00600)='/sys/module/ioatdma', 0x10680, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186800ffa283760000000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xf3, &(0x7f0000000100)=""/243, 0x41100, 0x30, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r4, r0, r5, r0, r6, r0, r7], &(0x7f0000000680)=[{0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000880), 0x20002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r4}, &(0x7f0000000940), &(0x7f0000000980)='%d \x00'}, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b00)='/sys/module/xhci_hcd', 0x1000, 0x2) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r8, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x32, 0x0, @thr={0x0, &(0x7f0000001340)="8b38e07fa860a13e4cea777d1a7fc7d25a31ba85db17d4b366663dd6f19e77b06479026d84396653bba6781569dd153057bba384b1c031139de434aa0d00000000213b1de691431e298d0c9dfc9a8807a5959eb8f0fef70b423a1df3981389093a283ab9ef243042bb0b5e9ec5b6c458ca6352927b4164c57af495633dfdc5741925327931c918cadf5db8532332ef910a6efb06cd1a9b92c9f7d9cf40749aceb271b30861cf4d3ee9b05c9c0d78008214977d6f79e242556cc0133f391997b37ff071442a76419ebbe9e1fc3237731c9297b8455d9c6d31a52ba52de4f1cee0823826ac5f678a9550d561c5135f05f9564e2809c254a131b904554c2a5d4f16054758520275e757cd69d19fdbe8a2cf6d79dec08b98584f893ae5ab9211256263c9e209dedd89af3572fb88812cf2"}}, &(0x7f0000000040)) 01:03:52 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r2, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0, 0xffffffffffffffff}, 0x4) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/ioatdma', 0x10680, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186800ffa283760000000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xf3, &(0x7f0000000100)=""/243, 0x41100, 0x30, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r4, r0, r5, r0, r6, r0, r7], &(0x7f0000000680)=[{0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000880), 0x20002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r4}, &(0x7f0000000940), &(0x7f0000000980)='%d \x00'}, 0x20) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r8, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 3: timer_create(0x3, 0x0, 0x0) 01:03:52 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r3, 0x43403d05, &(0x7f0000000280)={0xb}) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000140)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/ram4', 0x200400, 0x0) 01:03:52 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x32, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) 01:03:52 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r2, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0, 0xffffffffffffffff}, 0x4) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/ioatdma', 0x10680, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186800ffa283760000000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xf3, &(0x7f0000000100)=""/243, 0x41100, 0x30, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r4, r0, r5, r0, r6, r0, r7], &(0x7f0000000680)=[{0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000880), 0x20002, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r4}, &(0x7f0000000940), &(0x7f0000000980)='%d \x00'}, 0x20) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000b00)='/sys/module/xhci_hcd', 0x1000, 0x2) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r8, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) syz_usb_connect_ath9k(0x3, 0x5a, &(0x7f0000000240)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0xcf3, 0x9271, 0x108, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48}}]}}, 0x0) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), r1) 01:03:52 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r2, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0, 0xffffffffffffffff}, 0x4) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/ioatdma', 0x10680, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186800ffa283760000000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xf3, &(0x7f0000000100)=""/243, 0x41100, 0x30, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r4, r0, r5, r0, r6, r0, r7], &(0x7f0000000680)=[{0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000880), 0x20002, 0x0) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r8, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r3, 0x43403d05, &(0x7f0000000280)={0xb}) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000140)) 01:03:52 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0xcc, r1, 0x4, 0x70bd2c, 0x25dfdbff, {}, [{{0x8}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}]}}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'syztnl2\x00', &(0x7f00000005c0)={'syztnl2\x00', 0x0, 0x2f, 0x7f, 0x3, 0x80000001, 0x40, @dev={0xfe, 0x80, '\x00', 0x1f}, @private2, 0x8, 0x7800, 0x2, 0x3d}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r0, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f00000006c0)=[0x0], &(0x7f0000000700)=[0x0], 0x0, 0x8, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001100)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001a80)=ANY=[@ANYBLOB="d0060000", @ANYRES16=r1, @ANYBLOB="000429bd7000fbdbdf250000000008000100", @ANYRES32=0x0, @ANYBLOB="200202803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c000000000000000000000005000300000000000800040006000000380001000000010071756575655f69640000000000000000000000000000000000000000000000000000030003000000d13704000000ffff00000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040000000000080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004003f0000000800070000000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000700000008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400001000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=0x0, @ANYBLOB="f80102803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000700000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000800000008000600", @ANYRES32=0x0, @ANYBLOB="3c000100240001006c625f74785f6d6574686f640000000000000000000000000000000000000000050003000500000009000400686173680000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b00000008000400c4a6000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000008000100", @ANYRES32=r2, @ANYBLOB="1c0102803c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="64000100240001006270665f686173685f66756e6300000000000000000000000000000000000000050003000b0000003400040007000781020000000100200402000000000106c30100000004000120000000000300002d05000000ff0f0808bfec084708000100", @ANYRES32=r3, @ANYBLOB="680102803800010078fc01006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400000200003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004003519000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000000000008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004003613000008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c0000000000000005000300030000000800040006000000"], 0x6d0}, 0x1, 0x0, 0x0, 0x4004084}, 0x20048051) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000001200)='fscache_active\x00', r7}, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r6, 0xc02064b9, &(0x7f00000011c0)={&(0x7f0000001140)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000001180)=[0x0, 0x0], 0x4, 0x0, 0xdededede}) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0x0) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000126bd700200"/18, @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x81) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r9, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x81) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nfc(&(0x7f0000000380), r9) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r10, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r11, 0x100, 0x70bd26, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r12}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x81) r13 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r13, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x81) r14 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$nfc(&(0x7f0000000380), r13) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r14, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r15, @ANYBLOB="000126bd7000000000000200000008000100", @ANYRES32=r16, @ANYBLOB="e7ff0100", @ANYRES32=0x0, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x81) sendmsg$NFC_CMD_ENABLE_SE(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x3c, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NFC_ATTR_SE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r12}, @NFC_ATTR_SE_INDEX={0x8, 0x15, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r16}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2c044001}, 0x8010) 01:03:52 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x32, 0x0, @thr={0x0, 0x0}}, 0x0) 01:03:52 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r2, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0, 0xffffffffffffffff}, 0x4) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/ioatdma', 0x10680, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x9, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="186800ffa283760000000000030000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x6, 0xf3, &(0x7f0000000100)=""/243, 0x41100, 0x30, '\x00', r1, 0x0, r3, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x7, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000640)=[r4, r0, r5, r0, r6, r0, r7], &(0x7f0000000680)=[{0x2, 0x5, 0xa}], 0x10, 0x2}, 0x90) r8 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r8, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x32, 0x0, @thr={0x0, 0x0}}, 0x0) 01:03:52 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:52 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r3, 0x43403d05, &(0x7f0000000280)={0xb}) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000140)) 01:03:52 executing program 4: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)="64ac2090af5416d6ab85d0e77565d1942293cb50b54c2d26359be6efd398cfa1f64121ae1387e0eaf677cd0cd96bbb2e23") ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={0x0, &(0x7f0000000100), 0x0, r1, 0xbbbbbbbb}) geteuid() [ 1252.027550][ T5129] ath9k_htc 5-1:1.0: ath9k_htc: Target is unresponsive [ 1252.046466][ T5129] ath9k_htc: Failed to initialize the device [ 1252.058930][T23143] usb 5-1: ath9k_htc: USB layer deinitialized [ 1252.195748][T25258] fuse: Bad value for 'group_id' [ 1252.236733][T23535] usb 4-1: new high-speed USB device number 107 using dummy_hcd [ 1252.756883][T23535] usb 4-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1252.766058][T23535] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1252.777441][T23535] usb 4-1: Product: syz [ 1252.781643][T23535] usb 4-1: Manufacturer: syz [ 1252.786249][T23535] usb 4-1: SerialNumber: syz [ 1252.830949][T23535] usb 4-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 1253.436761][ T5096] usb 4-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 1253.658455][T23535] usb 4-1: USB disconnect, device number 107 01:03:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) ioctl$RTC_VL_CLR(r2, 0x7014) 01:03:54 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 0: timer_create(0x0, &(0x7f0000000000)={0x0, 0x32, 0x0, @thr={0x0, 0x0}}, 0x0) 01:03:54 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0}, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/ioatdma', 0x10680, 0x48) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r3, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000140)) 01:03:54 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) bind$ax25(r0, &(0x7f0000000000)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3}, [@bcast, @bcast, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LIST(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x81) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000380), r3) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000003c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r5, 0x100, 0x70bd26, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}, @NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x81) sendmsg$NFC_CMD_SE_IO(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c140}, 0x40001) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:03:54 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0}, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r3, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000140)) 01:03:54 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:54 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:54 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0}, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000001240)='/sys/module/rng_core', 0x200400, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) ioctl$RTC_VL_CLR(r2, 0x7014) 01:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r2, 0x89e9, &(0x7f0000000140)) 01:03:54 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0}, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000005c0), 0x8001, 0x0) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:54 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) ioctl$RTC_VL_CLR(r2, 0x7014) 01:03:54 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:54 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) [ 1254.499556][ T5096] ath9k_htc 4-1:1.0: ath9k_htc: Target is unresponsive [ 1254.507946][ T5096] ath9k_htc: Failed to initialize the device [ 1254.524237][T23535] usb 4-1: ath9k_htc: USB layer deinitialized 01:03:54 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000580)={r0}, 0x4) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 1: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:54 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:54 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:55 executing program 1: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/module/virtio_net', 0x200, 0x100) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r0 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'dummy0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) 01:03:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:55 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:55 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r0 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 1: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1fe9) 01:03:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) 01:03:55 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r0 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:55 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:03:55 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:03:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 01:03:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:55 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) socket(0x1f, 0x5, 0x8) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:55 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) 01:03:55 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x105082, 0x49) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) 01:03:55 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) 01:03:55 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) 01:03:55 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x321000, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:55 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 01:03:55 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:55 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 01:03:55 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:55 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x0, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 01:03:56 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 01:03:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622"}, 0x60) 01:03:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:56 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 2: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:56 executing program 1: ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r3}) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:56 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020}, 0x2020) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:56 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 1: ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:56 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020}, 0x2020) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:56 executing program 1: ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:56 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:56 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:56 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:56 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:57 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:57 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r3}) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x0, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:57 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:57 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:57 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:57 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 1: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000140)) 01:03:57 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000c80)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622"}, 0x60) 01:03:57 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000000)) 01:03:57 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:57 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:57 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000140)) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 01:03:57 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:57 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) 01:03:57 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) 01:03:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 01:03:57 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:57 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:57 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, 0x0) 01:03:57 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r1, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:57 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:57 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:57 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:57 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:57 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001000)={r0, 0xe0, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000780)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], 0x0, 0x8, &(0x7f0000000e00)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000e40), &(0x7f0000000e80), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000ec0)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000010c0)={'ip6_vti0\x00', &(0x7f0000001040)={'ip6gre0\x00', r1, 0x0, 0x6, 0x3f, 0x4635, 0x8, @private0, @loopback, 0x10, 0x7800, 0x3dd65b6d, 0x8378}}) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r2, &(0x7f0000000c80)={0x27, 0x0, 0x1, 0x4, 0x96, 0xaf, "ba371aee2c368025820747c4b5b36081135f62332202ea9a59ba56ba12d0b15d902a5ac0dd301fd046bf84dc98b636024fef0d8e5c09f4624d2ce5cd760622", 0x33}, 0x60) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:58 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:58 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 5: bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 01:03:58 executing program 0: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 5: bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 01:03:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x4a002, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4, r2}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x24c00, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000000)) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r4, 0x7010) ioctl$RTC_IRQP_SET(r4, 0x4008700c, 0x1fe9) ioctl$RTC_PIE_OFF(r3, 0x7006) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:58 executing program 5: bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 01:03:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x1fe9) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:58 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x4a002, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4, r2}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x24c00, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000000)) 01:03:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r6, 0x541b, 0x0) 01:03:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) bind$nfc_llcp(r0, 0x0, 0x0) 01:03:58 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 5: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 01:03:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000000)={0x9, 0x1e}) 01:03:58 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:03:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, r1, 0x1faf, '\x00', 0x0, r2, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:58 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:58 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:58 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 5: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 01:03:58 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, r1, 0x1faf, '\x00', 0x0, r2, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:58 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:58 executing program 5: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000000)) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 0: syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, &(0x7f0000000000)) 01:03:59 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) sendto$ax25(r5, &(0x7f0000000140)="90d3fa6b21839c4a15d2f155607d11cd548d0b144624ea1e3e978430c555d6fcb37af7eabff26913ba1a5dc4cd729da8ae17039035df5436a4472014fdb1494d983c00393e83dc6daefaaa45d8d92a40911662e20bfb856ded5cb99f7783517745326babc4c1aa96c999b469276bcdb8e0dea8", 0x73, 0x0, &(0x7f00000001c0)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null]}, 0x48) 01:03:59 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, r1, 0x1faf, '\x00', 0x0, r2, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:59 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:03:59 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, r1, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r5, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, 0x0) 01:03:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:03:59 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, r1, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:03:59 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:03:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:03:59 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:59 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000000)) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x81, 0xfff, 0x8, 0x14, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:03:59 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:03:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:03:59 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r3, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r4}) getsockname$ax25(r1, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, &(0x7f0000000100)=0x48) 01:03:59 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:03:59 executing program 0: getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 01:03:59 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:03:59 executing program 0: getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 01:03:59 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 3: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:03:59 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:03:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0xfff, 0x8, 0x14, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 0: getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 01:04:00 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000280)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r3}) 01:04:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x8, 0x14, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:04:00 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) read$FUSE(0xffffffffffffffff, &(0x7f0000001e40)={0x2020}, 0x2020) 01:04:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000000100)) 01:04:00 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 4: getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 01:04:00 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 4: getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000300)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0xffffffffffffffff}) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 4: getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 01:04:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1faf, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_technisat_usb2', 0x200000, 0xa8) 01:04:00 executing program 0: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 01:04:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 01:04:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, 0x0) 01:04:00 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x1, 0xc}, 0x48) 01:04:00 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockname$ax25(r0, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x2, 0x8) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:00 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, 0x0) 01:04:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0xc}, 0x48) 01:04:00 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000000)={0x0, 0x2e8, 0x8, 0x40, 0x0, [], [0x9, 0x0, 0x1, 0x2], [0x3, 0x0, 0x2, 0x7], [0xfff, 0x8000, 0x1b]}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:00 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:00 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:00 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, 0x0) 01:04:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000000)={0x0, 0x2e8, 0x8, 0x40, 0x0, [], [0x9, 0x0, 0x1, 0x2], [0x3, 0x0, 0x2, 0x7], [0xfff, 0x8000, 0x1b]}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 4: syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @rose}, [@default, @null, @bcast, @default, @netrom, @remote, @rose, @null]}, 0x0) 01:04:01 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180), 0xc0002, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)={0x28}, 0x28) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f0000000140)=r1) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x83}}, 0x18) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x24001, 0x0) ioctl$PTP_EXTTS_REQUEST(r2, 0x40103d02, &(0x7f0000000100)={0x40, 0x2}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_PEROUT_REQUEST2(r0, 0x40383d0c, &(0x7f0000000080)={{0x6c1, 0xfffffffe}, {0x10000, 0x3}, 0x7e00}) 01:04:01 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, 0x0) 01:04:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14}, 0x48) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000000)={0x0, 0x2e8, 0x8, 0x40, 0x0, [], [0x9, 0x0, 0x1, 0x2], [0x3, 0x0, 0x2, 0x7], [0xfff, 0x8000, 0x1b]}) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:01 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000040)) 01:04:01 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockname$ax25(r0, 0x0, 0x0) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:01 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000000)={0x0, 0x2e8, 0x8, 0x40, 0x0, [], [0x9, 0x0, 0x1, 0x2], [0x3, 0x0, 0x2, 0x7], [0xfff, 0x8000, 0x1b]}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r2, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:01 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:01 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r2, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000000)={0x0, 0x2e8, 0x8, 0x40, 0x0, [], [0x9, 0x0, 0x1, 0x2], [0x3, 0x0, 0x2, 0x7], [0xfff, 0x8000, 0x1b]}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 01:04:01 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r2, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000000)={0x0, 0x2e8, 0x8, 0x40, 0x0, [], [0x9, 0x0, 0x1, 0x2], [0x3, 0x0, 0x2, 0x7], [0xfff, 0x8000, 0x1b]}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, 0x0) 01:04:01 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r2, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:01 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r2, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_open_dev$rtc(&(0x7f0000000100), 0x3, 0x400001) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) syz_init_net_socket$ax25(0x3, 0x5, 0x0) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 1: socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r2, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r1, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:01 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r1, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:01 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0xcd) socketpair(0x23, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 1: socketpair(0x0, 0x1, 0x9, &(0x7f0000000240)) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 01:04:01 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r1, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:01 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:01 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:01 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_init_net_socket$ax25(0x3, 0x5, 0x0) 01:04:02 executing program 1: socketpair(0x0, 0x1, 0x9, &(0x7f0000000240)) 01:04:02 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:02 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14}, 0x48) 01:04:02 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 1: socketpair(0x0, 0x1, 0x9, &(0x7f0000000240)) 01:04:02 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) recvfrom$ax25(r1, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) 01:04:02 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc}, 0x48) 01:04:02 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r1, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 1: socketpair(0x23, 0x0, 0x9, &(0x7f0000000240)) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:04:02 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:04:02 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) 01:04:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000240)) 01:04:02 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) 01:04:02 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 01:04:02 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000240)) 01:04:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter, 0x48) 01:04:02 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000240)) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:02 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080)={0x5, 0x5}, 0x2) 01:04:02 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) 01:04:02 executing program 1: socketpair(0x23, 0x0, 0x9, 0x0) 01:04:02 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:02 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:02 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 01:04:02 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) recvfrom$ax25(r0, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:02 executing program 1: socketpair(0x23, 0x0, 0x9, 0x0) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) 01:04:03 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:03 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 1: socketpair(0x23, 0x0, 0x9, 0x0) 01:04:03 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:03 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) ptrace$getenv(0x4201, 0x0, 0x9, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000080)) 01:04:03 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:03 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r2}, 0x18) 01:04:03 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:03 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) ptrace$getenv(0x4201, 0x0, 0x9, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:03 executing program 3: syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(0xffffffffffffffff, &(0x7f0000000100)=""/92, 0x5c, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r2}, 0x18) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 01:04:03 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) ptrace$getenv(0x4201, 0x0, 0x9, &(0x7f0000000140)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:03 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x102, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r2}, 0x18) 01:04:03 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) ptrace$getenv(0x4201, 0x0, 0x9, &(0x7f0000000140)) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:03 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 01:04:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)={{0x3, @null}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}, 0x48) 01:04:03 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x20, 0x70bd27, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000840}, 0x0) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) 01:04:03 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) 01:04:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 01:04:03 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) ioctl$RTC_WIE_OFF(r1, 0x7010) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:03 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x2a, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:03 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x2a, 0x5, 0x8) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, 0x0, &(0x7f0000000040)) 01:04:03 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:03 executing program 2: socket(0x2a, 0x5, 0x8) 01:04:03 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:03 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:03 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) 01:04:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 2: socket(0x0, 0x5, 0x8) 01:04:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:04 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) 01:04:04 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 01:04:04 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:04 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) 01:04:04 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x8, &(0x7f0000000000), 0x0) 01:04:04 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:04 executing program 2: socket(0x0, 0x5, 0x8) 01:04:04 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r2}, 0x18) 01:04:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x1) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x2}}, 0x18) 01:04:04 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x1) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x2}}, 0x18) 01:04:04 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r2}, 0x18) 01:04:04 executing program 2: socket(0x0, 0x5, 0x8) 01:04:04 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x2, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:04 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x0, r2}, 0x18) 01:04:04 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 01:04:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x1) write$FUSE_GETXATTR(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x2}}, 0x18) 01:04:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 2: socket(0x2a, 0x0, 0x8) 01:04:04 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 01:04:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 01:04:04 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x1) 01:04:04 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 2: socket(0x2a, 0x0, 0x0) 01:04:04 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x1) 01:04:04 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) 01:04:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 01:04:04 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:04 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 01:04:04 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x1) 01:04:04 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) 01:04:04 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x24, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:04 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:04 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 01:04:04 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4000, 0x1) 01:04:04 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:05 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x14, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:05 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4000, 0x1) 01:04:05 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040)=0x25, 0x4) 01:04:05 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) connect(r0, &(0x7f0000000100)=@l2tp={0x2, 0x0, @local}, 0x80) 01:04:05 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4000, 0x1) 01:04:05 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe, 0x4, 0x40000000, 0x0, 0x92}) 01:04:05 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x0, 0x1) 01:04:05 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) write$FUSE_GETXATTR(r1, &(0x7f0000000240)={0x18, 0xffffffffffffffda}, 0x18) 01:04:05 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x0, 0x1) 01:04:05 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x92}) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x92}) 01:04:05 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x0, 0x1) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 01:04:05 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/blk_cgroup', 0x4000, 0x0) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x4, 0x40000000, 0x0, 0x92}) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[], 0x28) 01:04:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe, 0x0, 0x40000000, 0x0, 0x92}) 01:04:05 executing program 4: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:05 executing program 4: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x92}) 01:04:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 4: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x92}) 01:04:05 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:05 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={0x0, 0x0, 0x8}, 0x18) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x92}) 01:04:05 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/bnep', 0x42a140, 0x130) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:05 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={0x0}, 0x18) 01:04:05 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:05 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe, 0x0, 0x40000000}) 01:04:05 executing program 3: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 01:04:05 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={0x0}, 0x18) 01:04:06 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 0: socket(0x0, 0x5, 0x8) 01:04:06 executing program 3: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@generic={0x0}, 0x18) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 3: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x1f, 0x5, 0x8) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) r2 = syz_genetlink_get_family_id$smc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="10002abd7000fddbdf250300000005000400010000001400020076657468305f766c616e000000000000140002006261746164763000000000000000000005000400020000000900030073797a3200000000"], 0x58}, 0x1, 0x0, 0x0, 0x20048000}, 0x80) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x7ff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000000), 0x4003) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceae"], 0x28) 01:04:06 executing program 5: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x7ff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000000), 0x4003) 01:04:06 executing program 5: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:06 executing program 5: setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x7ff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000000), 0x4003) 01:04:06 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x7ff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:06 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1266.180882][T26526] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:06 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x7ff) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x7ff) 01:04:06 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceaedc86f02e9c3d00cf352bce30bf2018ad54580300"], 0x28) 01:04:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) [ 1266.343229][T26549] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:06 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 01:04:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 01:04:06 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:06 executing program 0: setpriority(0x0, 0x0, 0x0) 01:04:06 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 01:04:06 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:06 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) [ 1266.561339][T26570] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:06 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) connect$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:06 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x3, 0x4, 0x6}) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000340)={0x0, 0x0, r1, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0]}) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04002cbd7000fedbdf2501000000050004000200000005000400020000000900030073057a31000000001800030073797a3100000000050004000100000088827d4e3af051e117e17ee2"], 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x4080) 01:04:06 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092"], 0x28) 01:04:06 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[], 0x28) 01:04:06 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) 01:04:07 executing program 3: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)="64ac2090af5416d6ab85d0e77565d1942293cb50b54c2d26359be6efd398cfa1f64121ae1387e0eaf677cd0cd96bbb2e23") ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() 01:04:07 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) connect$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) [ 1266.693887][T26588] ax25_connect(): syz-executor.0 uses autobind, please contact jreuter@yaina.de 01:04:07 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8c100, 0x0) r0 = pidfd_open(0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000, r0}, 0x18) 01:04:07 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[], 0x28) 01:04:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:07 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, 0xfffffffffffffffd) connect$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:07 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8c100, 0x0) r0 = pidfd_open(0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000, r0}, 0x18) 01:04:07 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[], 0x28) 01:04:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) [ 1266.854826][T26611] fuse: Bad value for 'group_id' 01:04:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:07 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000480), r1) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:07 executing program 5: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, 0x0, 0x0) 01:04:07 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:07 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:07 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8c100, 0x0) r0 = pidfd_open(0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000, r0}, 0x18) 01:04:07 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:08 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:08 executing program 5: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)="64ac2090af5416d6ab85d0e77565d1942293cb50b54c2d26359be6efd398cfa1f64121ae1387e0eaf677cd0cd96bbb2e") ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() 01:04:08 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:08 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:08 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8c100, 0x0) r0 = pidfd_open(0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000, r0}, 0x18) [ 1267.679057][T26632] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:08 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:08 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000480), r1) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:08 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:08 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092134588ceae"], 0x28) 01:04:08 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8c100, 0x0) r0 = pidfd_open(0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000, r0}, 0x18) [ 1267.801624][T26645] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de [ 1267.811148][T26646] fuse: Bad value for 'group_id' 01:04:08 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000480), r1) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:08 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000"], 0x28) 01:04:08 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) accept$ax25(r1, 0x0, &(0x7f0000000000)) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1267.953020][T26661] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:08 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:08 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:08 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8c100, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000}, 0x18) 01:04:08 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:08 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000"], 0x28) 01:04:08 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) syz_genetlink_get_family_id$team(&(0x7f00000002c0), r4) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:08 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:08 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000"], 0x28) 01:04:08 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f0000000380)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1268.645522][T26666] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) r6 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x8, 0x8, 0x7, 0x1}) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r5, r4, r7], 0x3, r3, r2, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000180)={r1}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000400)) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x4000}, 0x18) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB], 0x28) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x2, 0x8, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x5, 0x3ffffffffffffc5b, 0x0, r4}) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) r6 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x8, 0x8, 0x7, 0x1}) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r5, r4, r7], 0x3, r3, r2, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000180)={r1}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000400)) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 01:04:09 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x2, 0x8, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x5, 0x3ffffffffffffc5b, 0x0, r4}) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) [ 1268.831251][T26693] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:09 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000000), 0x2) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r5, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) r6 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x8, 0x8, 0x7, 0x1}) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r5, r4, r7], 0x3, r3, r2, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000180)={r1}) ioctl$DRM_IOCTL_MODE_GETENCODER(0xffffffffffffffff, 0xc01464a6, &(0x7f0000000400)) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:09 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x2, 0x8, 0x3, 0x1}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000180)={&(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100), 0x0, 0x5, 0x3ffffffffffffc5b, 0x0, r4}) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) r6 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x8, 0x8, 0x7, 0x1}) ioctl$DRM_IOCTL_MODE_SETCRTC(r6, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r5, r4, r7], 0x3, r3, r2, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) ioctl$DRM_IOCTL_MODE_GETFB(r0, 0xc01c64ad, &(0x7f0000000180)={r1}) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={0x0, 0x0, 0x4000}, 0x18) 01:04:09 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) socket(0x1f, 0x5, 0x8) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r4, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1268.974581][T26706] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) r5 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000300)={&(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0], 0x8, 0x8, 0x7, 0x1}) ioctl$DRM_IOCTL_MODE_SETCRTC(r5, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r4, r3, r6], 0x3, r2, r1, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x2, 0x8, 0x3, 0x1}) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={0x0, 0x0, 0x4000}, 0x18) 01:04:09 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="280000000400000000000000000092"], 0x28) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={0x0, 0x0, 0x4000}, 0x18) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) r4 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r3, r2, 0x0], 0x3, r1, r0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1269.146062][T26726] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) r3 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @local}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r2, r3, 0x1, 0x2, 0x8b88}) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r4, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:09 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00'}, 0x18) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r3, r2, 0x0], 0x3, r1, r0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 3: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00'}, 0x18) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r3, r2, 0x0], 0x3, r1, r0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1269.331271][T26746] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000"], 0x28) 01:04:09 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f0000000280)={r1, r2, 0x1, 0x2, 0x8b88}) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r3, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, 0x0, 0x40000) 01:04:09 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)=@o_path={&(0x7f00000000c0)='./file1/file0\x00'}, 0x18) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x1, 0x4, 0x5}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[r3, r2, 0x0], 0x3, r1, r0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:09 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x103000, 0x0) accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x2711}, 0x10, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, 0x0, 0x40000) [ 1269.495852][T26769] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:09 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r1, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x4, 0x101000) r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:09 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) ioctl$RTC_VL_CLR(r2, 0x7014) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:09 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="28000000040000000000000000"], 0x28) 01:04:09 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, 0x0, 0x40000) 01:04:09 executing program 5: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r2, 0x7010) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0xee0c3, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000080)={r1, 0x0, 0x0, 0xffff, 0x4}) 01:04:10 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000"], 0x28) 01:04:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x20044044}, 0x40000) [ 1269.654070][T26788] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:10 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x2, 0x3, 0x1, 0x4}) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r1, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd}, 0x40000) 01:04:10 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0xee0c3, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000080)={r1, 0x0, 0x0, 0xffff, 0x4}) 01:04:10 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000"], 0x28) [ 1269.777647][T26801] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:10 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffd}, 0x0) 01:04:10 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000"], 0x28) 01:04:10 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0xee0c3, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(0xffffffffffffffff, 0xc01864b0, &(0x7f0000000080)={r1, 0x0, 0x0, 0xffff, 0x4}) [ 1269.908933][T26817] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:10 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000003c0)={0x24, 0x4, 0xf, 0x13, 0x7, 0x5, 0x5, 0x69, 0x1}) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x80040, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0xee0c3, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) 01:04:10 executing program 5: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1270.043086][T26829] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de [ 1270.082579][T26835] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de 01:04:10 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0xee0c3, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) 01:04:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100), 0xee0c3, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) 01:04:10 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) accept$ax25(r2, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @netrom, @remote, @rose, @rose, @default, @bcast, @bcast]}, &(0x7f00000001c0)=0x48) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000040)={0x0, 0x1, 0xfffffffe, 0x6, &(0x7f0000000000)=[{0x4, 0x8, 0x1ff, 0x2}, {0x7, 0x1, 0x8, 0xfffc}, {0xfffb, 0x1f, 0x400, 0x100}, {0x5, 0x9, 0xbf, 0x9}, {0x7, 0x8, 0xa1, 0x363}, {0xfe00, 0x7, 0x7}]}) 01:04:10 executing program 5: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={0xffffffffffffffff}, 0x4) [ 1270.209016][T26847] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:10 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 5: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) accept$ax25(r2, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @netrom, @remote, @rose, @rose, @default, @bcast, @bcast]}, &(0x7f00000001c0)=0x48) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000040)={0x0, 0x1, 0xfffffffe, 0x6, &(0x7f0000000000)=[{0x4, 0x8, 0x1ff, 0x2}, {0x7, 0x1, 0x8, 0xfffc}, {0xfffb, 0x1f, 0x400, 0x100}, {0x5, 0x9, 0xbf, 0x9}, {0x7, 0x8, 0xa1, 0x363}, {0xfe00, 0x7, 0x7}]}) 01:04:10 executing program 1: socket$inet6_udp(0xa, 0x2, 0x0) 01:04:10 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 01:04:10 executing program 5: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0xcb) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 1: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)="64ac2090af5416d6ab85d0e77565d1942293cb50b54c2d26359be6efd398cfa1f64121ae1387e0eaf677cd0cd96bbb2e233822e0") ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() 01:04:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 01:04:10 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) accept$ax25(r2, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @netrom, @remote, @rose, @rose, @default, @bcast, @bcast]}, &(0x7f00000001c0)=0x48) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000040)={0x0, 0x1, 0xfffffffe, 0x6, &(0x7f0000000000)=[{0x4, 0x8, 0x1ff, 0x2}, {0x7, 0x1, 0x8, 0xfffc}, {0xfffb, 0x1f, 0x400, 0x100}, {0x5, 0x9, 0xbf, 0x9}, {0x7, 0x8, 0xa1, 0x363}, {0xfe00, 0x7, 0x7}]}) 01:04:10 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x10, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:04:10 executing program 0: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 01:04:10 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:10 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) accept$ax25(r2, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @netrom, @remote, @rose, @rose, @default, @bcast, @bcast]}, &(0x7f00000001c0)=0x48) getsockopt$ax25_int(r1, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) 01:04:10 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1270.590073][T26892] fuse: Bad value for 'group_id' [ 1270.600728][T26895] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:10 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:04:10 executing program 0: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)="64ac2090af5416d6ab85d0e77565d1942293cb50b54c2d26359be6efd398cfa1f64121ae1387e0eaf677cd0cd96bbb2e23") ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() [ 1270.793481][T26910] fuse: Bad value for 'group_id' 01:04:11 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:11 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:04:11 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) accept$ax25(r1, &(0x7f0000000140)={{0x3, @rose}, [@netrom, @netrom, @remote, @rose, @rose, @default, @bcast, @bcast]}, &(0x7f00000001c0)=0x48) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:11 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], 0x4, 0x2, 0x3}) 01:04:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:11 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(0xffffffffffffffff, &(0x7f0000000300)={{0x3, @bcast, 0x2}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1271.446499][T26920] fuse: Bad value for 'user_id' 01:04:11 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], 0x4, 0x2, 0x3}) 01:04:11 executing program 3: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:11 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, 0x0, 0x0) 01:04:11 executing program 0: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], 0x4, 0x2, 0x3}) [ 1271.554851][T26932] fuse: Bad value for 'user_id' 01:04:11 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, 0x0, 0x0) 01:04:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:11 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) 01:04:11 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 1271.649161][T26942] fuse: Bad value for 'user_id' 01:04:12 executing program 0: r0 = syz_open_dev$dri(0x0, 0x0, 0x100) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, 0x0, 0x0) 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], 0x4, 0x2, 0x3}) 01:04:12 executing program 3: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) [ 1271.813873][T26957] fuse: Bad value for 'user_id' 01:04:12 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:12 executing program 3: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], 0x4, 0x2, 0x3}) [ 1271.901996][T26968] fuse: Bad value for 'user_id' 01:04:12 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) [ 1271.953171][T26974] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de [ 1271.977291][T26972] fuse: Bad value for 'user_id' 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 3: syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f0000000380)={&(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:12 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 1272.013463][T26981] fuse: Bad value for 'user_id' 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000240)={&(0x7f0000000000)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[{}, {}, {}, {}], &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0], 0x4, 0x2, 0x3}) 01:04:12 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000300)={{0x3, @bcast}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x48) 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1272.044852][T26984] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [0x0], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={r3}) [ 1272.130078][T26994] fuse: Bad value for 'user_id' [ 1272.131112][T26989] fuse: Bad value for 'user_id' [ 1272.140249][T26995] ax25_connect(): syz-executor.4 uses autobind, please contact jreuter@yaina.de 01:04:12 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) 01:04:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) [ 1272.240806][T27004] fuse: Bad value for 'user_id' [ 1272.291410][T27009] fuse: Bad value for 'fd' 01:04:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, 0x0) [ 1272.321047][T27010] fuse: Bad value for 'user_id' 01:04:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1272.341595][T27013] fuse: Bad value for 'user_id' 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) 01:04:12 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x7, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1272.452416][T27022] fuse: Bad value for 'fd' 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1272.485633][T27028] fuse: Bad value for 'user_id' [ 1272.504310][T27031] fuse: Bad value for 'user_id' 01:04:12 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f00000002c0)={0x0, 0x9, 0x1, 0x1ff, 0x3, [], [0xa3, 0x5, 0x7fffffff, 0x61], [0x0, 0xfffffff9, 0xffffffff, 0x6], [0x3f, 0xf576, 0x0, 0x81]}) 01:04:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) 01:04:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:12 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:12 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:12 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1272.616502][T27039] fuse: Bad value for 'user_id' [ 1272.621172][T27042] fuse: Bad value for 'fd' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1272.689443][T27049] fuse: Bad value for 'user_id' 01:04:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1272.715763][T27053] fuse: Bad value for 'user_id' 01:04:13 executing program 2: syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0xc, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:13 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1272.802182][T27061] fuse: Bad value for 'user_id' 01:04:13 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:13 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) [ 1272.829822][T27060] fuse: Bad value for 'fd' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) [ 1272.924824][T27074] fuse: Bad value for 'user_id' 01:04:13 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 1272.989803][T27080] fuse: Bad value for 'fd' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1273.030908][T27086] fuse: Bad value for 'user_id' 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:13 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1273.141221][T27101] fuse: Bad value for 'fd' 01:04:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, 0x0, &(0x7f0000000100)) 01:04:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.164106][T27102] fuse: Bad value for 'user_id' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, 0x0, &(0x7f0000000100)) 01:04:13 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.270797][T27112] fuse: Bad value for 'user_id' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[r0, r0], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.294202][T27116] fuse: Bad value for 'fd' 01:04:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 01:04:13 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, 0x0, &(0x7f0000000100)) 01:04:13 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.357630][T27121] fuse: Bad value for 'user_id' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), 0x0) 01:04:13 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.405658][T27128] fuse: Bad value for 'user_id' [ 1273.423792][T27132] fuse: Bad value for 'fd' 01:04:13 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.476378][T27138] fuse: Bad value for 'user_id' 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:13 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), 0x0) [ 1273.514645][T27142] fuse: Bad value for 'user_id' 01:04:13 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1273.568129][T27145] fuse: Bad value for 'fd' [ 1273.583579][T27146] fuse: Bad value for 'user_id' 01:04:13 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1273.648112][T27153] fuse: Bad value for 'user_id' 01:04:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0xc, &(0x7f0000000080), 0x0) 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7f}}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) [ 1273.724398][T27161] fuse: Bad value for 'fd' 01:04:14 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 01:04:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:14 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x0, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x9, 0x41, 0x6, 0x80, 0x70, 0x2, 0x7cf2, 0x3, 0x40, 0x1, 0xfffffdd4, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) 01:04:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1273.821989][T27171] fuse: Bad value for 'user_id' 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x0, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)={'team0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, @jmp={0x5, 0x1, 0x7, 0x5, 0x3, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x10040000, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0x25, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000001240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x4, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r7, r8], 0x0, 0x10, 0x7}, 0x90) [ 1273.899459][T27183] fuse: Bad value for 'fd' 01:04:14 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x0, 0x0, &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1273.963522][T27190] fuse: Bad value for 'fd' 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)={'team0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, @jmp={0x5, 0x1, 0x7, 0x5, 0x3, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x10040000, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0x25, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000001240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x4, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r7, r8], 0x0, 0x10, 0x7}, 0x90) 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x0, &(0x7f0000000380), &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000001c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "af2797c4903f9ce9909028185caa82a21b4c5f67d9a6590b83fef1bdaa50af7e"}}) [ 1274.025802][T27199] fuse: Bad value for 'fd' 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x0, &(0x7f0000000380), &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) [ 1274.088577][T27203] fuse: Bad value for 'fd' 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)={'team0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, @jmp={0x5, 0x1, 0x7, 0x5, 0x3, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x10040000, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0x25, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000001240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x4, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r7, r8], 0x0, 0x10, 0x7}, 0x90) 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)={'team0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, @jmp={0x5, 0x1, 0x7, 0x5, 0x3, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x10040000, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0x25, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000001240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x4, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r7, r8], 0x0, 0x10, 0x7}, 0x90) 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x0, &(0x7f0000000380), &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) [ 1274.201641][T27213] fuse: Bad value for 'user_id' 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)={'team0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={0x1, 0xffffffffffffffff}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x8, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0x7}, @map_val={0x18, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80}, @jmp={0x5, 0x1, 0x7, 0x5, 0x3, 0xfffffffffffffff8, 0xffffffffffffffff}]}, &(0x7f0000000080)='GPL\x00', 0x10040000, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0x25, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000001240)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001280)={0x2, 0x4, 0x1000, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001300)=[r7, r8], 0x0, 0x10, 0x7}, 0x90) 01:04:14 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1274.248900][T27221] fuse: Bad value for 'fd' 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], &(0x7f00000003c0)='syzkaller\x00', 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1274.345300][T27231] fuse: Bad value for 'fd' 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000012c0)={0x1}, 0x4) [ 1274.371467][T27234] fuse: Bad value for 'user_id' 01:04:14 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x1, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1274.397725][T27233] fuse: Bad value for 'user_id' 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) 01:04:14 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0xd8, &(0x7f0000000400)=""/216, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x100, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) [ 1274.512347][T27245] fuse: Bad value for 'fd' [ 1274.520489][T27246] fuse: Bad value for 'user_id' [ 1274.532604][T27253] fuse: Bad value for 'user_id' 01:04:14 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:14 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r5, 0x0, 0x0) [ 1274.641726][T27260] fuse: Bad value for 'fd' 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) [ 1274.674525][T27267] fuse: Bad value for 'user_id' [ 1274.691620][T27266] fuse: Bad value for 'user_id' 01:04:15 executing program 3: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x1, 0x5, 0x10001, 0x80}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) 01:04:15 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1274.820979][T27283] fuse: Bad value for 'fd' 01:04:15 executing program 3: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r3 = accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r4 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r4, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001200)) 01:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, &(0x7f0000000580)=[{0x0, 0x5, 0xd, 0x1}, {0x5, 0x1, 0xc, 0xb}, {0x1, 0x3, 0x8, 0xa}, {0x3, 0x3, 0x6}, {0x2, 0x2, 0x8, 0xa}, {0x3, 0x4, 0x10, 0x4}, {0x3, 0x3, 0x10, 0xb}], 0x10, 0x2c}, 0x90) 01:04:15 executing program 3: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1274.915633][T27292] fuse: Bad value for 'user_id' [ 1274.918065][T27294] fuse: Bad value for 'fd' 01:04:15 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r3 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000000140)) 01:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2c}, 0x90) 01:04:15 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.035253][T27305] fuse: Bad value for 'fd' [ 1275.044077][T27306] fuse: Bad value for 'user_id' 01:04:15 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r3 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.144873][T27316] fuse: Bad value for 'user_id' 01:04:15 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1, 0x8, &(0x7f0000000380)=@raw=[@printk={@pointer}], 0x0}, 0x90) 01:04:15 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) r3 = socket(0x2, 0x2, 0x388) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000001400), &(0x7f0000001440)=0x6) [ 1275.165372][T27320] fuse: Bad value for 'fd' 01:04:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.210380][T27324] fuse: Bad value for 'fd' 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r1 = socket(0x1f, 0x5, 0x8) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f00000001c0)={0x1, 0xe2}, 0x2) socket(0x2, 0x2, 0x388) 01:04:15 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.279744][T27331] fuse: Bad value for 'fd' 01:04:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.317228][T27336] fuse: Bad value for 'fd' 01:04:15 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 1: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r0 = socket(0x1f, 0x5, 0x8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r0, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) socket(0x2, 0x2, 0x388) 01:04:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.375783][T27344] fuse: Bad value for 'fd' [ 1275.390675][T27346] fuse: Bad value for 'user_id' [ 1275.410474][T27349] fuse: Bad value for 'fd' 01:04:15 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.491962][T27356] fuse: Bad value for 'user_id' 01:04:15 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) r0 = socket(0x1f, 0x5, 0x8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) socket(0x2, 0x2, 0x388) 01:04:15 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.559154][T27364] fuse: Invalid rootmode 01:04:15 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.600862][T27368] fuse: Bad value for 'fd' [ 1275.624316][T27367] fuse: Bad value for 'user_id' 01:04:15 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:15 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) socket(0x1f, 0x5, 0x8) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) socket(0x2, 0x2, 0x388) 01:04:15 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.649986][T27374] fuse: Bad value for 'fd' 01:04:16 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.693408][T27377] fuse: Bad value for 'fd' 01:04:16 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) socket(0x1f, 0x5, 0x8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket(0x2, 0x2, 0x388) [ 1275.728173][T27378] fuse: Invalid rootmode 01:04:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.797130][T27385] fuse: Bad value for 'fd' 01:04:16 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) socket(0x1f, 0x5, 0x8) socket(0x2, 0x2, 0x388) 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.883039][T27394] fuse: Bad value for 'fd' [ 1275.900715][T27392] fuse: Invalid rootmode [ 1275.917633][T27397] fuse: Bad value for 'fd' 01:04:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x754280, 0x0) socket(0x2, 0x2, 0x388) 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1275.997810][T27402] fuse: Invalid rootmode 01:04:16 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.022650][T27408] fuse: Bad value for 'fd' [ 1276.042753][T27410] fuse: Bad value for 'user_id' 01:04:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: socket(0x2, 0x2, 0x388) 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.092923][T27414] fuse: Invalid rootmode 01:04:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: socket(0x0, 0x2, 0x388) [ 1276.135561][T27416] fuse: Bad value for 'fd' [ 1276.155004][T27424] fuse: Bad value for 'user_id' [ 1276.173067][T27426] fuse: Invalid rootmode 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.187630][T27421] fuse: Bad value for 'user_id' 01:04:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.267993][T27434] fuse: Bad value for 'user_id' [ 1276.284402][T27436] fuse: Bad value for 'user_id' 01:04:16 executing program 5: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: socket(0x0, 0x2, 0x388) 01:04:16 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.308805][T27439] fuse: Bad value for 'fd' 01:04:16 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.347384][T27438] fuse: Bad value for 'user_id' 01:04:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.385406][T27445] fuse: Bad value for 'user_id' 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.430459][T27448] fuse: Bad value for 'fd' 01:04:16 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: socket(0x0, 0x2, 0x388) 01:04:16 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.456201][T27452] fuse: Bad value for 'user_id' 01:04:16 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.489032][T27454] fuse: Bad value for 'user_id' [ 1276.490963][T27456] fuse: Bad value for 'user_id' 01:04:16 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), 0x0, 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.534336][T27460] fuse: Invalid rootmode 01:04:16 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:16 executing program 2: socket(0x2, 0x0, 0x388) 01:04:16 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.636544][T27471] fuse: Invalid rootmode [ 1276.645890][T27470] fuse: Bad value for 'user_id' [ 1276.668055][T27469] fuse: Bad value for 'user_id' 01:04:17 executing program 2: socket(0x2, 0x0, 0x0) 01:04:17 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.736910][T27479] fuse: Invalid rootmode 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.787082][T27489] fuse: Bad value for 'fd' [ 1276.806837][T27488] fuse: Bad value for 'user_id' [ 1276.812637][T27486] fuse: Bad value for 'user_id' 01:04:17 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1276.859295][T27493] fuse: Bad value for 'user_id' [ 1276.873128][T27494] fuse: Bad value for 'fd' 01:04:17 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 01:04:17 executing program 2: socket(0x2, 0x0, 0x0) [ 1276.927751][T27497] fuse: Bad value for 'user_id' [ 1276.968865][T27501] fuse: Bad value for 'user_id' [ 1276.976036][T27502] fuse: Bad value for 'user_id' [ 1276.993596][T27505] fuse: Bad value for 'fd' [ 1276.999706][T27506] fuse: Bad value for 'fd' 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x0, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 1: socket(0x2, 0x0, 0x0) 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.017948][T27507] fuse: Bad value for 'user_id' 01:04:17 executing program 3: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.140212][T27520] fuse: Bad value for 'fd' [ 1277.148492][T27519] fuse: Bad value for 'user_id' [ 1277.158534][T27522] fuse: Bad value for 'fd' 01:04:17 executing program 2: socket(0x2, 0x0, 0x0) 01:04:17 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.278333][T27526] fuse: Invalid rootmode [ 1277.287671][T27532] fuse: Bad value for 'user_id' [ 1277.311619][T27533] fuse: Bad value for 'user_id' 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 1: socket(0x2, 0x0, 0x0) 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 2: socket(0x2, 0x0, 0x0) [ 1277.443154][T27538] fuse: Invalid rootmode [ 1277.449759][T27543] fuse: Bad value for 'user_id' 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.489328][T27545] fuse: Invalid rootmode 01:04:17 executing program 4: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:17 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.552090][T27551] fuse: Bad value for 'user_id' 01:04:17 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 01:04:17 executing program 1: socket(0x2, 0x0, 0x0) 01:04:17 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.639478][T27557] fuse: Invalid rootmode [ 1277.651662][T27561] fuse: Bad value for 'fd' 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.680840][T27563] fuse: Bad value for 'user_id' 01:04:18 executing program 2: socket(0x2, 0x0, 0x0) 01:04:18 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.746513][T27566] fuse: Bad value for 'fd' 01:04:18 executing program 4: openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, 0x0, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.784648][T27570] fuse: Bad value for 'fd' 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1277.821645][T27574] fuse: Bad value for 'user_id' [ 1277.829151][T27575] fuse: Invalid rootmode 01:04:18 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 1: socket(0x0, 0x0, 0x0) [ 1277.912680][T27583] fuse: Bad value for 'fd' 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 2: socket(0x2, 0x0, 0x0) 01:04:18 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}, {@allow_other}, {@default_permissions}, {@blksize}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7f}}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 1: socket(0x0, 0x0, 0x0) 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f00000000c0)={0x4, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0]}) [ 1278.030196][T27585] fuse: Invalid rootmode [ 1278.037163][T27589] fuse: Bad value for 'user_id' [ 1278.067461][T27591] fuse: Bad value for 'fd' 01:04:18 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x27, 0x1, 0x2) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) r3 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x33, 0x3, 0x0, {0x6, 0x12, 0x0, '/proc/capi/capi20\x00'}}, 0x33) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x80) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1278.153766][T27602] fuse: Bad value for 'user_id' [ 1278.160165][T27604] fuse: Bad value for 'fd' 01:04:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f00000000c0)={0x4, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0]}) 01:04:18 executing program 1: socket(0x0, 0x0, 0x0) 01:04:18 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x27, 0x1, 0x2) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) r3 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x33, 0x3, 0x0, {0x6, 0x12, 0x0, '/proc/capi/capi20\x00'}}, 0x33) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x80) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) [ 1278.271799][T27612] fuse: Bad value for 'user_id' 01:04:18 executing program 2: socket(0x0, 0x0, 0x0) 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x64, 0x36, 0x64, 0x64, 0x35, 0x30], 0x2d, [0x36, 0x65, 0x5a, 0x63], 0x2d, [0x63, 0x32, 0x30, 0x39], 0x2d, [0x61, 0x36, 0x35, 0x51], 0x2d, [0x64, 0x31, 0x5e, 0x34, 0x66, 0x64, 0x36, 0x63]}}}]}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1278.324147][T27616] fuse: Bad value for 'fd' 01:04:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f00000000c0)={0x4, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0]}) 01:04:18 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 01:04:18 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x27, 0x1, 0x2) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) r3 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000040)={0x33, 0x3, 0x0, {0x6, 0x12, 0x0, '/proc/capi/capi20\x00'}}, 0x33) sendmsg$SMC_PNETID_GET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x80) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:18 executing program 2: socket(0x0, 0x0, 0x0) 01:04:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) [ 1278.448265][T27626] fuse: Bad value for 'user_id' 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f00000008c0)="a13d920101d0c679e12bbc3b89f65866e5ec5f6dd32c41530b15be36a32a09899d0283f15ab41b72875fccd5f41bce028e2ac880c6e340b396045c") [ 1278.484185][T27630] fuse: Bad value for 'fd' 01:04:18 executing program 0: syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 01:04:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) 01:04:18 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x27, 0x1, 0x2) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)={0x28}, 0x28) r2 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000040)={0x33, 0x3, 0x0, {0x6, 0x12, 0x0, '/proc/capi/capi20\x00'}}, 0x33) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x80}, 0x80) 01:04:18 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) [ 1278.570041][T27640] fuse: Bad value for 'user_id' 01:04:18 executing program 2: socket(0x0, 0x0, 0x0) 01:04:18 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28}, 0x28) r1 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x33, 0x3, 0x0, {0x6, 0x12, 0x0, '/proc/capi/capi20\x00'}}, 0x33) 01:04:18 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000700), &(0x7f0000000740)='./file0\x00', 0x1000480, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) [ 1278.604690][T27642] fuse: Bad value for 'fd' 01:04:18 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x420040) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28}, 0x28) r1 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) [ 1278.708514][T27657] fuse: Bad value for 'user_id' 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28}, 0x28) r1 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000040)={0x33, 0x3, 0x0, {0x6, 0x12, 0x0, '/proc/capi/capi20\x00'}}, 0x33) 01:04:19 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x5452, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28}, 0x28) socket(0x1d, 0x80000, 0x1) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28}, 0x28) r1 = socket(0x1d, 0x80000, 0x1) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000002c0)=0x6) 01:04:19 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@generic={&(0x7f0000000080)='./file0\x00'}, 0x18) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28}, 0x28) 01:04:19 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$RTC_UIE_ON(r0, 0x7003) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) 01:04:19 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) 01:04:19 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:04:19 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) 01:04:19 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x27, 0x1, 0x2) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) ioctl$RTC_WIE_ON(r9, 0x700f) 01:04:19 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:04:19 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 4: socket(0x27, 0x1, 0x2) 01:04:19 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r9, 0x7010) 01:04:19 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 01:04:19 executing program 4: socket(0x0, 0x1, 0x2) 01:04:19 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:19 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) 01:04:19 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:04:19 executing program 4: socket(0x0, 0x1, 0x2) 01:04:19 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:19 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:19 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r2, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r7}, 0x10) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r2, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r7}, 0x10) 01:04:20 executing program 5: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:20 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:04:20 executing program 4: socket(0x0, 0x1, 0x2) 01:04:20 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:04:20 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, 0x0) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020}, 0x2020) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 4: socket(0x27, 0x0, 0x2) 01:04:20 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) 01:04:20 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, 0x0) 01:04:20 executing program 4: socket(0x27, 0x0, 0x0) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r3, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r4}, 0x20) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) 01:04:20 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, 0x0) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020}, 0x2020) 01:04:20 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r2, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r4, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r5}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r5, {0x1}}, 0x18) read$FUSE(r2, &(0x7f0000000080)={0x2020}, 0x2020) 01:04:20 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:20 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r5, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r5, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r4, &(0x7f0000002100)={0x20, 0x0, r6}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r6, {0x1}}, 0x18) read$FUSE(r3, &(0x7f0000000080)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r3, &(0x7f0000002100)={0x20, 0x0, r7}, 0x20) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r3, &(0x7f0000004180)={0x10, 0xfffffffffffffff5, r8}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000100)={0x18, 0x0, r7, {0x1}}, 0x18) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r3, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r4}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r4, {0x1}}, 0x18) 01:04:20 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r1 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r3, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r2, &(0x7f0000002100)={0x20, 0x0, r4}, 0x20) write$FUSE_GETXATTR(r0, &(0x7f00000020c0)={0x18, 0x7fffffffffffffc9, r4, {0x1}}, 0x18) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r3}, 0x20) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r3}, 0x20) 01:04:20 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) 01:04:20 executing program 5: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000180)) 01:04:20 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x0, 0xfbfbfbfb}) 01:04:20 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000000), 0x2, 0x0) ioctl$RTC_UIE_ON(r1, 0x7003) 01:04:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28, 0x4, 0x0, {0x0, 0x17f}}, 0x28) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0x5452, 0x0) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20}, 0x20) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)={0x28}, 0x28) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) 01:04:20 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x0, 0xfbfbfbfb}) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0x541b, 0x0) 01:04:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28, 0x4, 0x0, {0x0, 0x17f}}, 0x28) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0x5452, 0x0) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20}, 0x20) 01:04:20 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000b40)={0x28}, 0x28) 01:04:20 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(0xffffffffffffffff, 0xc02064b9, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2, 0x0, 0xfbfbfbfb}) 01:04:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28, 0x4, 0x0, {0x0, 0x17f}}, 0x28) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0x5452, 0x0) 01:04:20 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0x541b, 0x0) 01:04:20 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:20 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000b40)={0x28}, 0x28) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20}, 0x20) 01:04:20 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28, 0x4, 0x0, {0x0, 0x17f}}, 0x28) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:04:20 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180), 0x2000, 0x0) 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0x541b, 0x0) 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_WIE_OFF(r1, 0x7010) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r3}, 0x20) 01:04:21 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28, 0x4, 0x0, {0x0, 0x17f}}, 0x28) r1 = geteuid() syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt={'uid>', r1}}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 01:04:21 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000b40)={0x28, 0x4, 0x0, {0x0, 0x17f}}, 0x28) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6) 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r1, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r1, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6) 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:21 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6) 01:04:21 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x6) 01:04:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000080)=[0x0, 0x0], &(0x7f0000000100)=[0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x541b, 0x0) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:21 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x4000c1, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x541b, 0x0) 01:04:21 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) 01:04:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:21 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x541b, 0x0) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r3}, 0x20) 01:04:21 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) 01:04:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) 01:04:21 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:21 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:21 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:21 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r2, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r1, &(0x7f0000002100)={0x20, 0x0, r3}, 0x20) 01:04:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:21 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) 01:04:22 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x6) 01:04:22 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x82, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x2001000, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:22 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6) 01:04:22 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x0, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:22 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6) 01:04:22 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) 01:04:22 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x0, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x6) 01:04:22 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:22 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) [ 1281.993887][T28008] fuse: Bad value for 'fd' 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) 01:04:22 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000380)=0x8001, 0x4) 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 3: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) 01:04:22 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x0, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000380)=0x8001, 0x4) 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x541b, 0x0) 01:04:22 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380)=0x8001, 0x4) [ 1282.208547][T28036] fuse: Bad value for 'fd' 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000380)=0x8001, 0x4) 01:04:22 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x541b, 0x0) 01:04:22 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)={{}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") [ 1282.314165][T28050] fuse: Bad value for 'fd' 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, 0x0, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 3: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x541b, 0x0) 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, 0x0, 0x0) [ 1282.394953][T28058] fuse: Bad value for 'fd' 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, 0x0, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r0, 0x0, 0x0) 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0xcab00, 0x0) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006200), 0x82, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x1}}, 0x18) 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, 0x0, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:22 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, 0x0, 0x0) 01:04:22 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 01:04:22 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r2}, 0x20) 01:04:22 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 01:04:22 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@max_read={'max_read', 0x3d, 0x5}}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:23 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 01:04:23 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:23 executing program 4: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)="64ac2090af5416d6ab85d0e77565d1942293cb50b54c2d26359be6ef") ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() 01:04:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, 0x0, 0x0) 01:04:23 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 01:04:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:23 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:23 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 01:04:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':[-#'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:23 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) getsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x6) 01:04:23 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x63, 0x34, 0x39, 0x34, 0x31, 0x36, 0x38], 0x2d, [0x37, 0x61, 0x62, 0x37], 0x2d, [0x64, 0x37, 0x38, 0x38], 0x2d, [0x36, 0x39, 0x0, 0x63], 0x2d, [0x32, 0x34, 0x30, 0x33, 0x36, 0x63, 0x64, 0x37]}}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") [ 1282.847032][T28107] fuse: Bad value for 'group_id' 01:04:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}, {@smackfsfloor={'smackfsfloor', 0x3d, '^'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:23 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) 01:04:23 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20}, 0x20) 01:04:23 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) 01:04:23 executing program 4: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:23 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}, {@uid_gt}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:23 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20}, 0x20) 01:04:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 4: sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00012abd7000fddbdf250100006d5713020002000000080001000100"/38], 0x2c}, 0x1, 0x0, 0x0, 0x20008004}, 0x15) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180), 0x10302, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x8cf, 0x8) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@dont_appraise}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) 01:04:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20}, 0x20) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) 01:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r3, 0xc01864b1, &(0x7f00000004c0)={r1, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@context={'context', 0x3d, 'user_u'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r3, 0xc01864b1, &(0x7f00000004c0)={r1, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) 01:04:24 executing program 5: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) 01:04:24 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r0, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [0x0, 0x0, 0x0, 0x0], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000200)={0x0, 0x4, 0x3, 0x5, 0x2, [r5], [0x1, 0x8, 0x10000, 0xfff], [0x3, 0x7ff, 0x2, 0x4], [0x4, 0xfffffffffffff327, 0x9, 0x7]}) 01:04:24 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r0, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 5: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) 01:04:24 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r0, &(0x7f00000041c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000002100)={0x20, 0x0, r1}, 0x20) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@smackfsroot={'smackfsroot', 0x3d, '/proc/capi/capi20\x00'}}]}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:24 executing program 5: setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r3, 0xc01864b1, &(0x7f00000004c0)={r1, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) 01:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x1, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, &(0x7f0000000280)="045cd43a66c981e0e9ce3a19aff190827c22c2cd9c7ad8a92b63b3f413a1256310db0efbfd23a07cdf65754f00fd39c4ec99cb8abd71503bdda645ea280f25286e1fa62b67edfc583b28a17c230c905d1180a835da5428601739f76f444debdd1461283233c8671714f8f993708dd996ce076c24e115a6564648b6eae604b67414fc47eca4e5daa9b3fbbe66c699e5bf5c") 01:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_OPEN(r0, 0x0, 0x0) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r3, 0xc01864b1, &(0x7f00000004c0)={r1, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) 01:04:24 executing program 1: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x2001000, &(0x7f0000000100)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, 0xee00}}, 0x0, 0x0, 0x0) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20}, 0x20) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) 01:04:24 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:24 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) socket(0x1f, 0x5, 0x8) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20}, 0x20) 01:04:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) socket$l2tp(0x2, 0x2, 0x73) 01:04:24 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) 01:04:25 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000b00), 0x2, 0x0) read$FUSE(r1, &(0x7f00000041c0)={0x2020}, 0x2020) write$FUSE_OPEN(r0, &(0x7f0000002100)={0x20}, 0x20) 01:04:25 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r2, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r3 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r3, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r3, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) ioctl$DRM_IOCTL_MODE_DIRTYFB(r4, 0xc01864b1, &(0x7f00000004c0)={r2, 0x4, 0xfffffff8, 0x0, 0xfffffffffffffffd}) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, &(0x7f0000000340)) ioctl$DRM_IOCTL_MODE_GETFB2(r1, 0xc06864ce, &(0x7f0000000180)={0x0, 0x8, 0x9, 0xfffffff8, 0x1, [], [0x6, 0x7, 0x80000000, 0x15513fd0], [0x9, 0x8, 0xa2a, 0x8], [0xffffffff, 0x20, 0x6, 0x8009]}) 01:04:25 executing program 5: syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x5, &(0x7f0000000380), 0x4) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000380), 0x4) 01:04:25 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) 01:04:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000380), 0x4) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)={0x0, 0x0, 0x0}) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={r3, 0x0, 0x8, 0xfffff001, 0x6}) r5 = syz_open_dev$dri(&(0x7f0000000300), 0x7, 0x18401) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, r3, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r5, 0xc06864ce, &(0x7f0000000400)={r6, 0x1, 0x3, 0x1, 0x3, [], [0x1, 0x10000, 0x8], [0x7, 0x3f, 0x1f, 0x7f], [0x7bd, 0x9, 0x8, 0x2]}) 01:04:25 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, &(0x7f0000000380), 0x4) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) socket(0x1f, 0x5, 0x8) 01:04:25 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)={0x0, 0x0, 0x0}) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={r3, 0x0, 0x8, 0xfffff001, 0x6}) r5 = syz_open_dev$dri(&(0x7f0000000300), 0x7, 0x18401) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, r3, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r5, 0xc06864ce, &(0x7f0000000400)={r6, 0x1, 0x3, 0x1, 0x3, [], [0x1, 0x10000, 0x8], [0x7, 0x3f, 0x1f, 0x7f], [0x7bd, 0x9, 0x8, 0x2]}) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) 01:04:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, 0x0, 0x0) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/class/retimer', 0x101902, 0x8e) 01:04:25 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)={0x0, 0x0, 0x0}) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={r3, 0x0, 0x8, 0xfffff001, 0x6}) r5 = syz_open_dev$dri(&(0x7f0000000300), 0x7, 0x18401) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, r3, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r5, 0xc06864ce, &(0x7f0000000400)={r6, 0x1, 0x3, 0x1, 0x3, [], [0x1, 0x10000, 0x8], [0x7, 0x3f, 0x1f, 0x7f], [0x7bd, 0x9, 0x8, 0x2]}) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) 01:04:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, 0x0, 0x0) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000440)={&(0x7f0000000140), 0xc, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="002f0000676f40ae8bc362cf6a877881b95a6d85e7cddc4862dbac8b04d4bb143f", @ANYRES16=0x0, @ANYBLOB="000229bd7000fedbdf250400000006000e000700000006001a004e240000140020d7fe88000000000000000000000000010108000a000302000008000c1c0300000008000b000300ac1eb65369163fc02a00"], 0x58}, 0x1, 0x0, 0x0, 0x40000044}, 0x1) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)={0x0, 0x0, 0x0}) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={r3, 0x0, 0x8, 0xfffff001, 0x6}) syz_open_dev$dri(&(0x7f0000000300), 0x7, 0x18401) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000380)={&(0x7f0000000340)=[0x0], 0x1, r3}) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) socket(0x1f, 0x5, 0x8) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r2, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x5, 0x0, 0x0) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)={0x0, 0x0, 0x0}) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={r3, 0x0, 0x8, 0xfffff001, 0x6}) syz_open_dev$dri(&(0x7f0000000300), 0x7, 0x18401) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) 01:04:25 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) 01:04:25 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r5, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r6, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r7, 0xc02064b9, &(0x7f0000000540)={&(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x2, r4, 0xdededede}) 01:04:25 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) r2 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000000), 0x2) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) 01:04:25 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)={0x0, 0x0, 0x0}) r4 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r4, 0xc01864b0, &(0x7f00000004c0)={r3, 0x0, 0x8, 0xfffff001, 0x6}) 01:04:25 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:25 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r5, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r6, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r7, 0xc02064b9, &(0x7f0000000540)={&(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x2, r4, 0xdededede}) 01:04:26 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) 01:04:26 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) socket(0x1f, 0x5, 0x8) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 0: socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000480), 0xa40, 0x0) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r5, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r6, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r7, 0xc02064b9, &(0x7f0000000540)={&(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x2, r4, 0xdededede}) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) 01:04:26 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r0, 0xc01864b1, &(0x7f0000000300)={r1, 0x0, 0x2, 0x5, &(0x7f00000002c0)=[{0x3f, 0x0, 0x9, 0x2}, {0x80, 0x3, 0x7}, {0x4, 0x0, 0x25c, 0x31d}, {0x5, 0x3, 0x1}, {0x6bf, 0x81, 0xfff9, 0x8001}]}) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x80086601, 0x0) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)) 01:04:26 executing program 3: socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) ioctl$DRM_IOCTL_MODE_GETPLANE(r0, 0xc02064b6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000100)=[0x0, 0x0]}) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r5, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r6, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r7, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r7, 0xc02064b9, &(0x7f0000000540)={&(0x7f00000004c0)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x2, r4, 0xdededede}) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [0x0, 0x0, 0x0], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [0x0, 0x0, 0x0], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000280)={0x0, 0xfffffc01, 0x2d2, 0xed, 0x2, [r1, 0x0, r2], [0x1, 0x5522, 0x200, 0x9], [0x101, 0xffffabca, 0x1800000, 0x2], [0x9, 0x0, 0x9, 0x2]}) ioctl$DRM_IOCTL_MODE_GETENCODER(r0, 0xc01464a6, &(0x7f0000000040)) 01:04:26 executing program 3: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000200)={0x0, 0x1ff, 0x100fff, 0x3, 0x0, [], [0xee9, 0x400, 0xffffffff, 0x7fffffff], [0x8, 0x5, 0x4, 0x4], [0x400, 0xf009, 0xffffffff, 0xffffffffffffffff]}) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r3, 0xc03064b7, &(0x7f0000000080)={r2, 0x0, 0x0, 0x0, 0x20, 0x20, 0x2, 0x10000, 0xff, 0x6, 0x20, 0x7}) 01:04:26 executing program 4: socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/dm_clone', 0x40, 0x75) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000180)={0x0, 0x3, 0x8, 0x10001, 0x1, [], [0x1, 0x60e, 0x1, 0x2], [0x9, 0x3, 0x1, 0x3f], [0xc64, 0xfff, 0x1, 0x101]}) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) 01:04:26 executing program 3: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x10, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r3, 0xc03064b7, &(0x7f0000000080)={r2, 0x0, 0x0, 0x0, 0x20, 0x20, 0x2, 0x10000, 0xff, 0x6, 0x20, 0x7}) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 01:04:26 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 3: openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)=@generic={&(0x7f00000000c0)='./file0\x00', 0x0, 0xc}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r3 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$DRM_IOCTL_MODE_SETPLANE(r3, 0xc03064b7, &(0x7f0000000080)={r2, 0x0, 0x0, 0x0, 0x20, 0x20, 0x2, 0x10000, 0xff, 0x6, 0x20, 0x7}) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 01:04:26 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 01:04:26 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) 01:04:26 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) 01:04:26 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) 01:04:26 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00'}, 0x10) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000040)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) 01:04:26 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) socket$l2tp(0x2, 0x2, 0x73) 01:04:26 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) 01:04:26 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00'}, 0x10) 01:04:26 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) 01:04:26 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) 01:04:27 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) 01:04:27 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = socket(0x22, 0x80000, 0x6) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x10, 0x70bd2b, 0x25dfdbfe, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) 01:04:27 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00'}, 0x10) 01:04:27 executing program 2: socket$l2tp(0x2, 0x2, 0x73) socket$l2tp(0x2, 0x2, 0x73) 01:04:27 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) 01:04:27 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r5, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r4, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r6 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000080)=[0x0], &(0x7f00000012c0)=[0x0, 0x0], &(0x7f0000001300)=[0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x6}) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f00000013c0)={r7, 0x2, 0x3ff, 0x3ff, 0x2bd, 0x1ff, 0x80000001}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r6, 0xc01064c8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000080)}) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000100)={r4, 0x0, 0x0, "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"}) 01:04:27 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, 0x0) 01:04:27 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) 01:04:27 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socket(0x22, 0x80000, 0x6) 01:04:27 executing program 2: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, &(0x7f0000000400)) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() 01:04:27 executing program 0: socket(0x22, 0x80000, 0x6) 01:04:27 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r5, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r4, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r6 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000080)=[0x0], &(0x7f00000012c0)=[0x0, 0x0], &(0x7f0000001300)=[0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x6}) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f00000013c0)={r7, 0x2, 0x3ff, 0x3ff, 0x2bd, 0x1ff, 0x80000001}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r6, 0xc01064c8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000080)}) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000100)={r4, 0x0, 0x0, "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"}) 01:04:27 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) 01:04:27 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) 01:04:27 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) 01:04:27 executing program 0: socket(0x0, 0x80000, 0x6) 01:04:27 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) bind$ax25(r5, &(0x7f0000000400)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 01:04:27 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r5 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r5, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r4, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r6 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r6, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000080)=[0x0], &(0x7f00000012c0)=[0x0, 0x0], &(0x7f0000001300)=[0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x6}) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f00000013c0)={r7, 0x2, 0x3ff, 0x3ff, 0x2bd, 0x1ff, 0x80000001}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r6, 0xc01064c8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000080)}) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000100)={r4, 0x0, 0x0, "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"}) 01:04:27 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)) [ 1287.013027][T28509] fuse: Bad value for 'group_id' 01:04:27 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x8000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) 01:04:27 executing program 5: socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 0: socket(0x0, 0x80000, 0x6) 01:04:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r4, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r3, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r5 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000080)=[0x0], &(0x7f00000012c0)=[0x0, 0x0], &(0x7f0000001300)=[0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x6}) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f00000013c0)={r6, 0x2, 0x3ff, 0x3ff, 0x2bd, 0x1ff, 0x80000001}) ioctl$DRM_IOCTL_MODE_GET_LEASE(r5, 0xc01064c8, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000000080)}) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='afs_reload_dir\x00', r0}, 0x10) 01:04:28 executing program 5: socketpair(0x0, 0x2, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000080), 0x4003) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x4, &(0x7f0000000040)) 01:04:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) 01:04:28 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r4, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r3, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r5 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000080)=[0x0], &(0x7f00000012c0)=[0x0, 0x0], &(0x7f0000001300)=[0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x6}) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0xc01c64ae, &(0x7f00000013c0)={r6, 0x2, 0x3ff, 0x3ff, 0x2bd, 0x1ff, 0x80000001}) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000080), 0x4003) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x4, &(0x7f0000000040)) 01:04:28 executing program 5: socketpair(0x0, 0x2, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 0: socket(0x0, 0x80000, 0x6) 01:04:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r4, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r3, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) r5 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r5, 0xc04064a0, &(0x7f0000001380)={&(0x7f0000000080)=[0x0], &(0x7f00000012c0)=[0x0, 0x0], &(0x7f0000001300)=[0x0], &(0x7f0000001340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x1, 0x6}) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r2, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, 0x0}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000480), r1) ioctl$DRM_IOCTL_MODE_SETPLANE(r0, 0xc03064b7, &(0x7f00000001c0)={r3, 0x0, r4, 0x38, 0x5, 0x7, 0xa086, 0x8ac0, 0x40, 0x1, 0xdb, 0x2}) syz_init_net_socket$ax25(0x3, 0x3, 0x0) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000080), 0x4003) ptrace$getenv(0x4201, 0xffffffffffffffff, 0x4, &(0x7f0000000040)) 01:04:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r4, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r3, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000040), 0x200000, 0x0) 01:04:28 executing program 0: socket(0x22, 0x0, 0x6) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) ptrace$ARCH_GET_MAX_TAG_BITS(0x1e, 0xffffffffffffffff, &(0x7f0000000080), 0x4003) 01:04:28 executing program 5: socketpair(0x0, 0x2, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 0: socket(0x22, 0x0, 0x0) 01:04:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x7, 0x7, 0x5, 0x4}) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r3 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) r4 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r4, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) sendto$ax25(r3, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) 01:04:28 executing program 0: socket(0x22, 0x0, 0x0) 01:04:28 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r1, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) 01:04:28 executing program 0: socket(0x22, 0x0, 0x0) 01:04:28 executing program 5: socketpair(0x1, 0x0, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r3, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:28 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:28 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$ax25(r0, &(0x7f0000000340)={{0x3, @netrom}, [@null, @default, @rose, @bcast, @remote, @remote, @null, @netrom]}, &(0x7f00000003c0)=0x48, 0x80000) 01:04:28 executing program 0: socket(0x22, 0x0, 0x0) 01:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) setpgid(0x0, 0x0) 01:04:28 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:28 executing program 0: socket(0x22, 0x0, 0x0) 01:04:28 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:28 executing program 2: setpgid(0x0, 0x0) 01:04:28 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:28 executing program 4: socketpair(0x1, 0x2, 0x1f, &(0x7f0000000300)) 01:04:28 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:28 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:28 executing program 0: socket(0x22, 0x0, 0x0) 01:04:28 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:28 executing program 5: socketpair(0x1, 0x0, 0x1f, 0x0) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 0: socket(0x0, 0x0, 0x0) 01:04:29 executing program 4: socketpair(0x0, 0x2, 0x1f, &(0x7f0000000300)) 01:04:29 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 5: socketpair(0x1, 0x0, 0x1f, 0x0) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r3, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r1, 0x40043d04, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 5: socketpair(0x1, 0x0, 0x1f, 0x0) 01:04:29 executing program 0: socket(0x0, 0x0, 0x0) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r3, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 4: socketpair(0x0, 0x2, 0x1f, &(0x7f0000000300)) 01:04:29 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r3, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 0: socket(0x0, 0x0, 0x0) 01:04:29 executing program 5: socket(0x0, 0x0, 0x0) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r2, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 4: socketpair(0x0, 0x2, 0x1f, &(0x7f0000000300)) 01:04:29 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r2, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r1, 0x5421, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r2, 0x43403d05, &(0x7f0000001400)={0x8}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_seqnum', 0x18000, 0x9) syz_init_net_socket$ax25(0x3, 0x5, 0x0) r3 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r3, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 4: socketpair(0x1, 0x0, 0x1f, &(0x7f0000000300)) 01:04:29 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@raw=[@map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x81}, @ldst={0x2, 0x1, 0x0, 0x4, 0xb, 0x4, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x52e1, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x60, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x1000, 0x2}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f00000002c0)=[{0x2, 0x4, 0x1, 0xb}, {0x4, 0x2, 0x10, 0x6}, {0x2, 0x1, 0x0, 0x9}, {0x1, 0x4, 0xf}, {0x1, 0x4, 0x5, 0x8}], 0x10, 0x8}, 0x90) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r1, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:29 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:29 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r0, 0x80503d01, &(0x7f0000001180)) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r1, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:29 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:29 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:29 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:29 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) r1 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r1, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:30 executing program 4: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:30 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000300)) 01:04:30 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x400002, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:30 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) 01:04:30 executing program 4: socketpair(0x1, 0x0, 0x1f, 0x0) 01:04:30 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:30 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x8) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:30 executing program 4: socketpair(0x1, 0x0, 0x1f, 0x0) 01:04:30 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) 01:04:30 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:30 executing program 4: socketpair(0x1, 0x0, 0x1f, 0x0) 01:04:30 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:30 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:31 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 2: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:31 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000300)) 01:04:31 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:31 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:31 executing program 5: socketpair(0x1, 0x0, 0x0, 0x0) 01:04:31 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:31 executing program 4: read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:31 executing program 5: socketpair(0x1, 0x0, 0x0, 0x0) 01:04:31 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:31 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:32 executing program 4: read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:32 executing program 5: socketpair(0x1, 0x0, 0x0, 0x0) 01:04:32 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:32 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:32 executing program 4: read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 3: syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(0xffffffffffffffff, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:32 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:32 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000001280)) 01:04:32 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000001280)) 01:04:32 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:32 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:32 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:32 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, 0x0, &(0x7f0000001280)) 01:04:33 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, 0x0) 01:04:33 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:33 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:33 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:33 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, 0x0) 01:04:33 executing program 4: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:33 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, 0x0) 01:04:33 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:33 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:33 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:33 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, 0x0) 01:04:33 executing program 3: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, &(0x7f0000000040)=""/44, 0x2c) 01:04:33 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:33 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:33 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x8) getsockname$ax25(r0, &(0x7f0000001200)={{0x3, @bcast}, [@netrom, @remote, @null, @rose, @default, @rose, @rose, @netrom]}, &(0x7f0000001280)=0xffffffbe) 01:04:33 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x541b, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000040)={0x0, 0x6, 0x1, 0x5, 0x0, [0x0, 0x0, 0x0], [0xfe, 0x4, 0x0, 0x7fffffff], [0xdb22ab0, 0x8000, 0x7, 0x1000], [0x2, 0x30ceb7f4, 0x100000001, 0x4]}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f0000000100)={0x0, 0xfffffffa, 0x3, 0x2, 0x2, [r1, 0x0, r2], [0x5, 0x5, 0x4b, 0x8], [0x1, 0xfff, 0x0, 0x7ff], [0x200, 0xfffffffffffffffc, 0x2, 0x9]}) 01:04:33 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000080)={0x86c, @multicast}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000140)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x20}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000100), 0xffffffffffffffff) 01:04:34 executing program 3: pause() ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0xc01c64ae, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/cec', 0x0, 0x154) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANE(0xffffffffffffffff, 0xc02064b6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000140)=[0x0, 0x0, 0x0]}) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) read$FUSE(r2, &(0x7f0000001e40)={0x2020, 0x0, 0x0, 0x0}, 0x2020) read$FUSE(0xffffffffffffffff, 0x0, 0x0) geteuid() syz_mount_image$fuse(0x0, 0x0, 0x200048, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfshat={'smackfshat', 0x3d, '/proc/capi/capi20\x00'}}, {@appraise_type}, {@flag='ro'}, {@smackfsdef={'smackfsdef', 0x3d, 'fuse\x00'}}, {@fowner_eq}]}}, 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x4008, &(0x7f0000000640)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@default_permissions}, {@default_permissions}, {@default_permissions}], [{@flag='async'}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@fsmagic}, {@subj_role={'subj_role', 0x3d, '@]\x8b\xaekp\xab]\x90]E\r\x15\x036\x8e\xa3\xacv\x92l/\xc1\xa8S\xddc\xec\xeb\xf5\xba\x00\x00\x8a~\xd0\x1f,P\xa7\xd0\xe6\x8f~\xe6J\x02\xc3\x13\xa1\xbd\xba\xbdt\xbb\xceX.\xcb\r\xda'}}]}}, 0x1, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r0, 0xc02064b9, &(0x7f00000001c0)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], 0x7, r1, 0xbbbbbbbb}) geteuid() 01:04:34 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x1, 0x1, 0x4, 0x1}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x202, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000300)={&(0x7f0000000080), &(0x7f0000000380)=[{}], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x1, 0x8, 0x0, 0x0, r1}) [ 1293.788402][T28893] fuse: Bad value for 'group_id' 01:04:34 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:34 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x1, 0x1, 0x4, 0x1}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x202, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000300)={&(0x7f0000000080), &(0x7f0000000380)=[{}], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x1, 0x8, 0x0, 0x0, r1}) 01:04:34 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:34 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x1, 0x1, 0x4, 0x1}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x202, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r2, 0xc05064a7, &(0x7f0000000300)={&(0x7f0000000080), &(0x7f0000000380)=[{}], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x1, 0x8, 0x0, 0x0, r1}) 01:04:34 executing program 5: read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:34 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:34 executing program 5: read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:34 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:34 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x1, 0x1, 0x4, 0x1}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x202, 0x0) 01:04:34 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5421, 0x0) 01:04:34 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x401c5820, 0x0) 01:04:34 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000002c0)={&(0x7f00000001c0)=[0x0], &(0x7f0000000200)=[0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0], 0x1, 0x1, 0x4, 0x1}) 01:04:35 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x106}}, 0x20) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000480), r3) r4 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_LISTALL(r3, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, r4, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040001}, 0x20000010) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f00000000c0)={0x8, 0x120, 0xfa00, {0x2, {0xd96, 0x4, "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", 0x80, 0x0, 0x5, 0x7, 0x9, 0x3f, 0xe0}, r2}}, 0x128) 01:04:35 executing program 5: read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:35 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5452, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) 01:04:35 executing program 0: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:35 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:35 executing program 1: read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:35 executing program 2: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x240103, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) 01:04:35 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:35 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:35 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) 01:04:35 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 01:04:35 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) 01:04:35 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:35 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) 01:04:35 executing program 1: read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:35 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:36 executing program 2: openat$drirender128(0xffffffffffffff9c, 0x0, 0x81, 0x0) 01:04:36 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:36 executing program 1: read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:36 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) 01:04:36 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 01:04:36 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040), 0x131b00, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x5451, 0x0) 01:04:36 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:36 executing program 0: bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) 01:04:36 executing program 2: openat$drirender128(0xffffffffffffff9c, 0x0, 0x81, 0x0) 01:04:36 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) (fail_nth: 1) 01:04:36 executing program 2: openat$drirender128(0xffffffffffffff9c, 0x0, 0x81, 0x0) 01:04:36 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:36 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:36 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:36 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) [ 1296.322649][T28970] FAULT_INJECTION: forcing a failure. [ 1296.322649][T28970] name fail_usercopy, interval 1, probability 0, space 0, times 0 01:04:36 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) 01:04:36 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, 0x0, 0x0) [ 1296.365408][T28970] CPU: 1 PID: 28970 Comm: syz-executor.4 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1296.375493][T28970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1296.385551][T28970] Call Trace: [ 1296.388836][T28970] [ 1296.391775][T28970] dump_stack_lvl+0x125/0x1b0 [ 1296.396471][T28970] should_fail_ex+0x496/0x5b0 [ 1296.401163][T28970] _copy_to_user+0x30/0xb0 [ 1296.405613][T28970] simple_read_from_buffer+0xd0/0x150 01:04:36 executing program 3: ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) [ 1296.411004][T28970] proc_fail_nth_read+0x1b0/0x280 [ 1296.416052][T28970] ? proc_sessionid_read+0x280/0x280 [ 1296.421359][T28970] ? security_file_permission+0xdc/0x100 [ 1296.427002][T28970] ? proc_sessionid_read+0x280/0x280 [ 1296.432297][T28970] vfs_read+0x1ce/0x8f0 [ 1296.436468][T28970] ? kernel_read+0x1b0/0x1b0 [ 1296.441072][T28970] ? __fget_files+0x1c6/0x340 [ 1296.445773][T28970] ksys_read+0x12f/0x250 [ 1296.450034][T28970] ? vfs_write+0xdf0/0xdf0 [ 1296.454461][T28970] ? syscall_enter_from_user_mode+0x26/0x80 [ 1296.460367][T28970] do_syscall_64+0x3f/0x110 01:04:36 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 1296.464878][T28970] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1296.470778][T28970] RIP: 0033:0x7f0f9bc7b78c [ 1296.475194][T28970] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1296.494801][T28970] RSP: 002b:00007f0f9cab40c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1296.503207][T28970] RAX: ffffffffffffffda RBX: 00007f0f9bd9bf80 RCX: 00007f0f9bc7b78c 01:04:36 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) 01:04:36 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) (fail_nth: 1) [ 1296.511164][T28970] RDX: 000000000000000f RSI: 00007f0f9cab4130 RDI: 0000000000000004 [ 1296.519125][T28970] RBP: 00007f0f9cab4120 R08: 0000000000000000 R09: 0000000000000000 [ 1296.527110][T28970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1296.535349][T28970] R13: 000000000000000b R14: 00007f0f9bd9bf80 R15: 00007fffaaa58e28 [ 1296.543341][T28970] 01:04:36 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) 01:04:36 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:36 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:36 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 01:04:36 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 01:04:36 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:36 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:37 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) 01:04:37 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop2', 0xa000, 0x4) sendmsg$SMC_PNETID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x1800}, 0xc0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000080)) 01:04:37 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 1) 01:04:37 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) [ 1296.755160][T29009] FAULT_INJECTION: forcing a failure. [ 1296.755160][T29009] name failslab, interval 1, probability 0, space 0, times 0 [ 1296.780983][T29009] CPU: 1 PID: 29009 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1296.791110][T29009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1296.801195][T29009] Call Trace: [ 1296.804479][T29009] [ 1296.807406][T29009] dump_stack_lvl+0x125/0x1b0 [ 1296.812086][T29009] should_fail_ex+0x496/0x5b0 [ 1296.816760][T29009] should_failslab+0x9/0x20 [ 1296.821256][T29009] kmem_cache_alloc+0x325/0x3a0 [ 1296.826119][T29009] getname_flags.part.0+0x50/0x4e0 [ 1296.831242][T29009] getname+0x90/0xe0 [ 1296.835131][T29009] do_sys_openat2+0x100/0x1e0 [ 1296.839817][T29009] ? build_open_flags+0x690/0x690 [ 1296.844848][T29009] ? __fget_files+0x1c6/0x340 [ 1296.849555][T29009] __x64_sys_openat+0x175/0x210 [ 1296.854408][T29009] ? __ia32_sys_open+0x1e0/0x1e0 [ 1296.859346][T29009] ? ksys_write+0x1a7/0x250 [ 1296.863852][T29009] ? syscall_enter_from_user_mode+0x26/0x80 [ 1296.869746][T29009] do_syscall_64+0x3f/0x110 [ 1296.874244][T29009] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1296.880135][T29009] RIP: 0033:0x7fc4cfe7cae9 [ 1296.884564][T29009] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1296.904205][T29009] RSP: 002b:00007fc4d0c2a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1296.912623][T29009] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7cae9 [ 1296.920593][T29009] RDX: 0000000000000081 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1296.928576][T29009] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 [ 1296.936632][T29009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1296.944610][T29009] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1296.952593][T29009] [ 1297.430337][T28989] FAULT_INJECTION: forcing a failure. [ 1297.430337][T28989] name failslab, interval 1, probability 0, space 0, times 0 [ 1297.443176][T28989] CPU: 0 PID: 28989 Comm: syz-executor.5 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1297.453254][T28989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1297.463295][T28989] Call Trace: [ 1297.466558][T28989] [ 1297.469483][T28989] dump_stack_lvl+0x125/0x1b0 [ 1297.474155][T28989] should_fail_ex+0x496/0x5b0 [ 1297.478825][T28989] should_failslab+0x9/0x20 [ 1297.483333][T28989] kmem_cache_alloc+0x325/0x3a0 [ 1297.488174][T28989] taskstats_exit+0x611/0xba0 [ 1297.492840][T28989] ? cgroupstats_user_cmd+0x450/0x450 [ 1297.498205][T28989] ? hrtimer_try_to_cancel+0x3a/0x4b0 [ 1297.503606][T28989] do_exit+0x832/0x2a20 [ 1297.507762][T28989] ? get_signal+0x935/0x2790 [ 1297.512364][T28989] ? mm_update_next_owner+0x840/0x840 [ 1297.517732][T28989] ? do_raw_spin_lock+0x12e/0x2b0 [ 1297.522765][T28989] ? spin_bug+0x1d0/0x1d0 [ 1297.527091][T28989] do_group_exit+0xd4/0x2a0 [ 1297.531603][T28989] get_signal+0x23ba/0x2790 [ 1297.536093][T28989] ? exit_signals+0x920/0x920 [ 1297.540754][T28989] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1297.546664][T28989] arch_do_signal_or_restart+0x90/0x7f0 [ 1297.552235][T28989] ? get_sigframe_size+0x20/0x20 [ 1297.557173][T28989] ? ksys_read+0x1a7/0x250 [ 1297.561594][T28989] exit_to_user_mode_prepare+0x11f/0x240 [ 1297.567267][T28989] syscall_exit_to_user_mode+0x1d/0x60 [ 1297.572806][T28989] do_syscall_64+0x4b/0x110 [ 1297.577333][T28989] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1297.583261][T28989] RIP: 0033:0x7f505da7cae9 [ 1297.587680][T28989] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1297.607339][T28989] RSP: 002b:00007f505e74e0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1297.615765][T28989] RAX: fffffffffffffe00 RBX: 00007f505db9bf80 RCX: 00007f505da7cae9 01:04:37 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:37 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:37 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 2) 01:04:37 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, 0x0, 0x0) 01:04:37 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop2', 0xa000, 0x4) sendmsg$SMC_PNETID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x1800}, 0xc0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000080)) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop2', 0xa000, 0x4) (async) sendmsg$SMC_PNETID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x1800}, 0xc0) (async) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) (async) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000080)) (async) 01:04:37 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) [ 1297.623746][T28989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1297.631755][T28989] RBP: 00007f505e74e120 R08: 0000000000000000 R09: 0000000000000000 [ 1297.639757][T28989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1297.647744][T28989] R13: 000000000000000b R14: 00007f505db9bf80 R15: 00007ffc460049e8 [ 1297.655852][T28989] 01:04:38 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:38 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) 01:04:38 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop2', 0xa000, 0x4) sendmsg$SMC_PNETID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x1800}, 0xc0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) (async) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000080)) 01:04:38 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(0xffffffffffffffff, 0x0, 0x0) [ 1297.751446][T29026] FAULT_INJECTION: forcing a failure. [ 1297.751446][T29026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1297.782324][T29026] CPU: 1 PID: 29026 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 01:04:38 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0]}, 0x40) 01:04:38 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0]}, 0x40) [ 1297.792474][T29026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1297.802551][T29026] Call Trace: [ 1297.805844][T29026] [ 1297.808788][T29026] dump_stack_lvl+0x125/0x1b0 [ 1297.813499][T29026] should_fail_ex+0x496/0x5b0 [ 1297.818194][T29026] strncpy_from_user+0x38/0x300 [ 1297.823068][T29026] getname_flags.part.0+0x93/0x4e0 [ 1297.828207][T29026] getname+0x90/0xe0 [ 1297.832125][T29026] do_sys_openat2+0x100/0x1e0 [ 1297.836815][T29026] ? build_open_flags+0x690/0x690 [ 1297.841852][T29026] ? __fget_files+0x1c6/0x340 [ 1297.846550][T29026] __x64_sys_openat+0x175/0x210 [ 1297.851447][T29026] ? __ia32_sys_open+0x1e0/0x1e0 [ 1297.856396][T29026] ? ksys_write+0x1a7/0x250 [ 1297.860920][T29026] ? syscall_enter_from_user_mode+0x26/0x80 [ 1297.866845][T29026] do_syscall_64+0x3f/0x110 [ 1297.871365][T29026] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1297.877276][T29026] RIP: 0033:0x7fc4cfe7cae9 [ 1297.881702][T29026] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1297.901337][T29026] RSP: 002b:00007fc4d0c2a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1297.909751][T29026] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7cae9 [ 1297.917725][T29026] RDX: 0000000000000081 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1297.925703][T29026] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 [ 1297.933685][T29026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1297.941664][T29026] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1297.949738][T29026] 01:04:38 executing program 3: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) 01:04:38 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 01:04:38 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:38 executing program 1: openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(0xffffffffffffffff, 0x40049409, 0x0) 01:04:38 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 3) 01:04:38 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x204001, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:39 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) 01:04:39 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) (async) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) (async) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) [ 1298.681360][T29049] FAULT_INJECTION: forcing a failure. [ 1298.681360][T29049] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.709284][T29049] CPU: 1 PID: 29049 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1298.719453][T29049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 01:04:39 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x204001, 0x0) read$ptp(r0, 0x0, 0x0) [ 1298.729527][T29049] Call Trace: [ 1298.732828][T29049] [ 1298.735783][T29049] dump_stack_lvl+0x125/0x1b0 [ 1298.740504][T29049] should_fail_ex+0x496/0x5b0 [ 1298.745205][T29049] should_failslab+0x9/0x20 [ 1298.749732][T29049] kmem_cache_alloc+0x325/0x3a0 [ 1298.754609][T29049] alloc_empty_file+0x73/0x1d0 [ 1298.759402][T29049] path_openat+0xdd/0x2c40 [ 1298.763840][T29049] ? path_lookupat+0x770/0x770 [ 1298.768614][T29049] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1298.774616][T29049] do_filp_open+0x1de/0x430 01:04:39 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/block/loop2', 0xa000, 0x4) sendmsg$SMC_PNETID_GET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x10, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6erspan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x1800}, 0xc0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) ioctl$DRM_IOCTL_MODE_GETFB(0xffffffffffffffff, 0xc01c64ad, &(0x7f0000000080)) [ 1298.779131][T29049] ? may_open_dev+0xf0/0xf0 [ 1298.783659][T29049] ? _raw_spin_unlock+0x28/0x40 [ 1298.788525][T29049] ? alloc_fd+0x2da/0x6c0 [ 1298.792871][T29049] do_sys_openat2+0x176/0x1e0 [ 1298.797564][T29049] ? build_open_flags+0x690/0x690 [ 1298.802605][T29049] ? __fget_files+0x1c6/0x340 [ 1298.807299][T29049] __x64_sys_openat+0x175/0x210 [ 1298.812174][T29049] ? __ia32_sys_open+0x1e0/0x1e0 [ 1298.817147][T29049] ? ksys_write+0x1a7/0x250 [ 1298.821682][T29049] ? syscall_enter_from_user_mode+0x26/0x80 [ 1298.827620][T29049] do_syscall_64+0x3f/0x110 01:04:39 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) (fail_nth: 1) 01:04:39 executing program 4: syz_init_net_socket$ax25(0x3, 0x5, 0x0) (async) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) [ 1298.832148][T29049] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1298.838082][T29049] RIP: 0033:0x7fc4cfe7cae9 [ 1298.842528][T29049] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1298.862158][T29049] RSP: 002b:00007fc4d0c2a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1298.870592][T29049] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7cae9 01:04:39 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) (fail_nth: 1) 01:04:39 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (fail_nth: 1) 01:04:39 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) read$ptp(r0, &(0x7f0000000040)=""/30, 0x1e) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) [ 1298.878585][T29049] RDX: 0000000000000081 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1298.886586][T29049] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 [ 1298.894573][T29049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1298.902556][T29049] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1298.910562][T29049] 01:04:39 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x204001, 0x0) read$ptp(r0, 0x0, 0x0) (async) read$ptp(r0, 0x0, 0x0) 01:04:39 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 4) 01:04:39 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) (async) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) read$ptp(r0, &(0x7f0000000040)=""/30, 0x1e) (async) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) 01:04:39 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x281c0, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x426400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f00000000c0)={0x15}) read$ptp(r0, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000400)={0x68}) [ 1298.990801][T29071] FAULT_INJECTION: forcing a failure. [ 1298.990801][T29071] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1299.019182][T29074] FAULT_INJECTION: forcing a failure. [ 1299.019182][T29074] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.031850][T29077] FAULT_INJECTION: forcing a failure. [ 1299.031850][T29077] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.031880][T29077] CPU: 1 PID: 29077 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1299.031899][T29077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1299.031909][T29077] Call Trace: [ 1299.031915][T29077] [ 1299.031923][T29077] dump_stack_lvl+0x125/0x1b0 [ 1299.031955][T29077] should_fail_ex+0x496/0x5b0 [ 1299.031978][T29077] should_failslab+0x9/0x20 [ 1299.031999][T29077] __kmem_cache_alloc_node+0x2e8/0x330 [ 1299.032018][T29077] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1299.032038][T29077] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1299.032055][T29077] __kmalloc+0x4f/0x100 [ 1299.032076][T29077] tomoyo_realpath_from_path+0xb9/0x710 [ 1299.032094][T29077] ? tomoyo_profile+0x47/0x60 [ 1299.032119][T29077] tomoyo_path_number_perm+0x241/0x580 [ 1299.121378][T29077] ? tomoyo_path_number_perm+0x22e/0x580 [ 1299.127030][T29077] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1299.132864][T29077] ? __fget_files+0x1c1/0x340 [ 1299.138850][T29077] ? reacquire_held_locks+0x4b0/0x4b0 [ 1299.144242][T29077] security_file_ioctl+0x72/0xb0 [ 1299.149218][T29077] __x64_sys_ioctl+0xbb/0x210 [ 1299.153917][T29077] do_syscall_64+0x3f/0x110 [ 1299.158429][T29077] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1299.164339][T29077] RIP: 0033:0x7fe9e667cae9 [ 1299.168763][T29077] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1299.188384][T29077] RSP: 002b:00007fe9e74c10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1299.196799][T29077] RAX: ffffffffffffffda RBX: 00007fe9e679bf80 RCX: 00007fe9e667cae9 [ 1299.204769][T29077] RDX: 0000000000000000 RSI: 0000000040049409 RDI: 0000000000000003 [ 1299.212757][T29077] RBP: 00007fe9e74c1120 R08: 0000000000000000 R09: 0000000000000000 [ 1299.220747][T29077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1299.228740][T29077] R13: 000000000000000b R14: 00007fe9e679bf80 R15: 00007ffd6157fe28 [ 1299.236729][T29077] [ 1299.249465][T29071] CPU: 0 PID: 29071 Comm: syz-executor.0 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1299.259642][T29071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1299.269747][T29071] Call Trace: [ 1299.273073][T29071] [ 1299.276053][T29071] dump_stack_lvl+0x125/0x1b0 [ 1299.280776][T29071] should_fail_ex+0x496/0x5b0 [ 1299.285486][T29071] _copy_from_user+0x30/0xf0 [ 1299.290119][T29071] __sys_bpf+0x210/0x4e80 [ 1299.294496][T29071] ? ksys_write+0x214/0x250 [ 1299.299052][T29071] ? bpf_perf_link_attach+0x540/0x540 [ 1299.304464][T29071] ? vfs_write+0x14c/0xdf0 [ 1299.308930][T29071] ? __mutex_unlock_slowpath+0x165/0x640 [ 1299.314622][T29071] ? bit_wait_io_timeout+0x160/0x160 [ 1299.319989][T29071] ? fput+0x30/0x1a0 [ 1299.323936][T29071] ? ksys_write+0x1a7/0x250 [ 1299.328484][T29071] ? __ia32_sys_read+0xb0/0xb0 [ 1299.333289][T29071] __x64_sys_bpf+0x78/0xc0 [ 1299.337751][T29071] ? syscall_enter_from_user_mode+0x26/0x80 [ 1299.343682][T29071] do_syscall_64+0x3f/0x110 [ 1299.348248][T29071] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1299.354180][T29071] RIP: 0033:0x7f73d647cae9 [ 1299.358622][T29071] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1299.378258][T29071] RSP: 002b:00007f73d4ffe0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1299.386695][T29071] RAX: ffffffffffffffda RBX: 00007f73d659bf80 RCX: 00007f73d647cae9 [ 1299.394695][T29071] RDX: 0000000000000040 RSI: 0000000020000140 RDI: 0000000000000010 [ 1299.402688][T29071] RBP: 00007f73d4ffe120 R08: 0000000000000000 R09: 0000000000000000 [ 1299.410692][T29071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1299.418686][T29071] R13: 000000000000000b R14: 00007f73d659bf80 R15: 00007ffcd3c35df8 [ 1299.426709][T29071] [ 1299.429750][T29074] CPU: 1 PID: 29074 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1299.439857][T29074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1299.449918][T29074] Call Trace: [ 1299.453198][T29074] [ 1299.456125][T29074] dump_stack_lvl+0x125/0x1b0 [ 1299.460830][T29074] should_fail_ex+0x496/0x5b0 [ 1299.465515][T29074] should_failslab+0x9/0x20 [ 1299.470029][T29074] kmem_cache_alloc+0x325/0x3a0 [ 1299.474892][T29074] security_file_alloc+0x41/0x250 [ 1299.479947][T29074] ? kmem_cache_alloc+0x339/0x3a0 [ 1299.484989][T29074] init_file+0xba/0x2e0 [ 1299.489161][T29074] alloc_empty_file+0x91/0x1d0 [ 1299.493942][T29074] path_openat+0xdd/0x2c40 [ 1299.498371][T29074] ? path_lookupat+0x770/0x770 [ 1299.503133][T29074] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1299.509126][T29074] do_filp_open+0x1de/0x430 [ 1299.513631][T29074] ? may_open_dev+0xf0/0xf0 [ 1299.518167][T29074] ? _raw_spin_unlock+0x28/0x40 [ 1299.523040][T29074] ? alloc_fd+0x2da/0x6c0 [ 1299.527390][T29074] do_sys_openat2+0x176/0x1e0 [ 1299.532094][T29074] ? build_open_flags+0x690/0x690 [ 1299.537132][T29074] ? __fget_files+0x1c6/0x340 [ 1299.541829][T29074] __x64_sys_openat+0x175/0x210 [ 1299.546689][T29074] ? __ia32_sys_open+0x1e0/0x1e0 [ 1299.551627][T29074] ? ksys_write+0x1a7/0x250 [ 1299.556138][T29074] ? syscall_enter_from_user_mode+0x26/0x80 [ 1299.562051][T29074] do_syscall_64+0x3f/0x110 [ 1299.566558][T29074] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1299.572464][T29074] RIP: 0033:0x7fc4cfe7cae9 [ 1299.576885][T29074] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1299.596510][T29074] RSP: 002b:00007fc4d0c2a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1299.604938][T29074] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7cae9 [ 1299.612946][T29074] RDX: 0000000000000081 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1299.620938][T29074] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 [ 1299.628931][T29074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1299.636916][T29074] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1299.644902][T29074] 01:04:39 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) (async) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) read$ptp(r0, &(0x7f0000000040)=""/30, 0x1e) (async) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) 01:04:39 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x281c0, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x426400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) (async) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f00000000c0)={0x15}) read$ptp(r0, 0x0, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) (async) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000400)={0x68}) 01:04:40 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) (fail_nth: 2) [ 1299.658425][T29077] ERROR: Out of memory at tomoyo_realpath_from_path. 01:04:40 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 01:04:40 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (fail_nth: 2) 01:04:40 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x281c0, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x426400, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r1, 0x43403d05, &(0x7f00000000c0)={0x15}) read$ptp(r0, 0x0, 0x0) (async) read$ptp(r0, 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) (async) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) (async) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000000400)={0x68}) [ 1299.700347][ T1226] ieee802154 phy0 wpan0: encryption failed: -22 [ 1299.707097][ T1226] ieee802154 phy1 wpan1: encryption failed: -22 01:04:40 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x4002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) 01:04:40 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 5) 01:04:40 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x4002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x4002, 0x0) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) (async) [ 1299.814169][T29094] FAULT_INJECTION: forcing a failure. [ 1299.814169][T29094] name failslab, interval 1, probability 0, space 0, times 0 [ 1299.818215][T29092] FAULT_INJECTION: forcing a failure. [ 1299.818215][T29092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1299.836779][T29094] CPU: 0 PID: 29094 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1299.851146][T29094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1299.861245][T29094] Call Trace: [ 1299.864582][T29094] [ 1299.867546][T29094] dump_stack_lvl+0x125/0x1b0 [ 1299.872272][T29094] should_fail_ex+0x496/0x5b0 [ 1299.877001][T29094] should_failslab+0x9/0x20 [ 1299.881550][T29094] __kmem_cache_alloc_node+0x2e8/0x330 [ 1299.887063][T29094] ? tomoyo_encode2+0x100/0x3d0 [ 1299.891961][T29094] ? tomoyo_encode2+0x100/0x3d0 [ 1299.896847][T29094] __kmalloc+0x4f/0x100 [ 1299.901044][T29094] tomoyo_encode2+0x100/0x3d0 [ 1299.905762][T29094] ? rcu_is_watching+0x12/0xb0 [ 1299.910570][T29094] tomoyo_encode+0x29/0x50 [ 1299.915034][T29094] tomoyo_realpath_from_path+0x196/0x710 [ 1299.920680][T29094] ? tomoyo_profile+0x47/0x60 [ 1299.925375][T29094] tomoyo_path_number_perm+0x241/0x580 [ 1299.930851][T29094] ? tomoyo_path_number_perm+0x22e/0x580 [ 1299.936489][T29094] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1299.942332][T29094] ? __fget_files+0x1c1/0x340 [ 1299.947017][T29094] ? reacquire_held_locks+0x4b0/0x4b0 [ 1299.952402][T29094] security_file_ioctl+0x72/0xb0 [ 1299.957341][T29094] __x64_sys_ioctl+0xbb/0x210 [ 1299.962023][T29094] do_syscall_64+0x3f/0x110 [ 1299.966522][T29094] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1299.972419][T29094] RIP: 0033:0x7fe9e667cae9 [ 1299.976829][T29094] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1299.996436][T29094] RSP: 002b:00007fe9e74c10c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1300.004872][T29094] RAX: ffffffffffffffda RBX: 00007fe9e679bf80 RCX: 00007fe9e667cae9 [ 1300.012838][T29094] RDX: 0000000000000000 RSI: 0000000040049409 RDI: 0000000000000003 [ 1300.020828][T29094] RBP: 00007fe9e74c1120 R08: 0000000000000000 R09: 0000000000000000 [ 1300.028797][T29094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1300.036762][T29094] R13: 000000000000000b R14: 00007fe9e679bf80 R15: 00007ffd6157fe28 [ 1300.044742][T29094] [ 1300.059326][T29101] FAULT_INJECTION: forcing a failure. 01:04:40 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) read$ptp(r0, 0x0, 0xffffffffffffffe6) [ 1300.059326][T29101] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.069601][T29092] CPU: 0 PID: 29092 Comm: syz-executor.0 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1300.082024][T29092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1300.092090][T29092] Call Trace: [ 1300.095379][T29092] [ 1300.098316][T29092] dump_stack_lvl+0x125/0x1b0 [ 1300.103017][T29092] should_fail_ex+0x496/0x5b0 [ 1300.107707][T29092] _copy_to_user+0x30/0xb0 [ 1300.112140][T29092] simple_read_from_buffer+0xd0/0x150 [ 1300.117536][T29092] proc_fail_nth_read+0x1b0/0x280 [ 1300.122575][T29092] ? proc_sessionid_read+0x280/0x280 [ 1300.127871][T29092] ? security_file_permission+0xdc/0x100 [ 1300.133513][T29092] ? proc_sessionid_read+0x280/0x280 [ 1300.138810][T29092] vfs_read+0x1ce/0x8f0 [ 1300.143060][T29092] ? kernel_read+0x1b0/0x1b0 [ 1300.147662][T29092] ? __fget_files+0x1c6/0x340 [ 1300.152350][T29092] ksys_read+0x12f/0x250 [ 1300.156594][T29092] ? vfs_write+0xdf0/0xdf0 [ 1300.161021][T29092] ? syscall_enter_from_user_mode+0x26/0x80 [ 1300.166917][T29092] do_syscall_64+0x3f/0x110 [ 1300.171423][T29092] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1300.177321][T29092] RIP: 0033:0x7f73d647b78c [ 1300.181731][T29092] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1300.201346][T29092] RSP: 002b:00007f73d4ffe0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1300.209848][T29092] RAX: ffffffffffffffda RBX: 00007f73d659bf80 RCX: 00007f73d647b78c [ 1300.217814][T29092] RDX: 000000000000000f RSI: 00007f73d4ffe130 RDI: 0000000000000003 [ 1300.225780][T29092] RBP: 00007f73d4ffe120 R08: 0000000000000000 R09: 0000000000000000 [ 1300.233753][T29092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1300.241725][T29092] R13: 000000000000000b R14: 00007f73d659bf80 R15: 00007ffcd3c35df8 [ 1300.249706][T29092] 01:04:40 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async, rerun: 64) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) (rerun: 64) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) (async) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) (async) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) (async) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) (async) read$ptp(r0, 0x0, 0xffffffffffffffe6) [ 1300.269953][T29101] CPU: 0 PID: 29101 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1300.280072][T29101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1300.290153][T29101] Call Trace: [ 1300.293447][T29101] [ 1300.296391][T29101] dump_stack_lvl+0x125/0x1b0 [ 1300.301105][T29101] should_fail_ex+0x496/0x5b0 [ 1300.305807][T29101] should_failslab+0x9/0x20 [ 1300.306956][T29094] ERROR: Out of memory at tomoyo_realpath_from_path. 01:04:40 executing program 4: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x4002, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x8001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) (async) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) [ 1300.310313][T29101] __kmem_cache_alloc_node+0x2e8/0x330 [ 1300.310341][T29101] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1300.310364][T29101] ? tomoyo_realpath_from_path+0xb9/0x710 [ 1300.333943][T29101] __kmalloc+0x4f/0x100 [ 1300.338134][T29101] tomoyo_realpath_from_path+0xb9/0x710 [ 1300.343714][T29101] tomoyo_check_open_permission+0x2a3/0x3b0 [ 1300.349664][T29101] ? tomoyo_path_number_perm+0x580/0x580 [ 1300.355319][T29101] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1300.361327][T29101] ? hook_path_mknod+0x670/0x670 [ 1300.366261][T29101] ? reacquire_held_locks+0x4b0/0x4b0 [ 1300.371644][T29101] ? spin_bug+0x1d0/0x1d0 [ 1300.375984][T29101] tomoyo_file_open+0xa8/0xd0 [ 1300.380662][T29101] security_file_open+0x6a/0xe0 [ 1300.385514][T29101] do_dentry_open+0x583/0x18d0 [ 1300.390278][T29101] ? may_open+0x1f2/0x400 [ 1300.394611][T29101] path_openat+0x1d4e/0x2c40 [ 1300.399206][T29101] ? path_lookupat+0x770/0x770 [ 1300.403965][T29101] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1300.409952][T29101] do_filp_open+0x1de/0x430 [ 1300.414483][T29101] ? may_open_dev+0xf0/0xf0 [ 1300.418995][T29101] ? _raw_spin_unlock+0x28/0x40 [ 1300.423842][T29101] ? alloc_fd+0x2da/0x6c0 [ 1300.428170][T29101] do_sys_openat2+0x176/0x1e0 [ 1300.432841][T29101] ? build_open_flags+0x690/0x690 [ 1300.437865][T29101] ? __fget_files+0x1c6/0x340 [ 1300.442541][T29101] __x64_sys_openat+0x175/0x210 [ 1300.447386][T29101] ? __ia32_sys_open+0x1e0/0x1e0 [ 1300.452314][T29101] ? ksys_write+0x1a7/0x250 [ 1300.456813][T29101] ? syscall_enter_from_user_mode+0x26/0x80 [ 1300.462706][T29101] do_syscall_64+0x3f/0x110 [ 1300.467200][T29101] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1300.473094][T29101] RIP: 0033:0x7fc4cfe7cae9 [ 1300.477497][T29101] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1300.497102][T29101] RSP: 002b:00007fc4d0c2a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1300.505513][T29101] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7cae9 [ 1300.513489][T29101] RDX: 0000000000000081 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1300.521469][T29101] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 [ 1300.529438][T29101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1300.537401][T29101] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1300.545382][T29101] 01:04:40 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 6) 01:04:40 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x121002, 0x0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f00000000c0)={0x1512, 0x3}) 01:04:40 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) (fail_nth: 3) [ 1300.570376][T29101] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1300.623294][T29115] FAULT_INJECTION: forcing a failure. [ 1300.623294][T29115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1300.636480][T29115] CPU: 1 PID: 29115 Comm: syz-executor.3 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1300.646554][T29115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1300.656626][T29115] Call Trace: [ 1300.659926][T29115] [ 1300.662869][T29115] dump_stack_lvl+0x125/0x1b0 [ 1300.663165][T29117] FAULT_INJECTION: forcing a failure. [ 1300.663165][T29117] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.667568][T29115] should_fail_ex+0x496/0x5b0 [ 1300.667602][T29115] _copy_to_user+0x30/0xb0 [ 1300.667628][T29115] simple_read_from_buffer+0xd0/0x150 [ 1300.694711][T29115] proc_fail_nth_read+0x1b0/0x280 [ 1300.699769][T29115] ? proc_sessionid_read+0x280/0x280 [ 1300.705078][T29115] ? security_file_permission+0xdc/0x100 [ 1300.710734][T29115] ? proc_sessionid_read+0x280/0x280 [ 1300.716046][T29115] vfs_read+0x1ce/0x8f0 [ 1300.720220][T29115] ? kernel_read+0x1b0/0x1b0 [ 1300.724835][T29115] ? __fget_files+0x1c6/0x340 [ 1300.729536][T29115] ksys_read+0x12f/0x250 [ 1300.733796][T29115] ? vfs_write+0xdf0/0xdf0 [ 1300.738246][T29115] ? syscall_enter_from_user_mode+0x26/0x80 [ 1300.744181][T29115] do_syscall_64+0x3f/0x110 [ 1300.748726][T29115] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1300.754637][T29115] RIP: 0033:0x7fe9e667b78c [ 1300.759061][T29115] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1300.778685][T29115] RSP: 002b:00007fe9e74c10c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1300.787127][T29115] RAX: ffffffffffffffda RBX: 00007fe9e679bf80 RCX: 00007fe9e667b78c [ 1300.795106][T29115] RDX: 000000000000000f RSI: 00007fe9e74c1130 RDI: 0000000000000004 [ 1300.803083][T29115] RBP: 00007fe9e74c1120 R08: 0000000000000000 R09: 0000000000000000 [ 1300.811071][T29115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1300.819058][T29115] R13: 000000000000000b R14: 00007fe9e679bf80 R15: 00007ffd6157fe28 [ 1300.827089][T29115] [ 1300.830125][T29117] CPU: 0 PID: 29117 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1300.840221][T29117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1300.850278][T29117] Call Trace: [ 1300.853551][T29117] [ 1300.856474][T29117] dump_stack_lvl+0x125/0x1b0 [ 1300.861164][T29117] should_fail_ex+0x496/0x5b0 [ 1300.865846][T29117] should_failslab+0x9/0x20 [ 1300.870351][T29117] __kmem_cache_alloc_node+0x2e8/0x330 [ 1300.875817][T29117] ? tomoyo_encode2+0x100/0x3d0 [ 1300.880695][T29117] ? tomoyo_encode2+0x100/0x3d0 [ 1300.885548][T29117] __kmalloc+0x4f/0x100 [ 1300.891014][T29117] tomoyo_encode2+0x100/0x3d0 [ 1300.895690][T29117] ? rcu_is_watching+0x12/0xb0 [ 1300.900463][T29117] tomoyo_encode+0x29/0x50 [ 1300.904880][T29117] tomoyo_realpath_from_path+0x196/0x710 [ 1300.910530][T29117] tomoyo_check_open_permission+0x2a3/0x3b0 [ 1300.916443][T29117] ? tomoyo_path_number_perm+0x580/0x580 [ 1300.922098][T29117] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1300.928105][T29117] ? hook_path_mknod+0x670/0x670 [ 1300.933043][T29117] ? reacquire_held_locks+0x4b0/0x4b0 [ 1300.938421][T29117] ? spin_bug+0x1d0/0x1d0 [ 1300.942763][T29117] tomoyo_file_open+0xa8/0xd0 [ 1300.947443][T29117] security_file_open+0x6a/0xe0 [ 1300.952308][T29117] do_dentry_open+0x583/0x18d0 [ 1300.957089][T29117] ? may_open+0x1f2/0x400 [ 1300.961435][T29117] path_openat+0x1d4e/0x2c40 [ 1300.966036][T29117] ? path_lookupat+0x770/0x770 [ 1300.970807][T29117] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 1300.976808][T29117] do_filp_open+0x1de/0x430 [ 1300.981314][T29117] ? may_open_dev+0xf0/0xf0 [ 1300.985826][T29117] ? _raw_spin_unlock+0x28/0x40 [ 1300.990687][T29117] ? alloc_fd+0x2da/0x6c0 [ 1300.995025][T29117] do_sys_openat2+0x176/0x1e0 [ 1300.999714][T29117] ? build_open_flags+0x690/0x690 [ 1301.004750][T29117] ? __fget_files+0x1c6/0x340 [ 1301.009445][T29117] __x64_sys_openat+0x175/0x210 [ 1301.014302][T29117] ? __ia32_sys_open+0x1e0/0x1e0 [ 1301.019244][T29117] ? ksys_write+0x1a7/0x250 [ 1301.023757][T29117] ? syscall_enter_from_user_mode+0x26/0x80 [ 1301.029660][T29117] do_syscall_64+0x3f/0x110 [ 1301.034164][T29117] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1301.040071][T29117] RIP: 0033:0x7fc4cfe7cae9 [ 1301.044487][T29117] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1301.064110][T29117] RSP: 002b:00007fc4d0c2a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1301.072543][T29117] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7cae9 [ 1301.080522][T29117] RDX: 0000000000000081 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1301.088500][T29117] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 [ 1301.096466][T29117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1301.104441][T29117] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1301.112427][T29117] 01:04:41 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0xc8002, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST2(r1, 0x40383d0c, &(0x7f00000001c0)={{0x9, 0x100}, {0x6, 0x2}, 0x3}) read$ptp(r0, 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/242, 0xf2) ioctl$PTP_PIN_GETFUNC2(r0, 0xc0603d0f, &(0x7f0000000140)={'\x00', 0x7ff, 0x1, 0x3f}) 01:04:41 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x121002, 0x0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f00000000c0)={0x1512, 0x3}) 01:04:41 executing program 5: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/block/ram2', 0x200400, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) (async) accept4$ax25(r1, &(0x7f00000000c0)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x80000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) (async) read$ptp(r0, 0x0, 0xffffffffffffffe6) 01:04:41 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 01:04:41 executing program 5: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x1f, 0x5, 0x8) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) r2 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r2, 0x0, 0x0, 0x4000001, &(0x7f0000001dc0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null]}, 0x48) accept4$ax25(r2, &(0x7f0000000140)={{0x3, @null}, [@remote, @rose, @remote, @null, @rose, @null, @bcast, @netrom]}, 0x0, 0x800) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040)=0x6, 0x4) read$ptp(r0, 0x0, 0x0) [ 1301.127563][T29117] ERROR: Out of memory at tomoyo_realpath_from_path. 01:04:41 executing program 2: openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) (fail_nth: 7) 01:04:41 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, &(0x7f0000000040)=""/44, 0x2c) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080), 0x121002, 0x0) ioctl$PTP_EXTTS_REQUEST2(r1, 0x40103d0b, &(0x7f00000000c0)={0x1512, 0x3}) 01:04:41 executing program 0: bpf$BPF_PROG_QUERY(0x2, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 01:04:41 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x40049409, 0x0) [ 1301.223473][T29132] FAULT_INJECTION: forcing a failure. [ 1301.223473][T29132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1301.257962][T29132] CPU: 0 PID: 29132 Comm: syz-executor.2 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1301.268083][T29132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1301.278145][T29132] Call Trace: [ 1301.281429][T29132] [ 1301.284364][T29132] dump_stack_lvl+0x125/0x1b0 [ 1301.289069][T29132] should_fail_ex+0x496/0x5b0 [ 1301.293755][T29132] _copy_to_user+0x30/0xb0 [ 1301.298174][T29132] simple_read_from_buffer+0xd0/0x150 [ 1301.303553][T29132] proc_fail_nth_read+0x1b0/0x280 [ 1301.308576][T29132] ? proc_sessionid_read+0x280/0x280 [ 1301.313857][T29132] ? security_file_permission+0xdc/0x100 [ 1301.319490][T29132] ? proc_sessionid_read+0x280/0x280 [ 1301.324771][T29132] vfs_read+0x1ce/0x8f0 [ 1301.328925][T29132] ? kernel_read+0x1b0/0x1b0 [ 1301.333520][T29132] ? __fget_files+0x1c6/0x340 [ 1301.338204][T29132] ksys_read+0x12f/0x250 [ 1301.342451][T29132] ? vfs_write+0xdf0/0xdf0 [ 1301.346865][T29132] ? syscall_enter_from_user_mode+0x26/0x80 [ 1301.352762][T29132] do_syscall_64+0x3f/0x110 [ 1301.357264][T29132] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1301.363162][T29132] RIP: 0033:0x7fc4cfe7b78c [ 1301.367572][T29132] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 [ 1301.387178][T29132] RSP: 002b:00007fc4d0c2a0c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1301.395588][T29132] RAX: ffffffffffffffda RBX: 00007fc4cff9bf80 RCX: 00007fc4cfe7b78c [ 1301.403557][T29132] RDX: 000000000000000f RSI: 00007fc4d0c2a130 RDI: 0000000000000003 [ 1301.411521][T29132] RBP: 00007fc4d0c2a120 R08: 0000000000000000 R09: 0000000000000000 01:04:41 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ADDFB(r0, 0x2, 0x0) 01:04:41 executing program 0: bpf$BPF_PROG_QUERY(0x3, &(0x7f0000000140)={@ifindex, 0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1301.419484][T29132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1301.427445][T29132] R13: 000000000000000b R14: 00007fc4cff9bf80 R15: 00007ffcd2009af8 [ 1301.435417][T29132] 01:04:41 executing program 4: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$DRM_IOCTL_MODE_PAGE_FLIP(r0, 0xc01864b0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x4, 0xfffffffffffffffc}) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r1, &(0x7f0000000040)=""/44, 0x2c) [ 1302.049659][T29131] ================================================================== [ 1302.057755][T29131] BUG: KASAN: slab-use-after-free in ptp_read+0x7c4/0x830 [ 1302.064856][T29131] Read of size 4 at addr ffff88807c791004 by task syz-executor.1/29131 [ 1302.073099][T29131] [ 1302.075412][T29131] CPU: 0 PID: 29131 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1302.085476][T29131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1302.095541][T29131] Call Trace: [ 1302.098824][T29131] [ 1302.101745][T29131] dump_stack_lvl+0xd9/0x1b0 [ 1302.106325][T29131] print_report+0xc4/0x620 [ 1302.110724][T29131] ? __virt_addr_valid+0x5e/0x2d0 [ 1302.115733][T29131] ? __phys_addr+0xc6/0x140 [ 1302.120227][T29131] kasan_report+0xda/0x110 [ 1302.124632][T29131] ? ptp_read+0x7c4/0x830 [ 1302.128953][T29131] ? ptp_read+0x7c4/0x830 [ 1302.133290][T29131] ptp_read+0x7c4/0x830 [ 1302.137429][T29131] ? ptp_poll+0x1b0/0x1b0 [ 1302.141739][T29131] ? cpuacct_percpu_seq_show+0x10/0x10 [ 1302.147183][T29131] ? fsnotify_perm.part.0+0x23c/0x5c0 [ 1302.152539][T29131] ? fsnotify_perm.part.0+0x247/0x5c0 [ 1302.157894][T29131] ? apparmor_file_permission+0x21f/0x4f0 [ 1302.163598][T29131] ? ptp_poll+0x1b0/0x1b0 [ 1302.167907][T29131] posix_clock_read+0x138/0x1b0 [ 1302.172746][T29131] ? posix_clock_compat_ioctl+0x30/0x30 [ 1302.178279][T29131] vfs_read+0x1ce/0x8f0 [ 1302.182439][T29131] ? kernel_read+0x1b0/0x1b0 [ 1302.187027][T29131] ? __might_fault+0xe6/0x1a0 [ 1302.191685][T29131] ? __fget_files+0x1c6/0x340 [ 1302.196347][T29131] ? __fget_light+0xe6/0x260 [ 1302.200921][T29131] ksys_read+0x12f/0x250 [ 1302.205148][T29131] ? vfs_write+0xdf0/0xdf0 [ 1302.209546][T29131] ? syscall_enter_from_user_mode+0x26/0x80 [ 1302.215424][T29131] do_syscall_64+0x3f/0x110 [ 1302.219908][T29131] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1302.225783][T29131] RIP: 0033:0x7fab2c67cae9 [ 1302.230178][T29131] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1302.252196][T29131] RSP: 002b:00007fab2d4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1302.261120][T29131] RAX: ffffffffffffffda RBX: 00007fab2c79bf80 RCX: 00007fab2c67cae9 [ 1302.269092][T29131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1302.277042][T29131] RBP: 00007fab2c6c847a R08: 0000000000000000 R09: 0000000000000000 [ 1302.284992][T29131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1302.292943][T29131] R13: 000000000000000b R14: 00007fab2c79bf80 R15: 00007fffd9dfcc18 [ 1302.300901][T29131] [ 1302.303901][T29131] [ 1302.306207][T29131] Allocated by task 29131: [ 1302.310594][T29131] kasan_save_stack+0x33/0x50 [ 1302.315256][T29131] kasan_set_track+0x25/0x30 [ 1302.319830][T29131] __kasan_kmalloc+0xa2/0xb0 [ 1302.324400][T29131] ptp_open+0xe3/0x4f0 [ 1302.328447][T29131] posix_clock_open+0x17e/0x240 [ 1302.333285][T29131] chrdev_open+0x26d/0x6e0 [ 1302.337682][T29131] do_dentry_open+0x8d4/0x18d0 [ 1302.342438][T29131] path_openat+0x1d4e/0x2c40 [ 1302.347030][T29131] do_filp_open+0x1de/0x430 [ 1302.351513][T29131] do_sys_openat2+0x176/0x1e0 [ 1302.356169][T29131] __x64_sys_openat+0x175/0x210 [ 1302.360999][T29131] do_syscall_64+0x3f/0x110 [ 1302.365498][T29131] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1302.371373][T29131] [ 1302.373680][T29131] Freed by task 29139: [ 1302.377722][T29131] kasan_save_stack+0x33/0x50 [ 1302.382389][T29131] kasan_set_track+0x25/0x30 [ 1302.386980][T29131] kasan_save_free_info+0x2b/0x40 [ 1302.391986][T29131] ____kasan_slab_free+0x15b/0x1b0 [ 1302.397078][T29131] slab_free_freelist_hook+0x114/0x1e0 [ 1302.402523][T29131] __kmem_cache_free+0xb8/0x2d0 [ 1302.407365][T29131] ptp_release+0x204/0x2b0 [ 1302.411793][T29131] ptp_read+0xf6/0x830 [ 1302.415866][T29131] posix_clock_read+0x138/0x1b0 [ 1302.420702][T29131] vfs_read+0x1ce/0x8f0 [ 1302.424857][T29131] ksys_read+0x12f/0x250 [ 1302.429077][T29131] do_syscall_64+0x3f/0x110 [ 1302.433556][T29131] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1302.439428][T29131] [ 1302.441735][T29131] The buggy address belongs to the object at ffff88807c790000 [ 1302.441735][T29131] which belongs to the cache kmalloc-8k of size 8192 [ 1302.455764][T29131] The buggy address is located 4100 bytes inside of [ 1302.455764][T29131] freed 8192-byte region [ffff88807c790000, ffff88807c792000) [ 1302.469806][T29131] [ 1302.472110][T29131] The buggy address belongs to the physical page: [ 1302.478495][T29131] page:ffffea0001f1e400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7c790 [ 1302.488623][T29131] head:ffffea0001f1e400 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1302.497537][T29131] flags: 0xfff00000000840(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 1302.505506][T29131] page_type: 0xffffffff() [ 1302.509823][T29131] raw: 00fff00000000840 ffff888013042280 dead000000000122 0000000000000000 [ 1302.518402][T29131] raw: 0000000000000000 0000000000020002 00000001ffffffff 0000000000000000 [ 1302.526963][T29131] page dumped because: kasan: bad access detected [ 1302.533351][T29131] page_owner tracks the page as allocated [ 1302.539059][T29131] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 29131, tgid 29128 (syz-executor.1), ts 1301231082403, free_ts 1301158852741 [ 1302.562519][T29131] post_alloc_hook+0x2cf/0x340 [ 1302.567290][T29131] get_page_from_freelist+0xee0/0x2f20 [ 1302.572768][T29131] __alloc_pages+0x1d0/0x4a0 [ 1302.577385][T29131] alloc_pages+0x1a9/0x270 [ 1302.581831][T29131] allocate_slab+0x251/0x380 [ 1302.586426][T29131] ___slab_alloc+0x8c7/0x1580 [ 1302.591108][T29131] __slab_alloc.constprop.0+0x56/0xa0 [ 1302.596566][T29131] __kmem_cache_alloc_node+0x131/0x330 [ 1302.602049][T29131] kmalloc_trace+0x25/0xe0 [ 1302.606461][T29131] ptp_open+0xe3/0x4f0 [ 1302.610525][T29131] posix_clock_open+0x17e/0x240 [ 1302.615400][T29131] chrdev_open+0x26d/0x6e0 [ 1302.619836][T29131] do_dentry_open+0x8d4/0x18d0 [ 1302.624601][T29131] path_openat+0x1d4e/0x2c40 [ 1302.629365][T29131] do_filp_open+0x1de/0x430 [ 1302.633875][T29131] do_sys_openat2+0x176/0x1e0 [ 1302.638554][T29131] page last free stack trace: [ 1302.643225][T29131] free_unref_page_prepare+0x476/0xa40 [ 1302.648703][T29131] free_unref_page+0x33/0x3b0 [ 1302.653494][T29131] __unfreeze_partials+0x21d/0x240 [ 1302.658645][T29131] qlist_free_all+0x6a/0x170 [ 1302.663245][T29131] kasan_quarantine_reduce+0x18e/0x1d0 [ 1302.668718][T29131] __kasan_slab_alloc+0x65/0x90 [ 1302.673576][T29131] kmem_cache_alloc+0x15d/0x3a0 [ 1302.678439][T29131] getname_flags.part.0+0x50/0x4e0 [ 1302.683593][T29131] getname_flags+0x9c/0xf0 [ 1302.688018][T29131] user_path_at_empty+0x2c/0x60 [ 1302.692866][T29131] __x64_sys_umount+0x10e/0x1a0 [ 1302.697713][T29131] do_syscall_64+0x3f/0x110 [ 1302.702208][T29131] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1302.708105][T29131] [ 1302.710430][T29131] Memory state around the buggy address: [ 1302.716041][T29131] ffff88807c790f00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1302.724097][T29131] ffff88807c790f80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1302.732153][T29131] >ffff88807c791000: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1302.740196][T29131] ^ [ 1302.744272][T29131] ffff88807c791080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1302.752320][T29131] ffff88807c791100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1302.760380][T29131] ================================================================== [ 1302.777484][T29131] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 1302.784691][T29131] CPU: 0 PID: 29131 Comm: syz-executor.1 Not tainted 6.6.0-syzkaller-06824-g8bc9e6515183 #0 [ 1302.794777][T29131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023 [ 1302.804850][T29131] Call Trace: [ 1302.808131][T29131] [ 1302.811056][T29131] dump_stack_lvl+0xd9/0x1b0 [ 1302.815740][T29131] panic+0x6a6/0x750 [ 1302.819653][T29131] ? panic_smp_self_stop+0xa0/0xa0 [ 1302.824776][T29131] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1302.830924][T29131] ? preempt_schedule_thunk+0x1a/0x30 [ 1302.836292][T29131] ? preempt_schedule_common+0x45/0xc0 [ 1302.841746][T29131] check_panic_on_warn+0xab/0xb0 [ 1302.846684][T29131] end_report+0x108/0x150 [ 1302.851024][T29131] kasan_report+0xea/0x110 [ 1302.855429][T29131] ? ptp_read+0x7c4/0x830 [ 1302.859757][T29131] ? ptp_read+0x7c4/0x830 [ 1302.864098][T29131] ptp_read+0x7c4/0x830 [ 1302.868268][T29131] ? ptp_poll+0x1b0/0x1b0 [ 1302.872604][T29131] ? cpuacct_percpu_seq_show+0x10/0x10 [ 1302.878059][T29131] ? fsnotify_perm.part.0+0x23c/0x5c0 [ 1302.883433][T29131] ? fsnotify_perm.part.0+0x247/0x5c0 [ 1302.888803][T29131] ? apparmor_file_permission+0x21f/0x4f0 [ 1302.894528][T29131] ? ptp_poll+0x1b0/0x1b0 [ 1302.898861][T29131] posix_clock_read+0x138/0x1b0 [ 1302.903718][T29131] ? posix_clock_compat_ioctl+0x30/0x30 [ 1302.909266][T29131] vfs_read+0x1ce/0x8f0 [ 1302.913415][T29131] ? kernel_read+0x1b0/0x1b0 [ 1302.918121][T29131] ? __might_fault+0xe6/0x1a0 [ 1302.922793][T29131] ? __fget_files+0x1c6/0x340 [ 1302.927462][T29131] ? __fget_light+0xe6/0x260 [ 1302.932045][T29131] ksys_read+0x12f/0x250 [ 1302.936277][T29131] ? vfs_write+0xdf0/0xdf0 [ 1302.940688][T29131] ? syscall_enter_from_user_mode+0x26/0x80 [ 1302.946582][T29131] do_syscall_64+0x3f/0x110 [ 1302.951079][T29131] entry_SYSCALL_64_after_hwframe+0x63/0x6b [ 1302.956967][T29131] RIP: 0033:0x7fab2c67cae9 [ 1302.961367][T29131] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1302.980963][T29131] RSP: 002b:00007fab2d4b40c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1302.989365][T29131] RAX: ffffffffffffffda RBX: 00007fab2c79bf80 RCX: 00007fab2c67cae9 [ 1302.997331][T29131] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1303.005303][T29131] RBP: 00007fab2c6c847a R08: 0000000000000000 R09: 0000000000000000 [ 1303.013273][T29131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1303.021235][T29131] R13: 000000000000000b R14: 00007fab2c79bf80 R15: 00007fffd9dfcc18 [ 1303.029202][T29131] [ 1303.032467][T29131] Kernel Offset: disabled [ 1303.036775][T29131] Rebooting in 86400 seconds..