002db26702): auto cleanup kobject_del [ 292.043260] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 292.044189] kobject: 'tx-0' (000000002db26702): calling ktype release [ 292.050795] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 292.057048] kobject: 'tx-0': free name [ 292.057073] kobject: 'queues' (000000007bbcc9c2): kobject_cleanup, parent (null) [ 292.057080] kobject: 'queues' (000000007bbcc9c2): calling ktype release [ 292.057087] kobject: 'queues' (000000007bbcc9c2): kset_release [ 292.057096] kobject: 'queues': free name [ 292.057432] kobject: '' (00000000212cadef): kobject_uevent_env [ 292.101424] kobject: '' (00000000212cadef): fill_kobj_path: path = '/devices/virtual/net/' [ 292.118361] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 292.124600] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 292.165043] kobject: '' (00000000212cadef): kobject_cleanup, parent (null) [ 292.173014] kobject: '' (00000000212cadef): calling ktype release [ 292.179893] kobject: '': free name [ 292.185314] kobject: 'rx-0' (00000000e9ae4007): kobject_cleanup, parent 00000000bb594e85 [ 292.193580] kobject: 'rx-0' (00000000e9ae4007): auto cleanup 'remove' event [ 292.200773] kobject: 'rx-0' (00000000e9ae4007): kobject_uevent_env [ 292.207175] kobject: 'rx-0' (00000000e9ae4007): fill_kobj_path: path = '/devices/virtual/net/bpq0/queues/rx-0' [ 292.217487] kobject: 'rx-0' (00000000e9ae4007): auto cleanup kobject_del [ 292.222855] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 292.224364] kobject: 'rx-0' (00000000e9ae4007): calling ktype release [ 292.231077] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 292.237570] kobject: 'rx-0': free name [ 292.237645] kobject: 'tx-0' (00000000849483f0): kobject_cleanup, parent 00000000bb594e85 [ 292.259294] kobject: 'tx-0' (00000000849483f0): auto cleanup 'remove' event [ 292.266485] kobject: 'tx-0' (00000000849483f0): kobject_uevent_env [ 292.272816] kobject: 'tx-0' (00000000849483f0): fill_kobj_path: path = '/devices/virtual/net/bpq0/queues/tx-0' [ 292.283028] kobject: 'tx-0' (00000000849483f0): auto cleanup kobject_del [ 292.289970] kobject: 'tx-0' (00000000849483f0): calling ktype release [ 292.296561] kobject: 'tx-0': free name [ 292.300442] kobject: 'queues' (00000000bb594e85): kobject_cleanup, parent (null) [ 292.308860] kobject: 'queues' (00000000bb594e85): calling ktype release [ 292.315631] kobject: 'queues' (00000000bb594e85): kset_release [ 292.321583] kobject: 'queues': free name [ 292.325933] kobject: 'bpq0' (00000000539c887d): kobject_uevent_env [ 292.332267] kobject: 'bpq0' (00000000539c887d): fill_kobj_path: path = '/devices/virtual/net/bpq0' 22:33:39 executing program 2: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:33:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x5, 0x100000001, 0x6, 0x435f668}}) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000200)) pwrite64(r2, &(0x7f00000001c0)=':', 0x1, 0x0) 22:33:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 22:33:39 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:39 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000002c0)=""/120) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x60}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x10000, 0x4) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000340)=ANY=[@ANYBLOB="b9643371085985f2c9da7613ef00e7072f681ce9e25317af5d6834a8974e687acaa01e726aad5e7d5ac79229086c46a880a37be824"]) [ 292.374987] kobject: 'bpq0' (00000000539c887d): kobject_cleanup, parent (null) [ 292.383236] kobject: 'bpq0' (00000000539c887d): calling ktype release [ 292.389921] kobject: 'bpq0': free name [ 292.405786] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env [ 292.430911] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 292.432060] block nbd0: Receive control failed (result -22) [ 292.446373] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 292.446829] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 292.460607] capability: warning: `syz-executor1' uses 32-bit capabilities (legacy support in use) [ 292.464752] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env 22:33:39 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x5, 0x100000001, 0x6, 0x435f668}}) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000200)) pwrite64(r2, &(0x7f00000001c0)=':', 0x1, 0x0) [ 292.477248] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 292.484586] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 292.499409] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 292.499875] block nbd0: Device being setup by another task [ 292.510730] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:33:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 292.524094] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 292.535815] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 292.564092] kobject: 'loop1' (000000003130adc6): kobject_uevent_env 22:33:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x5, 0x100000001, 0x6, 0x435f668}}) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000200)) pwrite64(r2, &(0x7f00000001c0)=':', 0x1, 0x0) 22:33:40 executing program 2: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 292.580506] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 292.590594] block nbd0: Device being setup by another task [ 292.596474] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 292.611010] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 292.619817] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 292.633948] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 292.635271] block nbd0: Device being setup by another task [ 292.641201] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 292.655620] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 292.674775] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env 22:33:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) r2 = openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) ioctl$VIDIOC_SUBDEV_G_CROP(r3, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x5, 0x100000001, 0x6, 0x435f668}}) ioctl$RTC_ALM_READ(r3, 0x80247008, &(0x7f0000000200)) pwrite64(r2, &(0x7f00000001c0)=':', 0x1, 0x0) 22:33:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000002c0)=""/120) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x60}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x10000, 0x4) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000340)=ANY=[@ANYBLOB="b9643371085985f2c9da7613ef00e7072f681ce9e25317af5d6834a8974e687acaa01e726aad5e7d5ac79229086c46a880a37be824"]) 22:33:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x400}], 0x0, 0x0) [ 292.690518] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 292.720445] block nbd0: Device being setup by another task [ 292.733407] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env 22:33:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x5, 0x100000001, 0x6, 0x435f668}}) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000200)) [ 292.758032] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 292.782084] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 292.785122] block nbd0: shutting down sockets [ 292.789508] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env 22:33:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:33:40 executing program 2: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 292.800125] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 292.801980] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 292.809793] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 292.826035] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 292.835169] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 292.847771] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:33:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) ioctl$VIDIOC_SUBDEV_G_CROP(r2, 0xc038563b, &(0x7f0000000240)={0x0, 0x0, {0x5, 0x100000001, 0x6, 0x435f668}}) 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) [ 292.849192] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 292.875960] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 292.892435] block nbd0: Receive control failed (result -22) [ 292.899778] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 292.912690] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 292.919502] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 292.923079] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 292.935470] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 292.935946] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 292.950953] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' 22:33:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) openat$cgroup_int(r0, &(0x7f0000000040)='cpms\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) 22:33:40 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000100), &(0x7f0000000180)=0x14) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="ba4300b00bee0f017edaf02114650f1ea7f07f0f20e06635040000000f22e03e0fc72dbaf80c66b80fb2578d66efbafc0cb001ee0fc75ba2f40f3805800060", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f00000002c0)=""/120) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f00000000c0)) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x60}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000040)=0x10000, 0x4) ioctl$KVM_SET_CPUID(r0, 0xc0185500, &(0x7f0000000340)=ANY=[@ANYBLOB="b9643371085985f2c9da7613ef00e7072f681ce9e25317af5d6834a8974e687acaa01e726aad5e7d5ac79229086c46a880a37be824"]) [ 292.968013] block nbd0: Device being setup by another task [ 293.005596] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env 22:33:40 executing program 0: socket(0x11, 0x2, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x45d) [ 293.022183] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.043115] block nbd0: shutting down sockets 22:33:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 22:33:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) [ 293.066390] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 293.073697] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 293.081275] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 293.103287] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 293.138551] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.150655] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.165275] kobject: 'kvm' (00000000967eb91f): kobject_uevent_env [ 293.171675] kobject: 'kvm' (00000000967eb91f): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 293.171993] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env 22:33:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab03) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x45d) 22:33:40 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:33:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) [ 293.181208] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 293.194051] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:33:40 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:40 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) 22:33:40 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) 22:33:40 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab03) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x45d) [ 293.240027] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 293.249676] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 293.263482] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.270309] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env [ 293.300625] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 293.310896] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 293.311558] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 293.318218] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 293.323393] block nbd0: Receive control failed (result -22) [ 293.329770] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:33:40 executing program 4: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x98b, 0x4440) 22:33:40 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xac68, 0x84, &(0x7f0000000140)=""/132}, 0x48) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 293.345504] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 293.377426] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 293.401591] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 293.411470] block nbd0: shutting down sockets [ 293.416378] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.417527] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 293.429493] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 293.439699] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 293.457101] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 293.457812] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.472208] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 293.485953] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 293.496244] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 293.502773] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 293.512825] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env 22:33:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, 0x0) 22:33:41 executing program 0: r0 = socket(0x11, 0x2, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab03) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x45d) 22:33:41 executing program 4: syz_open_dev$usbmon(0x0, 0x98b, 0x4440) 22:33:41 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) [ 293.520551] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 293.538372] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 293.544822] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 293.555428] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env 22:33:41 executing program 4: syz_open_dev$usbmon(0x0, 0x98b, 0x4440) [ 293.579982] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 293.590511] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 293.590529] block nbd0: Receive control failed (result -22) [ 293.600576] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env 22:33:41 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x45d) [ 293.626157] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.632264] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 293.642311] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.646982] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 293.656920] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) [ 293.686285] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 293.692928] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 293.695541] block nbd0: shutting down sockets [ 293.707381] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.713972] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.723921] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env 22:33:41 executing program 4: syz_open_dev$usbmon(0x0, 0x98b, 0x4440) 22:33:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xac68, 0x84, &(0x7f0000000140)=""/132}, 0x48) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 22:33:41 executing program 0: r0 = socket(0x0, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 293.731662] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:33:41 executing program 4: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x4440) [ 293.763609] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 293.776654] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 293.799313] kobject: 'loop1' (000000003130adc6): kobject_uevent_env 22:33:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, 0x0) 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) [ 293.808939] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' 22:33:41 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:41 executing program 4: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) [ 293.842403] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env [ 293.853952] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.860950] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 293.873537] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 22:33:41 executing program 0: r0 = socket(0x11, 0x0, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 293.886926] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 293.905662] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.913638] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 293.913657] block nbd0: Receive control failed (result -22) [ 293.929467] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:33:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xac68, 0x84, &(0x7f0000000140)=""/132}, 0x48) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 293.932669] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' 22:33:41 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:41 executing program 4: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) 22:33:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x400}], 0x0, 0x0) [ 293.963316] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 293.973377] block nbd0: shutting down sockets [ 293.980057] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 293.990305] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 293.997031] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.007193] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) 22:33:41 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) [ 294.037305] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 294.053664] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.065363] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.071828] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:33:41 executing program 4: syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) 22:33:41 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 294.087919] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.102926] block nbd0: Receive control failed (result -22) [ 294.108984] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 294.122233] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.123617] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env 22:33:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c0000000000000001000000010000", 0x1f, 0x400}], 0x0, 0x0) 22:33:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xac68, 0x84, &(0x7f0000000140)=""/132}, 0x48) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 294.132310] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 294.140550] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 294.159700] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 294.171090] block nbd0: shutting down sockets 22:33:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) [ 294.179736] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 294.189782] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 294.196433] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.202961] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.212037] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.213743] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env 22:33:41 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:41 executing program 5: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) [ 294.239768] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.275874] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env [ 294.282806] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) [ 294.283863] block nbd0: shutting down sockets [ 294.289462] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 294.304963] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.307401] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 294.321529] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:33:41 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) [ 294.337946] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 294.344616] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.355598] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 294.372942] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 294.379761] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:33:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) 22:33:41 executing program 5: socket(0x11, 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 294.390295] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 294.396851] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.397177] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 294.403433] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.431506] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env 22:33:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xac68, 0x84, &(0x7f0000000140)=""/132}, 0x48) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 22:33:41 executing program 0: socket(0x11, 0x2, 0x0) r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) ioctl$NBD_CLEAR_SOCK(r0, 0xab03) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x45d) 22:33:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c0000000000000001000000010000", 0x1f, 0x400}], 0x0, 0x0) [ 294.438273] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.459440] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env 22:33:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) 22:33:42 executing program 5: socket(0x11, 0x2, 0x0) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 294.500157] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 294.510121] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 294.529212] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 294.531541] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env 22:33:42 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(0xffffffffffffffff, 0xab03) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x45d) 22:33:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000580)={'bcsf0\x00', {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}) [ 294.557351] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 294.573257] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.589407] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 294.596019] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:33:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) [ 294.601005] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.606469] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 294.625233] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 294.625393] block nbd0: shutting down sockets [ 294.643685] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env 22:33:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 22:33:42 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x45d) [ 294.650717] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.664952] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 294.674091] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 294.689700] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' 22:33:42 executing program 5: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 22:33:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) [ 294.708446] block nbd0: Receive control failed (result -22) [ 294.714412] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 294.723954] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.725592] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 294.737557] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 294.746991] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:33:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 294.757507] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.765192] block nbd0: shutting down sockets [ 294.766933] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.772723] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:33:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) [ 294.807909] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.816072] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.826405] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 294.839146] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' 22:33:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c0000000000000001000000010000", 0x1f, 0x400}], 0x0, 0x0) 22:33:42 executing program 5: syz_open_dev$ndb(0x0, 0xffffffffffffffff, 0x0) 22:33:42 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r0) ioctl$NBD_CLEAR_SOCK(r1, 0xab03) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x0) 22:33:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 294.864807] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 294.881156] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 294.891539] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 294.900929] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:33:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) 22:33:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) 22:33:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) [ 294.911797] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 294.911814] block nbd0: Receive control failed (result -22) [ 294.924256] kobject: 'nbd0' (0000000071843dad): kobject_uevent_env [ 294.926004] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 294.949731] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 294.959409] kobject: 'nbd0' (0000000071843dad): fill_kobj_path: path = '/devices/virtual/block/nbd0' [ 294.963305] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 294.983570] kobject: 'loop4' (00000000ef336a5e): kobject_uevent_env [ 294.994940] kobject: 'loop4' (00000000ef336a5e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 294.999945] block nbd0: shutting down sockets 22:33:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 22:33:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) [ 295.007470] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 295.011678] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 295.022705] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 295.043151] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env [ 295.052873] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' 22:33:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x5, 0x1, 0x0, 0x0, 0x6, 0x2, 0x4}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xac68, 0x84, &(0x7f0000000140)=""/132}, 0x48) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 295.067452] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 295.074707] kobject: 'loop0' (000000002bcf09e3): kobject_uevent_env [ 295.081686] kobject: 'loop0' (000000002bcf09e3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 295.090797] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 295.092617] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 295.108106] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:33:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:33:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000100)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="800000000002000019000000e60100006c000000000000000100000001000000004000c0004000c6000000000000", 0x2e, 0x400}], 0x0, 0x0) [ 295.118091] kobject: 'loop1' (000000003130adc6): kobject_uevent_env [ 295.137683] kobject: 'loop1' (000000003130adc6): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 295.161625] kobject: 'loop2' (000000002d10fbc1): kobject_uevent_env 22:33:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) gettid() socketpair$unix(0x1, 0x5, 0x0, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) 22:33:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) [ 295.184557] kobject: 'loop2' (000000002d10fbc1): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 295.209570] kobject: 'loop5' (000000007a1a9770): kobject_uevent_env [ 295.218413] kobject: 'loop5' (000000007a1a9770): fill_kobj_path: path = '/devices/virtual/block/loop5' 22:33:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) [ 295.230191] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 295.239245] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 295.244835] kobject: 'loop3' (0000000068462fbb): kobject_uevent_env [ 295.267709] kobject: 'loop3' (0000000068462fbb): fill_kobj_path: path = '/devices/virtual/block/loop3' 22:33:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x97) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000006c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x5, 0x0, "dcbd7013560987c90ebd84b6e984c7242a057f7f7f8b85f0aba26dc45e69c2db87180107eba9f36e22ba7df5228e6a97e954627eb3966137d05054d92ff0e25078b35ba8d6f9e3ab5b89afb667676ae0"}, 0xd8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuset.memory_pressure\x00', 0x0, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='syz_tun\x00', 0x25) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000005c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, "df2c9c75bd4c55325fe54fe4b8475c9366744ab46131ba47cc839c6d3d1f288e5da58ffb88c3c9978407767b86505a282c67a7702a239d5a0f8b7b29a332d8b0f83a005fc5f5db95c1deca497bf4535e"}, 0x361) sendto$inet6(r0, &(0x7f0000000000)="15", 0x1, 0x200408d6, &(0x7f00000011c0)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)) capset(&(0x7f0000581ff8)={0x19980330}, &(0x7f00005ccfe8)) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000000540)=0x1e) inotify_init1(0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000100)=0x8, 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000240)='/dev/snd/seq\x00', 0x0, 0x402) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000007c0)={'teql0\x00', {0x2, 0x4e21, @rand_addr=0x7f}}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) bind$vsock_stream(r3, &(0x7f0000000400)={0x28, 0x0, 0x0, @hyper}, 0x10) statx(r3, &(0x7f00000002c0)='./file0\x00', 0x400, 0x122, &(0x7f0000000300)) 22:33:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs$namespace(0x0, 0x0) gettid() move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f0