x0) 11:23:14 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r2, 0x0) 11:23:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}]}, 0x44}, 0x1, 0x0, 0x0, 0x880}, 0x0) (async, rerun: 32) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (rerun: 32) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x2, [{}, {0x0, 0x3}]}}) 11:23:14 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="483578650949f69cb9a9a2d09032eb38ce5e1aad7f6cfa1d4f9723e12733aeba766bc8690b863bafe1213bc018aa5f58a5c4edb0f0b1de4b6a67e1739610b8d4e50f9cad31057af61422b9e3d42212596a0b07e5c754a63bca32902f7d4a95", 0x5f, 0x1}], 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:14 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}]}, 0x44}, 0x1, 0x0, 0x0, 0x880}, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x2, [{}, {0x0, 0x3}]}}) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e21}, @L2TP_ATTR_PEER_SESSION_ID={0x8}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @rand_addr=0x64010100}]}, 0x44}, 0x1, 0x0, 0x0, 0x880}, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x2, [{}, {0x0, 0x3}]}}) (async) 11:23:14 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="483578650949f69cb9a9a2d09032eb38ce5e1aad7f6cfa1d4f9723e12733aeba766bc8690b863bafe1213bc018aa5f58a5c4edb0f0b1de4b6a67e1739610b8d4e50f9cad31057af61422b9e3d42212596a0b07e5c754a63bca32902f7d4a95", 0x5f, 0x1}], 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x616640, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xf, 0xa, '[{\'\\(\\!-$\'-'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4040084}, 0x20000000) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:15 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="483578650949f69cb9a9a2d09032eb38ce5e1aad7f6cfa1d4f9723e12733aeba766bc8690b863bafe1213bc018aa5f58a5c4edb0f0b1de4b6a67e1739610b8d4e50f9cad31057af61422b9e3d42212596a0b07e5c754a63bca32902f7d4a95", 0x5f, 0x1}], 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:15 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 11:23:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x616640, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xf, 0xa, '[{\'\\(\\!-$\'-'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4040084}, 0x20000000) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x616640, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xf, 0xa, '[{\'\\(\\!-$\'-'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4040084}, 0x20000000) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) 11:23:15 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0xb7a0, 0x23402) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x5}) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:15 executing program 0: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:15 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:15 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 11:23:15 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x616640, 0x0) (async, rerun: 32) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (rerun: 32) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x78, 0x0, 0x800, 0x70bd2d, 0x25dfdbfb, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xf, 0xa, '[{\'\\(\\!-$\'-'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x24}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SOCKETS={0x24, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4040084}, 0x20000000) (async, rerun: 32) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (rerun: 32) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:15 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0xb7a0, 0x23402) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x5}) (async, rerun: 32) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (rerun: 32) 11:23:15 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x5c, 0x50424752, 0x1, @stepwise={0x8, 0x7fff, 0x47, 0x3, 0x8000, 0x4}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x5c, 0x50424752, 0x1, @stepwise={0x8, 0x7fff, 0x47, 0x3, 0x8000, 0x4}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x5c, 0x50424752, 0x1, @stepwise={0x8, 0x7fff, 0x47, 0x3, 0x8000, 0x4}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x5c, 0x50424752, 0x1, @stepwise={0x8, 0x7fff, 0x47, 0x3, 0x8000, 0x4}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) 11:23:16 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 11:23:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)=@multiplanar_overlay={0x7, 0x3, 0x4, 0x20, 0xd3, {0x77359400}, {0x4, 0x0, 0x1, 0x0, 0x9, 0x3, "c324abbd"}, 0x5, 0x3, {&(0x7f0000000000)=[{0x1d, 0x5, {0x4}, 0x6}, {0xffffff11, 0x8, {0x7fff}, 0x10000}]}, 0x1}) 11:23:16 executing program 0: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:16 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)=@multiplanar_overlay={0x7, 0x3, 0x4, 0x20, 0xd3, {0x77359400}, {0x4, 0x0, 0x1, 0x0, 0x9, 0x3, "c324abbd"}, 0x5, 0x3, {&(0x7f0000000000)=[{0x1d, 0x5, {0x4}, 0x6}, {0xffffff11, 0x8, {0x7fff}, 0x10000}]}, 0x1}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)=@multiplanar_overlay={0x7, 0x3, 0x4, 0x20, 0xd3, {0x77359400}, {0x4, 0x0, 0x1, 0x0, 0x9, 0x3, "c324abbd"}, 0x5, 0x3, {&(0x7f0000000000)=[{0x1d, 0x5, {0x4}, 0x6}, {0xffffff11, 0x8, {0x7fff}, 0x10000}]}, 0x1}) (async) 11:23:16 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 11:23:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080), 0xb7a0, 0x23402) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x5}) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)=@multiplanar_overlay={0x7, 0x3, 0x4, 0x20, 0xd3, {0x77359400}, {0x4, 0x0, 0x1, 0x0, 0x9, 0x3, "c324abbd"}, 0x5, 0x3, {&(0x7f0000000000)=[{0x1d, 0x5, {0x4}, 0x6}, {0xffffff11, 0x8, {0x7fff}, 0x10000}]}, 0x1}) 11:23:16 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x5, 0x1, 0xb, 0x11, "2242129db5a8dd4cb582680e0b60afd713841f60859fe2c667882a1c938b0f16a06ff43f0a1e9ebda687cbb09b17ae51e0b3254878fd48436d8d1da75718cd13", "a4efc5d66a5ee32801146c40c5b04d7067e725ae92d15f0e76fdd75629082c25", [0x7ea, 0x95b]}) 11:23:16 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) 11:23:17 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) (async) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) (async) ioctl$RTC_WIE_ON(r1, 0x700f) (async) 11:23:17 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x5, 0x1, 0xb, 0x11, "2242129db5a8dd4cb582680e0b60afd713841f60859fe2c667882a1c938b0f16a06ff43f0a1e9ebda687cbb09b17ae51e0b3254878fd48436d8d1da75718cd13", "a4efc5d66a5ee32801146c40c5b04d7067e725ae92d15f0e76fdd75629082c25", [0x7ea, 0x95b]}) 11:23:17 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:17 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) (async) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) 11:23:17 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x5, 0x1, 0xb, 0x11, "2242129db5a8dd4cb582680e0b60afd713841f60859fe2c667882a1c938b0f16a06ff43f0a1e9ebda687cbb09b17ae51e0b3254878fd48436d8d1da75718cd13", "a4efc5d66a5ee32801146c40c5b04d7067e725ae92d15f0e76fdd75629082c25", [0x7ea, 0x95b]}) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x5, 0x1, 0xb, 0x11, "2242129db5a8dd4cb582680e0b60afd713841f60859fe2c667882a1c938b0f16a06ff43f0a1e9ebda687cbb09b17ae51e0b3254878fd48436d8d1da75718cd13", "a4efc5d66a5ee32801146c40c5b04d7067e725ae92d15f0e76fdd75629082c25", [0x7ea, 0x95b]}) (async) 11:23:17 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:17 executing program 0: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:17 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:17 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300), 0xffffffffffffffff) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x40080) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000043f5017010000000000000000"], 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x200, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x84) 11:23:17 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 11:23:17 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) (async) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300), 0xffffffffffffffff) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x40080) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000043f5017010000000000000000"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x200, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x84) 11:23:17 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 11:23:18 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000300), 0xffffffffffffffff) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x40080) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000043f5017010000000000000000"], 0x14}}, 0x0) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x200, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x84) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000300), 0xffffffffffffffff) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r3}, {0x8}, {0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x40080) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000043f5017010000000000000000"], 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x200, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x84) (async) 11:23:18 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 11:23:18 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:18 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x0, @sdr}}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:18 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f00000005c0), 0x3a58486, &(0x7f0000000680)=ANY=[]) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x10000, 0x9, 0x0, 0x3]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x7fff, 0x4]}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000004}, 0x80010) 11:23:18 executing program 4: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:18 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:18 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x0, @sdr}}) (async) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:18 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f00000005c0), 0x3a58486, &(0x7f0000000680)=ANY=[]) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x10000, 0x9, 0x0, 0x3]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x7fff, 0x4]}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000004}, 0x80010) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f00000005c0), 0x3a58486, &(0x7f0000000680)=ANY=[]) (async) syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x10000, 0x9, 0x0, 0x3]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x7fff, 0x4]}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000004}, 0x80010) (async) 11:23:18 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:18 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x0, @sdr}}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, {0x0, @sdr}}) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) 11:23:18 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000040)={0x9, 0x9, 0x3, {0x0, @sdr={0x30314442, 0x6ec}}, 0x7fff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x20200, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000180)) 11:23:18 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x7, 0x0, &(0x7f00000005c0), 0x3a58486, &(0x7f0000000680)=ANY=[]) (async) r0 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2, 0x10000, 0x9, 0x0, 0x3]}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x0, 0x7fff, 0x4]}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000004}, 0x80010) 11:23:19 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async, rerun: 32) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (rerun: 32) ioctl$vim2m_VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000040)={0x9, 0x9, 0x3, {0x0, @sdr={0x30314442, 0x6ec}}, 0x7fff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x20200, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000180)) 11:23:19 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:19 executing program 5: ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0xc021, 0x7}) 11:23:19 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f0000000040)={0x9, 0x9, 0x3, {0x0, @sdr={0x30314442, 0x6ec}}, 0x7fff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x20200, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000180)) 11:23:19 executing program 4: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:19 executing program 0: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:19 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix_mp={0x0, 0x2, 0x39555659, 0x5, 0x0, [{0x10}, {}, {}, {0xfffffffc}, {0x5}, {0x8, 0x3}, {0x4, 0x20}], 0x0, 0x0, 0x0, 0x0, 0x2}}) 11:23:19 executing program 5: ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0xc021, 0x7}) 11:23:19 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:19 executing program 0: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:19 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix_mp={0x0, 0x2, 0x39555659, 0x5, 0x0, [{0x10}, {}, {}, {0xfffffffc}, {0x5}, {0x8, 0x3}, {0x4, 0x20}], 0x0, 0x0, 0x0, 0x0, 0x2}}) 11:23:19 executing program 5: ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000000)={0xc021, 0x7}) 11:23:19 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000040)={0x2, @pix_mp={0x0, 0x2, 0x39555659, 0x5, 0x0, [{0x10}, {}, {}, {0xfffffffc}, {0x5}, {0x8, 0x3}, {0x4, 0x20}], 0x0, 0x0, 0x0, 0x0, 0x2}}) 11:23:20 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:20 executing program 0: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x408800, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'ubifs\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x102}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004054}, 0x80) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:20 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:20 executing program 3: clock_getres(0x5, &(0x7f0000000000)) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:20 executing program 3: clock_getres(0x5, &(0x7f0000000000)) (async) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:20 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:20 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:20 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x408800, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'ubifs\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x102}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004054}, 0x80) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:20 executing program 3: clock_getres(0x5, &(0x7f0000000000)) (async) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:20 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:20 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9}], 0xff}}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x9, 0x0}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000040)={0x0, r2}) 11:23:21 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:21 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9}], 0xff}}) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x9, 0x0}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000040)={0x0, r2}) 11:23:21 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x408800, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'ubifs\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x102}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004054}, 0x80) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x408800, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x8, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_BACKEND_IDENTIFIER={0xa, 0xa, 'ubifs\x00'}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x102}, @NBD_ATTR_SOCKETS={0x34, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r3}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x4004054}, 0x80) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) 11:23:21 executing program 4: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:21 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:21 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x9}], 0xff}}) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000000)={0x9, 0x0}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000040)={0x0, r2}) 11:23:21 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @pix_mp={0x10001, 0xe8, 0x47314356, 0x3, 0x0, [{0x0, 0x2000}, {0x0, 0x8}, {}, {0x0, 0x1}, {}, {0x0, 0x2}, {0xeb7f}]}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix={0x6, 0xc0c8, 0x20343059, 0x6, 0x7, 0x6, 0x8, 0x4, 0x0, 0x6, 0x2, 0x4}}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 11:23:21 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10000}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), r4) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000001280), 0x2109cd9, &(0x7f0000001300)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r1, @ANYRES64=r2, @ANYRESHEX=r3]) 11:23:21 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @pix_mp={0x10001, 0xe8, 0x47314356, 0x3, 0x0, [{0x0, 0x2000}, {0x0, 0x8}, {}, {0x0, 0x1}, {}, {0x0, 0x2}, {0xeb7f}]}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix={0x6, 0xc0c8, 0x20343059, 0x6, 0x7, 0x6, 0x8, 0x4, 0x0, 0x6, 0x2, 0x4}}) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 11:23:21 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:21 executing program 4: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2100.006649] ieee802154 phy0 wpan0: encryption failed: -22 [ 2100.012333] ieee802154 phy1 wpan1: encryption failed: -22 11:23:22 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:22 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @pix_mp={0x10001, 0xe8, 0x47314356, 0x3, 0x0, [{0x0, 0x2000}, {0x0, 0x8}, {}, {0x0, 0x1}, {}, {0x0, 0x2}, {0xeb7f}]}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix={0x6, 0xc0c8, 0x20343059, 0x6, 0x7, 0x6, 0x8, 0x4, 0x0, 0x6, 0x2, 0x4}}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @pix_mp={0x10001, 0xe8, 0x47314356, 0x3, 0x0, [{0x0, 0x2000}, {0x0, 0x8}, {}, {0x0, 0x1}, {}, {0x0, 0x2}, {0xeb7f}]}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix={0x6, 0xc0c8, 0x20343059, 0x6, 0x7, 0x6, 0x8, 0x4, 0x0, 0x6, 0x2, 0x4}}) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) 11:23:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async, rerun: 32) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10000}) (async, rerun: 64) r3 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), r4) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000001280), 0x2109cd9, &(0x7f0000001300)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r1, @ANYRES64=r2, @ANYRESHEX=r3]) 11:23:22 executing program 4: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:22 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:22 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:22 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:22 executing program 2: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:22 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10000}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), r4) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000001280), 0x2109cd9, &(0x7f0000001300)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r1, @ANYRES64=r2, @ANYRESHEX=r3]) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x2, 0x0, 0x10000}) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f00000013c0), r4) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffc, 0x0, &(0x7f0000001280), 0x2109cd9, &(0x7f0000001300)=ANY=[@ANYRESOCT=r0, @ANYRESDEC=r0, @ANYRESOCT=r1, @ANYRES64=r2, @ANYRESHEX=r3]) (async) 11:23:22 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:22 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) 11:23:23 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:23 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:23 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x3) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1, 0x1, 0x7f) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000081) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r2) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0xd1}, 0x20000004) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x60, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvtap0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x20004882}, 0x40001) 11:23:23 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x3) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1, 0x1, 0x7f) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000081) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r2) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0xd1}, 0x20000004) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x60, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvtap0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x20004882}, 0x40001) socket$nl_generic(0x10, 0x3, 0x10) (async) socket(0x1, 0x1, 0x7f) (async) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000081) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r2) (async) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0xd1}, 0x20000004) (async) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x60, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvtap0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x20004882}, 0x40001) (async) 11:23:23 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:23 executing program 2: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:23 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x3) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1, 0x1, 0x7f) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async, rerun: 64) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000081) (async, rerun: 64) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r2) sendmsg$NLBL_UNLABEL_C_LIST(r2, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}]}, 0x30}, 0x1, 0x0, 0x0, 0xd1}, 0x20000004) sendmsg$NLBL_UNLABEL_C_STATICADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x60, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'macvtap0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @loopback}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x20004882}, 0x40001) 11:23:23 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:23 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x8, 0x10000, 0x9, 0xc10, 0x9, 0x6, 0x2b, 0xb6}, &(0x7f0000000280)={0x7fffffff, 0xfff, 0x8000000000000001, 0x10000, 0xffffffff, 0xfffffffffffffe01, 0x3, 0x3}, &(0x7f0000000400)={0x1, 0x8, 0x0, 0x5c, 0x4, 0x6, 0x7b0, 0xe5}, &(0x7f0000000440)={0x0, 0x989680}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xffffffff]}, 0x8}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x18041, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000180)=@multiplanar_userptr={0x4, 0x1, 0x4, 0x0, 0x1, {r2, r3/1000+60000}, {0x5, 0x2, 0x8, 0x0, 0x68, 0x7f, "3f3a82b1"}, 0x80, 0x2, {&(0x7f0000000100)=[{0x7ff, 0x3, {&(0x7f0000000080)}, 0x403}, {0x9, 0x800, {&(0x7f00000000c0)}, 0x8}]}, 0x7, 0x0, r4}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:23 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:23 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = fanotify_init(0x20, 0x0) fanotify_mark(r1, 0x12, 0x40000039, r0, &(0x7f0000000080)='./file0\x00') 11:23:23 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async, rerun: 32) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async, rerun: 32) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) (async) pselect6(0x40, &(0x7f0000000240)={0x8, 0x10000, 0x9, 0xc10, 0x9, 0x6, 0x2b, 0xb6}, &(0x7f0000000280)={0x7fffffff, 0xfff, 0x8000000000000001, 0x10000, 0xffffffff, 0xfffffffffffffe01, 0x3, 0x3}, &(0x7f0000000400)={0x1, 0x8, 0x0, 0x5c, 0x4, 0x6, 0x7b0, 0xe5}, &(0x7f0000000440)={0x0, 0x989680}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xffffffff]}, 0x8}) (async, rerun: 64) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x18041, 0x0) (rerun: 64) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000180)=@multiplanar_userptr={0x4, 0x1, 0x4, 0x0, 0x1, {r2, r3/1000+60000}, {0x5, 0x2, 0x8, 0x0, 0x68, 0x7f, "3f3a82b1"}, 0x80, 0x2, {&(0x7f0000000100)=[{0x7ff, 0x3, {&(0x7f0000000080)}, 0x403}, {0x9, 0x800, {&(0x7f00000000c0)}, 0x8}]}, 0x7, 0x0, r4}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:24 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = fanotify_init(0x20, 0x0) fanotify_mark(r1, 0x12, 0x40000039, r0, &(0x7f0000000080)='./file0\x00') syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) fanotify_init(0x20, 0x0) (async) fanotify_mark(r1, 0x12, 0x40000039, r0, &(0x7f0000000080)='./file0\x00') (async) 11:23:24 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000240)={0x8, 0x10000, 0x9, 0xc10, 0x9, 0x6, 0x2b, 0xb6}, &(0x7f0000000280)={0x7fffffff, 0xfff, 0x8000000000000001, 0x10000, 0xffffffff, 0xfffffffffffffe01, 0x3, 0x3}, &(0x7f0000000400)={0x1, 0x8, 0x0, 0x5c, 0x4, 0x6, 0x7b0, 0xe5}, &(0x7f0000000440)={0x0, 0x989680}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xffffffff]}, 0x8}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x18041, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000180)=@multiplanar_userptr={0x4, 0x1, 0x4, 0x0, 0x1, {r2, r3/1000+60000}, {0x5, 0x2, 0x8, 0x0, 0x68, 0x7f, "3f3a82b1"}, 0x80, 0x2, {&(0x7f0000000100)=[{0x7ff, 0x3, {&(0x7f0000000080)}, 0x403}, {0x9, 0x800, {&(0x7f00000000c0)}, 0x8}]}, 0x7, 0x0, r4}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) clock_gettime(0x0, &(0x7f0000000040)) (async) pselect6(0x40, &(0x7f0000000240)={0x8, 0x10000, 0x9, 0xc10, 0x9, 0x6, 0x2b, 0xb6}, &(0x7f0000000280)={0x7fffffff, 0xfff, 0x8000000000000001, 0x10000, 0xffffffff, 0xfffffffffffffe01, 0x3, 0x3}, &(0x7f0000000400)={0x1, 0x8, 0x0, 0x5c, 0x4, 0x6, 0x7b0, 0xe5}, &(0x7f0000000440)={0x0, 0x989680}, &(0x7f00000004c0)={&(0x7f0000000480)={[0xffffffff]}, 0x8}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x18041, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000180)=@multiplanar_userptr={0x4, 0x1, 0x4, 0x0, 0x1, {r2, r3/1000+60000}, {0x5, 0x2, 0x8, 0x0, 0x68, 0x7f, "3f3a82b1"}, 0x80, 0x2, {&(0x7f0000000100)=[{0x7ff, 0x3, {&(0x7f0000000080)}, 0x403}, {0x9, 0x800, {&(0x7f00000000c0)}, 0x8}]}, 0x7, 0x0, r4}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) 11:23:24 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:24 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)=@fd={0x5, 0x1, 0x4, 0x400, 0x0, {0x77359400}, {0x5, 0x1, 0x29, 0x7f, 0x1, 0x3, "fe633f5f"}, 0xfffffffe, 0x4, {}, 0x5}) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000100), 0x8) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:24 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:24 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = fanotify_init(0x20, 0x0) fanotify_mark(r1, 0x12, 0x40000039, r0, &(0x7f0000000080)='./file0\x00') syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) fanotify_init(0x20, 0x0) (async) fanotify_mark(r1, 0x12, 0x40000039, r0, &(0x7f0000000080)='./file0\x00') (async) 11:23:24 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:24 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:24 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)=@fd={0x5, 0x1, 0x4, 0x400, 0x0, {0x77359400}, {0x5, 0x1, 0x29, 0x7f, 0x1, 0x3, "fe633f5f"}, 0xfffffffe, 0x4, {}, 0x5}) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000100), 0x8) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)=@fd={0x5, 0x1, 0x4, 0x400, 0x0, {0x77359400}, {0x5, 0x1, 0x29, 0x7f, 0x1, 0x3, "fe633f5f"}, 0xfffffffe, 0x4, {}, 0x5}) (async) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)) (async) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000100), 0x8) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) 11:23:24 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000380)=ANY=[]) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:24 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:24 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:24 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f0000000080)=@fd={0x5, 0x1, 0x4, 0x400, 0x0, {0x77359400}, {0x5, 0x1, 0x29, 0x7f, 0x1, 0x3, "fe633f5f"}, 0xfffffffe, 0x4, {}, 0x5}) (async) ioctl$vim2m_VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000100), 0x8) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:24 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYBLOB="098b6c1a128a7c5a1bfa5c6a9adc5a33743f8b5f9b08f1241184dff1913c5a49fd20eee60ef634f38fb64a2f55568774d527fde450d9629e36d79cc75b47f1460139bbcc962e8dca84a4dae40863c6436a2c625966e8e05c739b7bc5935e595e509f2535b84b98a9ba61aeb160d82b4cee47931412abe2a0a6e9edefb52aaf6df857be5a56ed131e579fb899abeb5c00bb9456f9f473e617ec7c2244e035e85c4ac8090b8d5b90f1886bba95951afc0761851dc56f406b97b781dc072ded13178ca5c9aa3e3a6494c1337a9862c94b7b43b81e", @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYBLOB="f138e69f206adf1a4766055bcdf68913f1a492e6d18e", @ANYBLOB="a633e8f8153294610fb028bd4442a0e5ca3f8415eaf0e57943428f1ec560436931a24a0e4645ee9017bab584d06b9d8fdbbddc3ff3660af8ad80d3aed814586d331b9a3311c256c2d149b8d0ffef9cab04fc8b3620d5c2ea557ae05b98a47659953edbe4637ce50902d712f0dbf69e6d183ebeb2f71d56d5daef649b3503d165231186832ff56989874e0f494238aaa2", @ANYRESOCT, @ANYRES64=0x0, @ANYBLOB="1c90922f408ba59917e028fef08cf8cb097b2e777b838fb838f26958dc460e5967d8b759b3ba6e7529e84db72e0354ac3a3b000e5da41dfa589dac6f0ef6d1bb2e8a4f78af47bb182755030513e5f50d40fd43dbca0170c2cc1ea227ace0d42e28e544f9cacdfc46f0ef629410676ce0b5ec77a4e9bc93c9fdbd94b908eaae457a1dd0ef4a54272173bef4566b5066df348249f3260a8ea749bd1318e0e4dc4cc68e0b41525fccb20b1f9d2c7cf4f03b205e5664a616c41ff1ab60"]) 11:23:24 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:24 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix_mp={0x7fffffff, 0x0, 0x0, 0xb, 0xa, [{}, {}, {0x0, 0x7}, {}, {0x0, 0xffffffff}, {0x0, 0x1000}, {}, {0x9}], 0x0, 0x0, 0x2, 0x2, 0x7}}) 11:23:25 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:25 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:25 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async, rerun: 64) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix_mp={0x7fffffff, 0x0, 0x0, 0xb, 0xa, [{}, {}, {0x0, 0x7}, {}, {0x0, 0xffffffff}, {0x0, 0x1000}, {}, {0x9}], 0x0, 0x0, 0x2, 0x2, 0x7}}) (rerun: 64) 11:23:25 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYBLOB="098b6c1a128a7c5a1bfa5c6a9adc5a33743f8b5f9b08f1241184dff1913c5a49fd20eee60ef634f38fb64a2f55568774d527fde450d9629e36d79cc75b47f1460139bbcc962e8dca84a4dae40863c6436a2c625966e8e05c739b7bc5935e595e509f2535b84b98a9ba61aeb160d82b4cee47931412abe2a0a6e9edefb52aaf6df857be5a56ed131e579fb899abeb5c00bb9456f9f473e617ec7c2244e035e85c4ac8090b8d5b90f1886bba95951afc0761851dc56f406b97b781dc072ded13178ca5c9aa3e3a6494c1337a9862c94b7b43b81e", @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYBLOB="f138e69f206adf1a4766055bcdf68913f1a492e6d18e", @ANYBLOB="a633e8f8153294610fb028bd4442a0e5ca3f8415eaf0e57943428f1ec560436931a24a0e4645ee9017bab584d06b9d8fdbbddc3ff3660af8ad80d3aed814586d331b9a3311c256c2d149b8d0ffef9cab04fc8b3620d5c2ea557ae05b98a47659953edbe4637ce50902d712f0dbf69e6d183ebeb2f71d56d5daef649b3503d165231186832ff56989874e0f494238aaa2", @ANYRESOCT, @ANYRES64=0x0, @ANYBLOB="1c90922f408ba59917e028fef08cf8cb097b2e777b838fb838f26958dc460e5967d8b759b3ba6e7529e84db72e0354ac3a3b000e5da41dfa589dac6f0ef6d1bb2e8a4f78af47bb182755030513e5f50d40fd43dbca0170c2cc1ea227ace0d42e28e544f9cacdfc46f0ef629410676ce0b5ec77a4e9bc93c9fdbd94b908eaae457a1dd0ef4a54272173bef4566b5066df348249f3260a8ea749bd1318e0e4dc4cc68e0b41525fccb20b1f9d2c7cf4f03b205e5664a616c41ff1ab60"]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYBLOB="098b6c1a128a7c5a1bfa5c6a9adc5a33743f8b5f9b08f1241184dff1913c5a49fd20eee60ef634f38fb64a2f55568774d527fde450d9629e36d79cc75b47f1460139bbcc962e8dca84a4dae40863c6436a2c625966e8e05c739b7bc5935e595e509f2535b84b98a9ba61aeb160d82b4cee47931412abe2a0a6e9edefb52aaf6df857be5a56ed131e579fb899abeb5c00bb9456f9f473e617ec7c2244e035e85c4ac8090b8d5b90f1886bba95951afc0761851dc56f406b97b781dc072ded13178ca5c9aa3e3a6494c1337a9862c94b7b43b81e", @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYBLOB="f138e69f206adf1a4766055bcdf68913f1a492e6d18e", @ANYBLOB="a633e8f8153294610fb028bd4442a0e5ca3f8415eaf0e57943428f1ec560436931a24a0e4645ee9017bab584d06b9d8fdbbddc3ff3660af8ad80d3aed814586d331b9a3311c256c2d149b8d0ffef9cab04fc8b3620d5c2ea557ae05b98a47659953edbe4637ce50902d712f0dbf69e6d183ebeb2f71d56d5daef649b3503d165231186832ff56989874e0f494238aaa2", @ANYRESOCT, @ANYRES64=0x0, @ANYBLOB="1c90922f408ba59917e028fef08cf8cb097b2e777b838fb838f26958dc460e5967d8b759b3ba6e7529e84db72e0354ac3a3b000e5da41dfa589dac6f0ef6d1bb2e8a4f78af47bb182755030513e5f50d40fd43dbca0170c2cc1ea227ace0d42e28e544f9cacdfc46f0ef629410676ce0b5ec77a4e9bc93c9fdbd94b908eaae457a1dd0ef4a54272173bef4566b5066df348249f3260a8ea749bd1318e0e4dc4cc68e0b41525fccb20b1f9d2c7cf4f03b205e5664a616c41ff1ab60"]) (async) 11:23:25 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:25 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r2, 0x0) 11:23:25 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix_mp={0x7fffffff, 0x0, 0x0, 0xb, 0xa, [{}, {}, {0x0, 0x7}, {}, {0x0, 0xffffffff}, {0x0, 0x1000}, {}, {0x9}], 0x0, 0x0, 0x2, 0x2, 0x7}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x2, @pix_mp={0x7fffffff, 0x0, 0x0, 0xb, 0xa, [{}, {}, {0x0, 0x7}, {}, {0x0, 0xffffffff}, {0x0, 0x1000}, {}, {0x9}], 0x0, 0x0, 0x2, 0x2, 0x7}}) (async) 11:23:25 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:25 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:25 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYBLOB="098b6c1a128a7c5a1bfa5c6a9adc5a33743f8b5f9b08f1241184dff1913c5a49fd20eee60ef634f38fb64a2f55568774d527fde450d9629e36d79cc75b47f1460139bbcc962e8dca84a4dae40863c6436a2c625966e8e05c739b7bc5935e595e509f2535b84b98a9ba61aeb160d82b4cee47931412abe2a0a6e9edefb52aaf6df857be5a56ed131e579fb899abeb5c00bb9456f9f473e617ec7c2244e035e85c4ac8090b8d5b90f1886bba95951afc0761851dc56f406b97b781dc072ded13178ca5c9aa3e3a6494c1337a9862c94b7b43b81e", @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYBLOB="f138e69f206adf1a4766055bcdf68913f1a492e6d18e", @ANYBLOB="a633e8f8153294610fb028bd4442a0e5ca3f8415eaf0e57943428f1ec560436931a24a0e4645ee9017bab584d06b9d8fdbbddc3ff3660af8ad80d3aed814586d331b9a3311c256c2d149b8d0ffef9cab04fc8b3620d5c2ea557ae05b98a47659953edbe4637ce50902d712f0dbf69e6d183ebeb2f71d56d5daef649b3503d165231186832ff56989874e0f494238aaa2", @ANYRESOCT, @ANYRES64=0x0, @ANYBLOB="1c90922f408ba59917e028fef08cf8cb097b2e777b838fb838f26958dc460e5967d8b759b3ba6e7529e84db72e0354ac3a3b000e5da41dfa589dac6f0ef6d1bb2e8a4f78af47bb182755030513e5f50d40fd43dbca0170c2cc1ea227ace0d42e28e544f9cacdfc46f0ef629410676ce0b5ec77a4e9bc93c9fdbd94b908eaae457a1dd0ef4a54272173bef4566b5066df348249f3260a8ea749bd1318e0e4dc4cc68e0b41525fccb20b1f9d2c7cf4f03b205e5664a616c41ff1ab60"]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000000c0)=ANY=[@ANYRESHEX, @ANYBLOB="098b6c1a128a7c5a1bfa5c6a9adc5a33743f8b5f9b08f1241184dff1913c5a49fd20eee60ef634f38fb64a2f55568774d527fde450d9629e36d79cc75b47f1460139bbcc962e8dca84a4dae40863c6436a2c625966e8e05c739b7bc5935e595e509f2535b84b98a9ba61aeb160d82b4cee47931412abe2a0a6e9edefb52aaf6df857be5a56ed131e579fb899abeb5c00bb9456f9f473e617ec7c2244e035e85c4ac8090b8d5b90f1886bba95951afc0761851dc56f406b97b781dc072ded13178ca5c9aa3e3a6494c1337a9862c94b7b43b81e", @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYBLOB="f138e69f206adf1a4766055bcdf68913f1a492e6d18e", @ANYBLOB="a633e8f8153294610fb028bd4442a0e5ca3f8415eaf0e57943428f1ec560436931a24a0e4645ee9017bab584d06b9d8fdbbddc3ff3660af8ad80d3aed814586d331b9a3311c256c2d149b8d0ffef9cab04fc8b3620d5c2ea557ae05b98a47659953edbe4637ce50902d712f0dbf69e6d183ebeb2f71d56d5daef649b3503d165231186832ff56989874e0f494238aaa2", @ANYRESOCT, @ANYRES64=0x0, @ANYBLOB="1c90922f408ba59917e028fef08cf8cb097b2e777b838fb838f26958dc460e5967d8b759b3ba6e7529e84db72e0354ac3a3b000e5da41dfa589dac6f0ef6d1bb2e8a4f78af47bb182755030513e5f50d40fd43dbca0170c2cc1ea227ace0d42e28e544f9cacdfc46f0ef629410676ce0b5ec77a4e9bc93c9fdbd94b908eaae457a1dd0ef4a54272173bef4566b5066df348249f3260a8ea749bd1318e0e4dc4cc68e0b41525fccb20b1f9d2c7cf4f03b205e5664a616c41ff1ab60"]) (async) 11:23:25 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x44d1aa56}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x662cf7a5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4004005) 11:23:25 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:26 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:26 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x44d1aa56}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x662cf7a5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4004005) 11:23:26 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000015c0), 0x2002, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000001600)=@fd={0x29, 0x2, 0x4, 0x0, 0x6, {0x0, 0x2710}, {0x3, 0x1, 0x80, 0x0, 0x8, 0x4, "ee12a795"}, 0x1f, 0x4, {}, 0xe000, 0x0, r0}) socket$caif_stream(0x25, 0x1, 0x4) r1 = getuid() syz_mount_image$ubifs(&(0x7f0000001680), &(0x7f00000016c0)='./file0\x00', 0x800, 0x5, &(0x7f00000019c0)=[{&(0x7f0000001700)="b29da14dad204580f7c09ba45e3397fa76f75311c38d1b559b1acf8e01ff80a345", 0x21, 0xff}, {&(0x7f0000001740)="7cfbf56dcbe71700f7b795434f42a6bdeb368dcac7fa976dd37ce3ee198a2fb4a2e054199b33704c907f116bfa720f48ef3d568ca028d1757978722d9fa3e31e862e3123a2d15274f58a", 0x4a, 0x698}, {&(0x7f00000017c0)="bd280e78e6d6ee3f8d16028e7a1c06e740b1aa563b70453dfe076fde23f758e3180dd8c46795f59e794db46761fa1041aa1e2c03a8ad201941b06ab394dcc93a5bd060863f61055038d9d349a83fcd1146c9cd49ad53e20365902b87aa28f5574cd606003eed86f9f203bf3f909bc9418f2c22637d96a9837a48a2f9bfb64402", 0x80, 0x800}, {&(0x7f0000001840)="eed37fe7d6feca01edf3c08508d3c945d33f1f0f14a3aea48d63997a999b04e7f206c4d5c71b729bb683fe9f516627c4c0591fe3700e285c58eab5379ee85118ab33cc7c9e5fb9333f02aa64e868dd5e019810eedb99b437926ff2a0d6368f85c5a41701ce6bac1483cd17986e069be51e4356973699e1ebf63c4b8a987c4951365c", 0x82, 0x8a}, {&(0x7f0000001900)="e73b52398d10459199c8b2bbdb11bab5a0ee2250440d2aa2df4dca0e96fbe66165424cd54529fb4691982b0bfb2002a8d09be3f05f2688f5392f2b205eb710d0cd3787486af5d23b3af413b8052329d838fcd4023741c7577b61644e6fb4fd61a6c3c7a63ec8d17e94eb21f276c6641998d9fa65e55549c341402982db617f8d592ff857933d590d0dfcb48b7af4cc9c3ba81b9e4834e6e7b5dd2cdc9a6451051dd7bb55f1be243a4225cc55fbfbf6b67145bc505d36", 0xb6, 0x4}], 0x480a, &(0x7f0000001a40)=ANY=[@ANYBLOB="6e6f726d050000006f756e742c617574685f6b65793d3a262c636f6d70723d7a7374642c617574685f686173685f6e616d653d736861312c6e6f726d5f756e6d6f756e742c63686b5f646174615f6372632c6e6f5f62756c6b5f726561642c646f6e745f61707072616973652c60816e747578743d757365725f752c61707072616973655f747970653d696d617369672c00"]) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x6, 0x7, &(0x7f0000001440)=[{&(0x7f0000000100)="1be10008224c0ad0fa0c411a76c4c1fe5bcf299288af5366dc0ba3ca91876c9fe9abe06e813f1486da7ba391afc5bbca06332ef05ff6759b9306ce10c6793a8ee7d1e96c668441c2d5d4e1e0585d2822a474efc8ba168a1732de065dbdbcfc606310a4fb96282ab6380d12165217f8035c22", 0x72, 0x100000000}, {&(0x7f0000000180)="77ac7d4ef879fafce18963412311b25ebb8bd62930823dd25c99e27ada13c7d55ecb0db5d1d57cff246192f4a491fdd3206ec768d3f46d7e7079f4b632b996cf6bda92005790a85b", 0x48, 0x81}, {&(0x7f0000000200)="e02f5c3383bfff23b3ccead837db72be569e056fbb6f5981e153464e7ad8ab262fa1d41dc4849b0f8eeb6c844693036d238fe68e52cc1b5cf212010e1ffd2e2708de4ae642867f90e3e02849c3601739c8f7976fd76f2896c6a44a86789f61669cda3f3c9ed8488c727eca4aa7b03d8de62aa61662aba987869dd259fe0febd8", 0x80, 0x2}, {&(0x7f0000000280)="5684a543f3baf32bb7ba47c2c357a84655ebcb9d0d47284890e40bcc46a29bba4648c1bbb313c7831c0486ee9d67c8dd31b9ed16638608a55f57d47c3f8472c5065db8dabca7a16b97aef52f057690963a34513c2e95823dfe4619c5e3d529283a5f62a05249aef82cbe1b3676cac629", 0x70, 0xdf}, {&(0x7f0000000300)="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", 0x1000, 0x6}, {&(0x7f0000001300)="1a9f2d7091933abce624f4f6cc70b5eabdddf409d893bb81b9e89287f82f51b820b3095d8f3d053ffb683d1e56cfaa67e051c5ac9897805f89349d1a407a4b029cd049d2685e674af189f299023e6336", 0x50, 0x73}, {&(0x7f0000001380)="a76423f2bc154941a1ef4bd5ff54e2517a53d20ee866851c248ebe284e78ff5070f6682383458a405ad7b128baf88d709b36e0b85bf7328d705b70ce99f31233ef8c029e37a730bcd45cf126beb3282b69780813f614ecfa70e70ee13a38b85f1ef63b815345b67e19cb3108b9de2d5687e3a54523f48e28b87fa07378b06bb0c8536af915a2f16f89add965c38ce193fa8d68a76e557c4b4d832f8f0a4e95b4f4d1080b4ab2b10b060f2333002ad3b6b2e2d988", 0xb4, 0xfffffffffffffff8}], 0x400, &(0x7f0000001500)={[{@bulk_read}, {@no_bulk_read}, {@bulk_read}, {@compr_zlib}, {@norm_unmount}, {@compr_none}, {@no_bulk_read}, {@auth_key={'auth_key', 0x3d, 'ubifs\x00'}}, {@compr_lzo}], [{@euid_eq={'euid', 0x3d, r1}}]}) 11:23:26 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:26 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2104.344333] UBIFS error (pid: 19535): cannot open "/dev/loop5", error -22 [ 2104.393119] UBIFS error (pid: 19522): cannot open "/dev/loop5", error -22 11:23:26 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r2, 0x0) 11:23:26 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r1, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x44d1aa56}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x662cf7a5}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @multicast1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x7}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x68}, 0x1, 0x0, 0x0, 0x1}, 0x4004005) 11:23:26 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:26 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:26 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000015c0), 0x2002, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000001600)=@fd={0x29, 0x2, 0x4, 0x0, 0x6, {0x0, 0x2710}, {0x3, 0x1, 0x80, 0x0, 0x8, 0x4, "ee12a795"}, 0x1f, 0x4, {}, 0xe000, 0x0, r0}) (async) socket$caif_stream(0x25, 0x1, 0x4) (async) r1 = getuid() syz_mount_image$ubifs(&(0x7f0000001680), &(0x7f00000016c0)='./file0\x00', 0x800, 0x5, &(0x7f00000019c0)=[{&(0x7f0000001700)="b29da14dad204580f7c09ba45e3397fa76f75311c38d1b559b1acf8e01ff80a345", 0x21, 0xff}, {&(0x7f0000001740)="7cfbf56dcbe71700f7b795434f42a6bdeb368dcac7fa976dd37ce3ee198a2fb4a2e054199b33704c907f116bfa720f48ef3d568ca028d1757978722d9fa3e31e862e3123a2d15274f58a", 0x4a, 0x698}, {&(0x7f00000017c0)="bd280e78e6d6ee3f8d16028e7a1c06e740b1aa563b70453dfe076fde23f758e3180dd8c46795f59e794db46761fa1041aa1e2c03a8ad201941b06ab394dcc93a5bd060863f61055038d9d349a83fcd1146c9cd49ad53e20365902b87aa28f5574cd606003eed86f9f203bf3f909bc9418f2c22637d96a9837a48a2f9bfb64402", 0x80, 0x800}, {&(0x7f0000001840)="eed37fe7d6feca01edf3c08508d3c945d33f1f0f14a3aea48d63997a999b04e7f206c4d5c71b729bb683fe9f516627c4c0591fe3700e285c58eab5379ee85118ab33cc7c9e5fb9333f02aa64e868dd5e019810eedb99b437926ff2a0d6368f85c5a41701ce6bac1483cd17986e069be51e4356973699e1ebf63c4b8a987c4951365c", 0x82, 0x8a}, {&(0x7f0000001900)="e73b52398d10459199c8b2bbdb11bab5a0ee2250440d2aa2df4dca0e96fbe66165424cd54529fb4691982b0bfb2002a8d09be3f05f2688f5392f2b205eb710d0cd3787486af5d23b3af413b8052329d838fcd4023741c7577b61644e6fb4fd61a6c3c7a63ec8d17e94eb21f276c6641998d9fa65e55549c341402982db617f8d592ff857933d590d0dfcb48b7af4cc9c3ba81b9e4834e6e7b5dd2cdc9a6451051dd7bb55f1be243a4225cc55fbfbf6b67145bc505d36", 0xb6, 0x4}], 0x480a, &(0x7f0000001a40)=ANY=[@ANYBLOB="6e6f726d050000006f756e742c617574685f6b65793d3a262c636f6d70723d7a7374642c617574685f686173685f6e616d653d736861312c6e6f726d5f756e6d6f756e742c63686b5f646174615f6372632c6e6f5f62756c6b5f726561642c646f6e745f61707072616973652c60816e747578743d757365725f752c61707072616973655f747970653d696d617369672c00"]) (async) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x6, 0x7, &(0x7f0000001440)=[{&(0x7f0000000100)="1be10008224c0ad0fa0c411a76c4c1fe5bcf299288af5366dc0ba3ca91876c9fe9abe06e813f1486da7ba391afc5bbca06332ef05ff6759b9306ce10c6793a8ee7d1e96c668441c2d5d4e1e0585d2822a474efc8ba168a1732de065dbdbcfc606310a4fb96282ab6380d12165217f8035c22", 0x72, 0x100000000}, {&(0x7f0000000180)="77ac7d4ef879fafce18963412311b25ebb8bd62930823dd25c99e27ada13c7d55ecb0db5d1d57cff246192f4a491fdd3206ec768d3f46d7e7079f4b632b996cf6bda92005790a85b", 0x48, 0x81}, {&(0x7f0000000200)="e02f5c3383bfff23b3ccead837db72be569e056fbb6f5981e153464e7ad8ab262fa1d41dc4849b0f8eeb6c844693036d238fe68e52cc1b5cf212010e1ffd2e2708de4ae642867f90e3e02849c3601739c8f7976fd76f2896c6a44a86789f61669cda3f3c9ed8488c727eca4aa7b03d8de62aa61662aba987869dd259fe0febd8", 0x80, 0x2}, {&(0x7f0000000280)="5684a543f3baf32bb7ba47c2c357a84655ebcb9d0d47284890e40bcc46a29bba4648c1bbb313c7831c0486ee9d67c8dd31b9ed16638608a55f57d47c3f8472c5065db8dabca7a16b97aef52f057690963a34513c2e95823dfe4619c5e3d529283a5f62a05249aef82cbe1b3676cac629", 0x70, 0xdf}, {&(0x7f0000000300)="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", 0x1000, 0x6}, {&(0x7f0000001300)="1a9f2d7091933abce624f4f6cc70b5eabdddf409d893bb81b9e89287f82f51b820b3095d8f3d053ffb683d1e56cfaa67e051c5ac9897805f89349d1a407a4b029cd049d2685e674af189f299023e6336", 0x50, 0x73}, {&(0x7f0000001380)="a76423f2bc154941a1ef4bd5ff54e2517a53d20ee866851c248ebe284e78ff5070f6682383458a405ad7b128baf88d709b36e0b85bf7328d705b70ce99f31233ef8c029e37a730bcd45cf126beb3282b69780813f614ecfa70e70ee13a38b85f1ef63b815345b67e19cb3108b9de2d5687e3a54523f48e28b87fa07378b06bb0c8536af915a2f16f89add965c38ce193fa8d68a76e557c4b4d832f8f0a4e95b4f4d1080b4ab2b10b060f2333002ad3b6b2e2d988", 0xb4, 0xfffffffffffffff8}], 0x400, &(0x7f0000001500)={[{@bulk_read}, {@no_bulk_read}, {@bulk_read}, {@compr_zlib}, {@norm_unmount}, {@compr_none}, {@no_bulk_read}, {@auth_key={'auth_key', 0x3d, 'ubifs\x00'}}, {@compr_lzo}], [{@euid_eq={'euid', 0x3d, r1}}]}) 11:23:26 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x3, @vbi={0x8, 0x5, 0x5, 0x38416761, [0x5, 0x1], [0x3ff, 0xfffffffe], 0x1}}) 11:23:26 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2104.898927] UBIFS error (pid: 19571): cannot open "/dev/loop5", error -22 11:23:26 executing program 2: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:26 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x3, @vbi={0x8, 0x5, 0x5, 0x38416761, [0x5, 0x1], [0x3ff, 0xfffffffe], 0x1}}) 11:23:26 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:26 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000015c0), 0x2002, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000001600)=@fd={0x29, 0x2, 0x4, 0x0, 0x6, {0x0, 0x2710}, {0x3, 0x1, 0x80, 0x0, 0x8, 0x4, "ee12a795"}, 0x1f, 0x4, {}, 0xe000, 0x0, r0}) (async) socket$caif_stream(0x25, 0x1, 0x4) (async) r1 = getuid() syz_mount_image$ubifs(&(0x7f0000001680), &(0x7f00000016c0)='./file0\x00', 0x800, 0x5, &(0x7f00000019c0)=[{&(0x7f0000001700)="b29da14dad204580f7c09ba45e3397fa76f75311c38d1b559b1acf8e01ff80a345", 0x21, 0xff}, {&(0x7f0000001740)="7cfbf56dcbe71700f7b795434f42a6bdeb368dcac7fa976dd37ce3ee198a2fb4a2e054199b33704c907f116bfa720f48ef3d568ca028d1757978722d9fa3e31e862e3123a2d15274f58a", 0x4a, 0x698}, {&(0x7f00000017c0)="bd280e78e6d6ee3f8d16028e7a1c06e740b1aa563b70453dfe076fde23f758e3180dd8c46795f59e794db46761fa1041aa1e2c03a8ad201941b06ab394dcc93a5bd060863f61055038d9d349a83fcd1146c9cd49ad53e20365902b87aa28f5574cd606003eed86f9f203bf3f909bc9418f2c22637d96a9837a48a2f9bfb64402", 0x80, 0x800}, {&(0x7f0000001840)="eed37fe7d6feca01edf3c08508d3c945d33f1f0f14a3aea48d63997a999b04e7f206c4d5c71b729bb683fe9f516627c4c0591fe3700e285c58eab5379ee85118ab33cc7c9e5fb9333f02aa64e868dd5e019810eedb99b437926ff2a0d6368f85c5a41701ce6bac1483cd17986e069be51e4356973699e1ebf63c4b8a987c4951365c", 0x82, 0x8a}, {&(0x7f0000001900)="e73b52398d10459199c8b2bbdb11bab5a0ee2250440d2aa2df4dca0e96fbe66165424cd54529fb4691982b0bfb2002a8d09be3f05f2688f5392f2b205eb710d0cd3787486af5d23b3af413b8052329d838fcd4023741c7577b61644e6fb4fd61a6c3c7a63ec8d17e94eb21f276c6641998d9fa65e55549c341402982db617f8d592ff857933d590d0dfcb48b7af4cc9c3ba81b9e4834e6e7b5dd2cdc9a6451051dd7bb55f1be243a4225cc55fbfbf6b67145bc505d36", 0xb6, 0x4}], 0x480a, &(0x7f0000001a40)=ANY=[@ANYBLOB="6e6f726d050000006f756e742c617574685f6b65793d3a262c636f6d70723d7a7374642c617574685f686173685f6e616d653d736861312c6e6f726d5f756e6d6f756e742c63686b5f646174615f6372632c6e6f5f62756c6b5f726561642c646f6e745f61707072616973652c60816e747578743d757365725f752c61707072616973655f747970653d696d617369672c00"]) (async, rerun: 32) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0/file0\x00', 0x6, 0x7, &(0x7f0000001440)=[{&(0x7f0000000100)="1be10008224c0ad0fa0c411a76c4c1fe5bcf299288af5366dc0ba3ca91876c9fe9abe06e813f1486da7ba391afc5bbca06332ef05ff6759b9306ce10c6793a8ee7d1e96c668441c2d5d4e1e0585d2822a474efc8ba168a1732de065dbdbcfc606310a4fb96282ab6380d12165217f8035c22", 0x72, 0x100000000}, {&(0x7f0000000180)="77ac7d4ef879fafce18963412311b25ebb8bd62930823dd25c99e27ada13c7d55ecb0db5d1d57cff246192f4a491fdd3206ec768d3f46d7e7079f4b632b996cf6bda92005790a85b", 0x48, 0x81}, {&(0x7f0000000200)="e02f5c3383bfff23b3ccead837db72be569e056fbb6f5981e153464e7ad8ab262fa1d41dc4849b0f8eeb6c844693036d238fe68e52cc1b5cf212010e1ffd2e2708de4ae642867f90e3e02849c3601739c8f7976fd76f2896c6a44a86789f61669cda3f3c9ed8488c727eca4aa7b03d8de62aa61662aba987869dd259fe0febd8", 0x80, 0x2}, {&(0x7f0000000280)="5684a543f3baf32bb7ba47c2c357a84655ebcb9d0d47284890e40bcc46a29bba4648c1bbb313c7831c0486ee9d67c8dd31b9ed16638608a55f57d47c3f8472c5065db8dabca7a16b97aef52f057690963a34513c2e95823dfe4619c5e3d529283a5f62a05249aef82cbe1b3676cac629", 0x70, 0xdf}, {&(0x7f0000000300)="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", 0x1000, 0x6}, {&(0x7f0000001300)="1a9f2d7091933abce624f4f6cc70b5eabdddf409d893bb81b9e89287f82f51b820b3095d8f3d053ffb683d1e56cfaa67e051c5ac9897805f89349d1a407a4b029cd049d2685e674af189f299023e6336", 0x50, 0x73}, {&(0x7f0000001380)="a76423f2bc154941a1ef4bd5ff54e2517a53d20ee866851c248ebe284e78ff5070f6682383458a405ad7b128baf88d709b36e0b85bf7328d705b70ce99f31233ef8c029e37a730bcd45cf126beb3282b69780813f614ecfa70e70ee13a38b85f1ef63b815345b67e19cb3108b9de2d5687e3a54523f48e28b87fa07378b06bb0c8536af915a2f16f89add965c38ce193fa8d68a76e557c4b4d832f8f0a4e95b4f4d1080b4ab2b10b060f2333002ad3b6b2e2d988", 0xb4, 0xfffffffffffffff8}], 0x400, &(0x7f0000001500)={[{@bulk_read}, {@no_bulk_read}, {@bulk_read}, {@compr_zlib}, {@norm_unmount}, {@compr_none}, {@no_bulk_read}, {@auth_key={'auth_key', 0x3d, 'ubifs\x00'}}, {@compr_lzo}], [{@euid_eq={'euid', 0x3d, r1}}]}) (rerun: 32) 11:23:26 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:27 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r2, 0x0) 11:23:27 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x3, @vbi={0x8, 0x5, 0x5, 0x38416761, [0x5, 0x1], [0x3ff, 0xfffffffe], 0x1}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x3, @vbi={0x8, 0x5, 0x5, 0x38416761, [0x5, 0x1], [0x3ff, 0xfffffffe], 0x1}}) (async) 11:23:27 executing program 2: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:27 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:27 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2105.163551] UBIFS error (pid: 19593): cannot open "/dev/loop5", error -22 11:23:27 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x5}]}}) [ 2105.546995] UBIFS error (pid: 19593): cannot open "/dev/loop5", error -22 11:23:27 executing program 2: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:27 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:27 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x5}]}}) 11:23:27 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2105.609136] UBIFS error (pid: 19595): cannot open "/dev/loop5", error -22 11:23:27 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:27 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x5}]}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x5}]}}) (async) 11:23:28 executing program 1: r0 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x50, r0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_SECCTX={0x13, 0x7, '/sbin/dhclient\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x48004) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r1, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r2, 0x0) 11:23:28 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:28 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:28 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x8, 0x2, 0x4, 0x0, 0x8}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000080)={0x2, @sliced={0xff, [0x7, 0x1, 0x9, 0x200, 0x20, 0x7, 0xf2, 0x5, 0x7, 0x9, 0x1, 0x9, 0x8, 0x656d, 0x2698, 0x5, 0x5, 0x8, 0x3f49, 0x7ff, 0x0, 0x626a, 0x228, 0x2, 0x7, 0x8001, 0x3, 0x9, 0x3f, 0x0, 0x80, 0x4, 0x100, 0x8, 0x9, 0x9f6a, 0x2, 0x40, 0x20, 0x9, 0x2c, 0x4, 0xd974, 0xffc0, 0x100, 0x100, 0x2c], 0x4}}) 11:23:28 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) 11:23:28 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:28 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:28 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x8, 0x2, 0x4, 0x0, 0x8}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000080)={0x2, @sliced={0xff, [0x7, 0x1, 0x9, 0x200, 0x20, 0x7, 0xf2, 0x5, 0x7, 0x9, 0x1, 0x9, 0x8, 0x656d, 0x2698, 0x5, 0x5, 0x8, 0x3f49, 0x7ff, 0x0, 0x626a, 0x228, 0x2, 0x7, 0x8001, 0x3, 0x9, 0x3f, 0x0, 0x80, 0x4, 0x100, 0x8, 0x9, 0x9f6a, 0x2, 0x40, 0x20, 0x9, 0x2c, 0x4, 0xd974, 0xffc0, 0x100, 0x100, 0x2c], 0x4}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x8, 0x2, 0x4, 0x0, 0x8}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000080)={0x2, @sliced={0xff, [0x7, 0x1, 0x9, 0x200, 0x20, 0x7, 0xf2, 0x5, 0x7, 0x9, 0x1, 0x9, 0x8, 0x656d, 0x2698, 0x5, 0x5, 0x8, 0x3f49, 0x7ff, 0x0, 0x626a, 0x228, 0x2, 0x7, 0x8001, 0x3, 0x9, 0x3f, 0x0, 0x80, 0x4, 0x100, 0x8, 0x9, 0x9f6a, 0x2, 0x40, 0x20, 0x9, 0x2c, 0x4, 0xd974, 0xffc0, 0x100, 0x100, 0x2c], 0x4}}) (async) 11:23:28 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:28 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:28 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000040)={0x8, 0x2, 0x4, 0x0, 0x8}) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) (async, rerun: 32) ioctl$vim2m_VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000080)={0x2, @sliced={0xff, [0x7, 0x1, 0x9, 0x200, 0x20, 0x7, 0xf2, 0x5, 0x7, 0x9, 0x1, 0x9, 0x8, 0x656d, 0x2698, 0x5, 0x5, 0x8, 0x3f49, 0x7ff, 0x0, 0x626a, 0x228, 0x2, 0x7, 0x8001, 0x3, 0x9, 0x3f, 0x0, 0x80, 0x4, 0x100, 0x8, 0x9, 0x9f6a, 0x2, 0x40, 0x20, 0x9, 0x2c, 0x4, 0xd974, 0xffc0, 0x100, 0x100, 0x2c], 0x4}}) (rerun: 32) 11:23:28 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:29 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:29 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000000)) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) 11:23:29 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:29 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:29 executing program 1: syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000780), 0xffffffffffffffff) socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:29 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:29 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000000)) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000000)) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) 11:23:29 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10001, 0x7, &(0x7f0000000400)=[{&(0x7f0000000140)="cb10a3ca0dc6b8f23b155009de9f0a7a6e6243e3beee5f8030306686024cda0dfb54483d79f01dab802e73bc90", 0x2d, 0x5e8}, {&(0x7f00000004c0)="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", 0x142, 0x4}, {&(0x7f0000000380)="93131e7d207575c520e3c2f6ca38f274f8a42cb0020b54b94a0f762a2f92a1f7fddd22e637f74d487fae8de2c370cba98910d10990ddcbb1d1c63e2fb94e7641723b1bb36ae10ac76a238469862bae753496170f1765dc18f45a096826274ed0abc10e0eccd7c066f6db08", 0x6b, 0xffffffffffffffff}, {&(0x7f0000000240)="02b7bdf8a6197dcc7a39775afaab4350d249b60a76ac670d2fe95cc52ab52d574907de2f9181ffd23c52c66a21426185bd27ffc3", 0x34, 0x9}, {&(0x7f0000000280)="b52aca3c914bf78b737cd16c5b736daabc4c9d3e6b7b80ad98190e4a327f3c3deb3d56e15a66b8bfea8d710bf759eb04c36e9bccad8890d1364f293512841942e8a283b61630ea", 0x47, 0x7fffffffffffffff}, {&(0x7f0000000180)="810a7e460c181dea8e133a71beb372476c58b4706c8b0757aa50fa02d2b4fdc298e26af3af982b89e2e1190c37f153eda515faa7b6fb3f02a55da837cec30e80edf3feaf3f8495fe96c0637b452edc4cbac87f3c4be2022cc5310629833cc784592c5affb648989640fa96d5e3ede6377ca00909aec64e", 0xffffffffffffffb7, 0x9}, {&(0x7f00000000c0)="978fc30cd8e3756b9ab7ed832721b13c043bfaf5b4257552a8f5f7830293283416b70328d68108a6c4a55301dadafb85fa650e6f7fe1c9d00213e47916d1d11fda069f1ba27d9718785991e63344d9cf2ea51f6a3e5ad4e1c0ac32215b312062ea1e89af5ff341710a004459a96cc3fafb", 0x71}], 0x28014c0, &(0x7f00000000c0)=ANY=[]) 11:23:29 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:29 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:29 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async, rerun: 32) ioctl$SOUND_MIXER_READ_DEVMASK(r0, 0x80044dfe, &(0x7f0000000000)) (rerun: 32) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) 11:23:29 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:29 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:29 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x802, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000440)={0xe, 0x6, {0x57, 0x81, 0x2, {0x1ff, 0x378}, {0x7f, 0x3ff}, @cond=[{0x11e, 0x9a, 0x9, 0x1, 0x3ff, 0x3f}, {0xfd, 0x80, 0x8, 0x5, 0x3, 0x401}]}, {0x57, 0x8, 0x1d5, {0x8, 0x80}, {0x5, 0xee}, @period={0x5c, 0xfff7, 0x6, 0x101, 0xff, {0x4, 0x1, 0x3dff, 0x9}, 0x4, &(0x7f0000000400)=[0x0, 0x422, 0xffff, 0x2]}}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @raw_data="a3a93f58a3d38661f350f7e9334572819a3246890dfd119ea26fa167949e47ee242f2b1d70105e0f356ad2654ce1ba661f588107a45c0b59ddc319e610a5c96420140656af09971be57677523cedc713061639e4553fec00ea6bb038a3f349bbc5ceb65a91c3245ec8228756455b0880dbccc973f30f48e085d5611211dd6bb8eb67bccb41df220e8a8db8cb68f9e7ab078326b3d72a355f15b6e073a8b407f0c34bac79a9529f8740f28833a1115dff61ea2aaa38b8550d00800000000000009f8aa4eee913c6c7"}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x202800, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0x1, 0x10000, 0x3, {0x1, @sliced={0xfff, [0x76dc, 0x1, 0xd7b7, 0x2, 0x1, 0xfc01, 0x80, 0x2, 0x0, 0x81, 0x1, 0x7, 0x1ff, 0x6, 0x5, 0x4, 0x1, 0x6, 0x100, 0x7fff, 0x6, 0x2e, 0x9, 0xf001, 0x2, 0x8, 0xa1, 0x4, 0xffff, 0x0, 0xffe0, 0x8, 0x0, 0x7, 0x8d5, 0x1f, 0x80, 0x7, 0x4f68, 0xff, 0xffc1, 0x5, 0x1, 0x200, 0xb886, 0xbbc, 0x3, 0x7], 0x6}}, 0xa000}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000040)={0xce, 0x5, 0x3, {0x1, @sliced={0x4, [0x13, 0x46, 0x400, 0x4, 0x80, 0x3, 0x800, 0x6, 0x0, 0x5, 0x0, 0xd250, 0x69b, 0x2, 0x969, 0x18, 0x9, 0x100, 0x6896, 0x3, 0x1, 0x1, 0x9, 0x6, 0x8, 0x6, 0x6, 0x0, 0x8da8, 0xc25a, 0xfffd, 0x8, 0x7, 0x4, 0x23, 0x7, 0x679d, 0x3, 0xf800, 0x3d7, 0x800, 0x3ff, 0x8, 0x1, 0x8, 0x4, 0xd1b1, 0x4da0], 0x401}}, 0xa}) 11:23:30 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:30 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x802, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000440)={0xe, 0x6, {0x57, 0x81, 0x2, {0x1ff, 0x378}, {0x7f, 0x3ff}, @cond=[{0x11e, 0x9a, 0x9, 0x1, 0x3ff, 0x3f}, {0xfd, 0x80, 0x8, 0x5, 0x3, 0x401}]}, {0x57, 0x8, 0x1d5, {0x8, 0x80}, {0x5, 0xee}, @period={0x5c, 0xfff7, 0x6, 0x101, 0xff, {0x4, 0x1, 0x3dff, 0x9}, 0x4, &(0x7f0000000400)=[0x0, 0x422, 0xffff, 0x2]}}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @raw_data="a3a93f58a3d38661f350f7e9334572819a3246890dfd119ea26fa167949e47ee242f2b1d70105e0f356ad2654ce1ba661f588107a45c0b59ddc319e610a5c96420140656af09971be57677523cedc713061639e4553fec00ea6bb038a3f349bbc5ceb65a91c3245ec8228756455b0880dbccc973f30f48e085d5611211dd6bb8eb67bccb41df220e8a8db8cb68f9e7ab078326b3d72a355f15b6e073a8b407f0c34bac79a9529f8740f28833a1115dff61ea2aaa38b8550d00800000000000009f8aa4eee913c6c7"}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x202800, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0x1, 0x10000, 0x3, {0x1, @sliced={0xfff, [0x76dc, 0x1, 0xd7b7, 0x2, 0x1, 0xfc01, 0x80, 0x2, 0x0, 0x81, 0x1, 0x7, 0x1ff, 0x6, 0x5, 0x4, 0x1, 0x6, 0x100, 0x7fff, 0x6, 0x2e, 0x9, 0xf001, 0x2, 0x8, 0xa1, 0x4, 0xffff, 0x0, 0xffe0, 0x8, 0x0, 0x7, 0x8d5, 0x1f, 0x80, 0x7, 0x4f68, 0xff, 0xffc1, 0x5, 0x1, 0x200, 0xb886, 0xbbc, 0x3, 0x7], 0x6}}, 0xa000}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000040)={0xce, 0x5, 0x3, {0x1, @sliced={0x4, [0x13, 0x46, 0x400, 0x4, 0x80, 0x3, 0x800, 0x6, 0x0, 0x5, 0x0, 0xd250, 0x69b, 0x2, 0x969, 0x18, 0x9, 0x100, 0x6896, 0x3, 0x1, 0x1, 0x9, 0x6, 0x8, 0x6, 0x6, 0x0, 0x8da8, 0xc25a, 0xfffd, 0x8, 0x7, 0x4, 0x23, 0x7, 0x679d, 0x3, 0xf800, 0x3d7, 0x800, 0x3ff, 0x8, 0x1, 0x8, 0x4, 0xd1b1, 0x4da0], 0x401}}, 0xa}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x802, 0x0) (async) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000440)={0xe, 0x6, {0x57, 0x81, 0x2, {0x1ff, 0x378}, {0x7f, 0x3ff}, @cond=[{0x11e, 0x9a, 0x9, 0x1, 0x3ff, 0x3f}, {0xfd, 0x80, 0x8, 0x5, 0x3, 0x401}]}, {0x57, 0x8, 0x1d5, {0x8, 0x80}, {0x5, 0xee}, @period={0x5c, 0xfff7, 0x6, 0x101, 0xff, {0x4, 0x1, 0x3dff, 0x9}, 0x4, &(0x7f0000000400)=[0x0, 0x422, 0xffff, 0x2]}}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @raw_data="a3a93f58a3d38661f350f7e9334572819a3246890dfd119ea26fa167949e47ee242f2b1d70105e0f356ad2654ce1ba661f588107a45c0b59ddc319e610a5c96420140656af09971be57677523cedc713061639e4553fec00ea6bb038a3f349bbc5ceb65a91c3245ec8228756455b0880dbccc973f30f48e085d5611211dd6bb8eb67bccb41df220e8a8db8cb68f9e7ab078326b3d72a355f15b6e073a8b407f0c34bac79a9529f8740f28833a1115dff61ea2aaa38b8550d00800000000000009f8aa4eee913c6c7"}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x202800, 0x0) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0x1, 0x10000, 0x3, {0x1, @sliced={0xfff, [0x76dc, 0x1, 0xd7b7, 0x2, 0x1, 0xfc01, 0x80, 0x2, 0x0, 0x81, 0x1, 0x7, 0x1ff, 0x6, 0x5, 0x4, 0x1, 0x6, 0x100, 0x7fff, 0x6, 0x2e, 0x9, 0xf001, 0x2, 0x8, 0xa1, 0x4, 0xffff, 0x0, 0xffe0, 0x8, 0x0, 0x7, 0x8d5, 0x1f, 0x80, 0x7, 0x4f68, 0xff, 0xffc1, 0x5, 0x1, 0x200, 0xb886, 0xbbc, 0x3, 0x7], 0x6}}, 0xa000}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000040)={0xce, 0x5, 0x3, {0x1, @sliced={0x4, [0x13, 0x46, 0x400, 0x4, 0x80, 0x3, 0x800, 0x6, 0x0, 0x5, 0x0, 0xd250, 0x69b, 0x2, 0x969, 0x18, 0x9, 0x100, 0x6896, 0x3, 0x1, 0x1, 0x9, 0x6, 0x8, 0x6, 0x6, 0x0, 0x8da8, 0xc25a, 0xfffd, 0x8, 0x7, 0x4, 0x23, 0x7, 0x679d, 0x3, 0xf800, 0x3d7, 0x800, 0x3ff, 0x8, 0x1, 0x8, 0x4, 0xd1b1, 0x4da0], 0x401}}, 0xa}) (async) 11:23:30 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:30 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:30 executing program 3: openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x802, 0x0) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000440)={0xe, 0x6, {0x57, 0x81, 0x2, {0x1ff, 0x378}, {0x7f, 0x3ff}, @cond=[{0x11e, 0x9a, 0x9, 0x1, 0x3ff, 0x3f}, {0xfd, 0x80, 0x8, 0x5, 0x3, 0x401}]}, {0x57, 0x8, 0x1d5, {0x8, 0x80}, {0x5, 0xee}, @period={0x5c, 0xfff7, 0x6, 0x101, 0xff, {0x4, 0x1, 0x3dff, 0x9}, 0x4, &(0x7f0000000400)=[0x0, 0x422, 0xffff, 0x2]}}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @raw_data="a3a93f58a3d38661f350f7e9334572819a3246890dfd119ea26fa167949e47ee242f2b1d70105e0f356ad2654ce1ba661f588107a45c0b59ddc319e610a5c96420140656af09971be57677523cedc713061639e4553fec00ea6bb038a3f349bbc5ceb65a91c3245ec8228756455b0880dbccc973f30f48e085d5611211dd6bb8eb67bccb41df220e8a8db8cb68f9e7ab078326b3d72a355f15b6e073a8b407f0c34bac79a9529f8740f28833a1115dff61ea2aaa38b8550d00800000000000009f8aa4eee913c6c7"}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x202800, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0x1, 0x10000, 0x3, {0x1, @sliced={0xfff, [0x76dc, 0x1, 0xd7b7, 0x2, 0x1, 0xfc01, 0x80, 0x2, 0x0, 0x81, 0x1, 0x7, 0x1ff, 0x6, 0x5, 0x4, 0x1, 0x6, 0x100, 0x7fff, 0x6, 0x2e, 0x9, 0xf001, 0x2, 0x8, 0xa1, 0x4, 0xffff, 0x0, 0xffe0, 0x8, 0x0, 0x7, 0x8d5, 0x1f, 0x80, 0x7, 0x4f68, 0xff, 0xffc1, 0x5, 0x1, 0x200, 0xb886, 0xbbc, 0x3, 0x7], 0x6}}, 0xa000}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000040)={0xce, 0x5, 0x3, {0x1, @sliced={0x4, [0x13, 0x46, 0x400, 0x4, 0x80, 0x3, 0x800, 0x6, 0x0, 0x5, 0x0, 0xd250, 0x69b, 0x2, 0x969, 0x18, 0x9, 0x100, 0x6896, 0x3, 0x1, 0x1, 0x9, 0x6, 0x8, 0x6, 0x6, 0x0, 0x8da8, 0xc25a, 0xfffd, 0x8, 0x7, 0x4, 0x23, 0x7, 0x679d, 0x3, 0xf800, 0x3d7, 0x800, 0x3ff, 0x8, 0x1, 0x8, 0x4, 0xd1b1, 0x4da0], 0x401}}, 0xa}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280), 0x802, 0x0) (async) ioctl$UI_END_FF_UPLOAD(r1, 0x406855c9, &(0x7f0000000440)={0xe, 0x6, {0x57, 0x81, 0x2, {0x1ff, 0x378}, {0x7f, 0x3ff}, @cond=[{0x11e, 0x9a, 0x9, 0x1, 0x3ff, 0x3f}, {0xfd, 0x80, 0x8, 0x5, 0x3, 0x401}]}, {0x57, 0x8, 0x1d5, {0x8, 0x80}, {0x5, 0xee}, @period={0x5c, 0xfff7, 0x6, 0x101, 0xff, {0x4, 0x1, 0x3dff, 0x9}, 0x4, &(0x7f0000000400)=[0x0, 0x422, 0xffff, 0x2]}}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @raw_data="a3a93f58a3d38661f350f7e9334572819a3246890dfd119ea26fa167949e47ee242f2b1d70105e0f356ad2654ce1ba661f588107a45c0b59ddc319e610a5c96420140656af09971be57677523cedc713061639e4553fec00ea6bb038a3f349bbc5ceb65a91c3245ec8228756455b0880dbccc973f30f48e085d5611211dd6bb8eb67bccb41df220e8a8db8cb68f9e7ab078326b3d72a355f15b6e073a8b407f0c34bac79a9529f8740f28833a1115dff61ea2aaa38b8550d00800000000000009f8aa4eee913c6c7"}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x202800, 0x0) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000180)={0x1, 0x10000, 0x3, {0x1, @sliced={0xfff, [0x76dc, 0x1, 0xd7b7, 0x2, 0x1, 0xfc01, 0x80, 0x2, 0x0, 0x81, 0x1, 0x7, 0x1ff, 0x6, 0x5, 0x4, 0x1, 0x6, 0x100, 0x7fff, 0x6, 0x2e, 0x9, 0xf001, 0x2, 0x8, 0xa1, 0x4, 0xffff, 0x0, 0xffe0, 0x8, 0x0, 0x7, 0x8d5, 0x1f, 0x80, 0x7, 0x4f68, 0xff, 0xffc1, 0x5, 0x1, 0x200, 0xb886, 0xbbc, 0x3, 0x7], 0x6}}, 0xa000}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r3, 0xc100565c, &(0x7f0000000040)={0xce, 0x5, 0x3, {0x1, @sliced={0x4, [0x13, 0x46, 0x400, 0x4, 0x80, 0x3, 0x800, 0x6, 0x0, 0x5, 0x0, 0xd250, 0x69b, 0x2, 0x969, 0x18, 0x9, 0x100, 0x6896, 0x3, 0x1, 0x1, 0x9, 0x6, 0x8, 0x6, 0x6, 0x0, 0x8da8, 0xc25a, 0xfffd, 0x8, 0x7, 0x4, 0x23, 0x7, 0x679d, 0x3, 0xf800, 0x3d7, 0x800, 0x3ff, 0x8, 0x1, 0x8, 0x4, 0xd1b1, 0x4da0], 0x401}}, 0xa}) (async) 11:23:30 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:30 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:30 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10001, 0x7, &(0x7f0000000400)=[{&(0x7f0000000140)="cb10a3ca0dc6b8f23b155009de9f0a7a6e6243e3beee5f8030306686024cda0dfb54483d79f01dab802e73bc90", 0x2d, 0x5e8}, {&(0x7f00000004c0)="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", 0x142, 0x4}, {&(0x7f0000000380)="93131e7d207575c520e3c2f6ca38f274f8a42cb0020b54b94a0f762a2f92a1f7fddd22e637f74d487fae8de2c370cba98910d10990ddcbb1d1c63e2fb94e7641723b1bb36ae10ac76a238469862bae753496170f1765dc18f45a096826274ed0abc10e0eccd7c066f6db08", 0x6b, 0xffffffffffffffff}, {&(0x7f0000000240)="02b7bdf8a6197dcc7a39775afaab4350d249b60a76ac670d2fe95cc52ab52d574907de2f9181ffd23c52c66a21426185bd27ffc3", 0x34, 0x9}, {&(0x7f0000000280)="b52aca3c914bf78b737cd16c5b736daabc4c9d3e6b7b80ad98190e4a327f3c3deb3d56e15a66b8bfea8d710bf759eb04c36e9bccad8890d1364f293512841942e8a283b61630ea", 0x47, 0x7fffffffffffffff}, {&(0x7f0000000180)="810a7e460c181dea8e133a71beb372476c58b4706c8b0757aa50fa02d2b4fdc298e26af3af982b89e2e1190c37f153eda515faa7b6fb3f02a55da837cec30e80edf3feaf3f8495fe96c0637b452edc4cbac87f3c4be2022cc5310629833cc784592c5affb648989640fa96d5e3ede6377ca00909aec64e", 0xffffffffffffffb7, 0x9}, {&(0x7f00000000c0)="978fc30cd8e3756b9ab7ed832721b13c043bfaf5b4257552a8f5f7830293283416b70328d68108a6c4a55301dadafb85fa650e6f7fe1c9d00213e47916d1d11fda069f1ba27d9718785991e63344d9cf2ea51f6a3e5ad4e1c0ac32215b312062ea1e89af5ff341710a004459a96cc3fafb", 0x71}], 0x28014c0, &(0x7f00000000c0)=ANY=[]) 11:23:30 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:30 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x3231564e, 0x0, 0x0, [{0x200}, {}, {}, {}, {}, {}, {0x0, 0x47ed}], 0x0, 0x0, 0x0, 0x0, 0x4}}) 11:23:30 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:30 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:30 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x3231564e, 0x0, 0x0, [{0x200}, {}, {}, {}, {}, {}, {0x0, 0x47ed}], 0x0, 0x0, 0x0, 0x0, 0x4}}) 11:23:30 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:31 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:31 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x3231564e, 0x0, 0x0, [{0x200}, {}, {}, {}, {}, {}, {0x0, 0x47ed}], 0x0, 0x0, 0x0, 0x0, 0x4}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x3231564e, 0x0, 0x0, [{0x200}, {}, {}, {}, {}, {}, {0x0, 0x47ed}], 0x0, 0x0, 0x0, 0x0, 0x4}}) (async) 11:23:31 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:31 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:31 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:31 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10001, 0x7, &(0x7f0000000400)=[{&(0x7f0000000140)="cb10a3ca0dc6b8f23b155009de9f0a7a6e6243e3beee5f8030306686024cda0dfb54483d79f01dab802e73bc90", 0x2d, 0x5e8}, {&(0x7f00000004c0)="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", 0x142, 0x4}, {&(0x7f0000000380)="93131e7d207575c520e3c2f6ca38f274f8a42cb0020b54b94a0f762a2f92a1f7fddd22e637f74d487fae8de2c370cba98910d10990ddcbb1d1c63e2fb94e7641723b1bb36ae10ac76a238469862bae753496170f1765dc18f45a096826274ed0abc10e0eccd7c066f6db08", 0x6b, 0xffffffffffffffff}, {&(0x7f0000000240)="02b7bdf8a6197dcc7a39775afaab4350d249b60a76ac670d2fe95cc52ab52d574907de2f9181ffd23c52c66a21426185bd27ffc3", 0x34, 0x9}, {&(0x7f0000000280)="b52aca3c914bf78b737cd16c5b736daabc4c9d3e6b7b80ad98190e4a327f3c3deb3d56e15a66b8bfea8d710bf759eb04c36e9bccad8890d1364f293512841942e8a283b61630ea", 0x47, 0x7fffffffffffffff}, {&(0x7f0000000180)="810a7e460c181dea8e133a71beb372476c58b4706c8b0757aa50fa02d2b4fdc298e26af3af982b89e2e1190c37f153eda515faa7b6fb3f02a55da837cec30e80edf3feaf3f8495fe96c0637b452edc4cbac87f3c4be2022cc5310629833cc784592c5affb648989640fa96d5e3ede6377ca00909aec64e", 0xffffffffffffffb7, 0x9}, {&(0x7f00000000c0)="978fc30cd8e3756b9ab7ed832721b13c043bfaf5b4257552a8f5f7830293283416b70328d68108a6c4a55301dadafb85fa650e6f7fe1c9d00213e47916d1d11fda069f1ba27d9718785991e63344d9cf2ea51f6a3e5ad4e1c0ac32215b312062ea1e89af5ff341710a004459a96cc3fafb", 0x71}], 0x28014c0, &(0x7f00000000c0)=ANY=[]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10001, 0x7, &(0x7f0000000400)=[{&(0x7f0000000140)="cb10a3ca0dc6b8f23b155009de9f0a7a6e6243e3beee5f8030306686024cda0dfb54483d79f01dab802e73bc90", 0x2d, 0x5e8}, {&(0x7f00000004c0)="a4d1ae59b0feb5d50b665c811d5e734d1ac93798ff2f8a800734708902839bb97a3201d5ac41798ce7c127e7cea662abcbdb4f829e75d14958fbb3bd44ece4b63bc07668a2d3576677b25a872cdd554c3060b500beb3b82ed1eb71f377c0c371e7350f76e886bc1b4d9ba8886d5ccdb3c30ca319e15e3efd216c41dee2666b57e94ce2edee047f09cedf73550abc7fdfb70ea4a7c5199a1f8faff4b5a4d138f4eed6b82a33d8231731f9f40325a5fe1d160afcb56523651a536bcd7ee03549ff3819e2db8573a9dea74471a86af038c0cba4b129ec124b9ba9aaa951629d45420ecb2ad93c620db5f676a7507dae113a4a42c18f070e8c6bf73d8e38751800721dc1f17063296b3ba6509329bb262d38a711a09a2e3ac2bcee238202102ae9e64b6b848aae6470b1ac55c76605fe8a1a2000000000000000d2e11933ee1269959784", 0x142, 0x4}, {&(0x7f0000000380)="93131e7d207575c520e3c2f6ca38f274f8a42cb0020b54b94a0f762a2f92a1f7fddd22e637f74d487fae8de2c370cba98910d10990ddcbb1d1c63e2fb94e7641723b1bb36ae10ac76a238469862bae753496170f1765dc18f45a096826274ed0abc10e0eccd7c066f6db08", 0x6b, 0xffffffffffffffff}, {&(0x7f0000000240)="02b7bdf8a6197dcc7a39775afaab4350d249b60a76ac670d2fe95cc52ab52d574907de2f9181ffd23c52c66a21426185bd27ffc3", 0x34, 0x9}, {&(0x7f0000000280)="b52aca3c914bf78b737cd16c5b736daabc4c9d3e6b7b80ad98190e4a327f3c3deb3d56e15a66b8bfea8d710bf759eb04c36e9bccad8890d1364f293512841942e8a283b61630ea", 0x47, 0x7fffffffffffffff}, {&(0x7f0000000180)="810a7e460c181dea8e133a71beb372476c58b4706c8b0757aa50fa02d2b4fdc298e26af3af982b89e2e1190c37f153eda515faa7b6fb3f02a55da837cec30e80edf3feaf3f8495fe96c0637b452edc4cbac87f3c4be2022cc5310629833cc784592c5affb648989640fa96d5e3ede6377ca00909aec64e", 0xffffffffffffffb7, 0x9}, {&(0x7f00000000c0)="978fc30cd8e3756b9ab7ed832721b13c043bfaf5b4257552a8f5f7830293283416b70328d68108a6c4a55301dadafb85fa650e6f7fe1c9d00213e47916d1d11fda069f1ba27d9718785991e63344d9cf2ea51f6a3e5ad4e1c0ac32215b312062ea1e89af5ff341710a004459a96cc3fafb", 0x71}], 0x28014c0, &(0x7f00000000c0)=ANY=[]) (async) 11:23:31 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:31 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @vbi={0x9, 0x5, 0xec18, 0x6031b17, [0x3, 0xfffffffd], [0x1, 0x8000], 0x13a}}) 11:23:31 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:31 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:31 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @vbi={0x9, 0x5, 0xec18, 0x6031b17, [0x3, 0xfffffffd], [0x1, 0x8000], 0x13a}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @vbi={0x9, 0x5, 0xec18, 0x6031b17, [0x3, 0xfffffffd], [0x1, 0x8000], 0x13a}}) (async) 11:23:31 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:32 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x1, 0x31, 0x7e, 0xc0000, {{0x32, 0x4, 0x1, 0x0, 0xc8, 0x64, 0x0, 0xe3, 0x4, 0x0, @private=0xa010102, @empty, {[@end, @cipso={0x86, 0x17, 0x2, [{0x1, 0xf, "3e3d801c1234962495295c2c47"}, {0x1, 0x2}]}, @timestamp_addr={0x44, 0x44, 0xe7, 0x1, 0xf, [{@loopback, 0xeb4}, {@local, 0x8001}, {@multicast2, 0x5}, {@local, 0x4}, {@dev={0xac, 0x14, 0x14, 0x10}, 0x3ff}, {@multicast2, 0xfff}, {@local, 0x8}, {@rand_addr=0x64010102, 0x8}]}, @cipso={0x86, 0x55, 0x1, [{0x0, 0xa, "19070ce483b20c9f"}, {0x5, 0x7, "7a6afd9d52"}, {0x6, 0x2}, {0x6, 0xa, "2dec0699b868c154"}, {0x0, 0x12, "7dcffccc171f26bb08a597c0d650eaf5"}, {0x1, 0x11, "719832370ea6146923fd713092b823"}, {0x5, 0x3, "f2"}, {0x6, 0x2}, {0x7, 0x8, "9bf215f8e23d"}, {0x1, 0x2}]}, @end, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', r0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r1, 0x0) 11:23:32 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @vbi={0x9, 0x5, 0xec18, 0x6031b17, [0x3, 0xfffffffd], [0x1, 0x8000], 0x13a}}) 11:23:32 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:32 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:32 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:32 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="fb3d78ac5ad28c1a0d2d6f5bf915fdb71d710d7442062eedaf34e13b91c004a60e9d22ba01d7a56c852214c5358b2ed24ee9efad4a4727488c2e02ae20f7ae2322ff842e94d7f4f4aedf06aabb6f550732cc348f6726d189c166e5141d2f9c3ac7d35e5fea8edd8fc37fe35e51ffafb0fc172bb8085552371a3ad2", 0x7b, 0x800}, {&(0x7f0000000180)="776e312b4bcea9c1767c74467e4b8de11867d7970edf2a81eb8db255c988fb1bb959f3270fc252b84b23ec707b8523fc2275c0ac342eabbe93c0e2d7e2d18db63ea07472c66a99a4f822903dddd994fe870ec8d64b130c49f8685609b56f7d81cce9aaf77de5e8e584c16b2fc254923ef5c819a9867dfa5e242ee189363d97837fd34780694b3c431a06c3f4a21cefb5b196cd81ce33a3c204ef0d81bab09a428bfa0956c3303c880837140581e898a7b466e615eb66ece4c74970a8e81fbb", 0xbf}], 0x8a, &(0x7f0000000280)={[{@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}, {}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ubifs\x00'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@measure}]}) 11:23:32 executing program 3: ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:32 executing program 3: ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:32 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:32 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:32 executing program 3: ioctl$vim2m_VIDIOC_S_FMT(0xffffffffffffffff, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) 11:23:32 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:33 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:33 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="fb3d78ac5ad28c1a0d2d6f5bf915fdb71d710d7442062eedaf34e13b91c004a60e9d22ba01d7a56c852214c5358b2ed24ee9efad4a4727488c2e02ae20f7ae2322ff842e94d7f4f4aedf06aabb6f550732cc348f6726d189c166e5141d2f9c3ac7d35e5fea8edd8fc37fe35e51ffafb0fc172bb8085552371a3ad2", 0x7b, 0x800}, {&(0x7f0000000180)="776e312b4bcea9c1767c74467e4b8de11867d7970edf2a81eb8db255c988fb1bb959f3270fc252b84b23ec707b8523fc2275c0ac342eabbe93c0e2d7e2d18db63ea07472c66a99a4f822903dddd994fe870ec8d64b130c49f8685609b56f7d81cce9aaf77de5e8e584c16b2fc254923ef5c819a9867dfa5e242ee189363d97837fd34780694b3c431a06c3f4a21cefb5b196cd81ce33a3c204ef0d81bab09a428bfa0956c3303c880837140581e898a7b466e615eb66ece4c74970a8e81fbb", 0xbf}], 0x8a, &(0x7f0000000280)={[{@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}, {}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ubifs\x00'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@measure}]}) 11:23:33 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:33 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x8001, 0x1, 0x1, {0x3, @raw_data="c1598a2cf4c80e8c496e3cf79410eeaebaa8b240bb135e9d8e765073aab91f42c58a4fdc90762972c5ed741403ef334dead29c442cc0e7a85e12347ab14c4a2c479e3deb44987ca53064f60bac4b94de0f9560ea13b52ecb44d997e608b927fdfd0c83408dc97d7bb23c312c1aec102b0f65bb0c7faadcc7f5b5456e6037f384df25e4c989ba6ca19e2e473cc8f29f948f924768e090ee691153d1607ba7948844cb1af350bf1815b78c247b3aea11a6eac1b95213ce687c6fd4678c95deb60a3bcef5ca984683a5"}, 0x40}) 11:23:33 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:33 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:33 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x8001, 0x1, 0x1, {0x3, @raw_data="c1598a2cf4c80e8c496e3cf79410eeaebaa8b240bb135e9d8e765073aab91f42c58a4fdc90762972c5ed741403ef334dead29c442cc0e7a85e12347ab14c4a2c479e3deb44987ca53064f60bac4b94de0f9560ea13b52ecb44d997e608b927fdfd0c83408dc97d7bb23c312c1aec102b0f65bb0c7faadcc7f5b5456e6037f384df25e4c989ba6ca19e2e473cc8f29f948f924768e090ee691153d1607ba7948844cb1af350bf1815b78c247b3aea11a6eac1b95213ce687c6fd4678c95deb60a3bcef5ca984683a5"}, 0x40}) 11:23:33 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:33 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x8001, 0x1, 0x1, {0x3, @raw_data="c1598a2cf4c80e8c496e3cf79410eeaebaa8b240bb135e9d8e765073aab91f42c58a4fdc90762972c5ed741403ef334dead29c442cc0e7a85e12347ab14c4a2c479e3deb44987ca53064f60bac4b94de0f9560ea13b52ecb44d997e608b927fdfd0c83408dc97d7bb23c312c1aec102b0f65bb0c7faadcc7f5b5456e6037f384df25e4c989ba6ca19e2e473cc8f29f948f924768e090ee691153d1607ba7948844cb1af350bf1815b78c247b3aea11a6eac1b95213ce687c6fd4678c95deb60a3bcef5ca984683a5"}, 0x40}) [ 2110.640787] UBIFS error (pid: 20018): cannot open "/dev/loop5", error -22 11:23:33 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x100000001, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="fb3d78ac5ad28c1a0d2d6f5bf915fdb71d710d7442062eedaf34e13b91c004a60e9d22ba01d7a56c852214c5358b2ed24ee9efad4a4727488c2e02ae20f7ae2322ff842e94d7f4f4aedf06aabb6f550732cc348f6726d189c166e5141d2f9c3ac7d35e5fea8edd8fc37fe35e51ffafb0fc172bb8085552371a3ad2", 0x7b, 0x800}, {&(0x7f0000000180)="776e312b4bcea9c1767c74467e4b8de11867d7970edf2a81eb8db255c988fb1bb959f3270fc252b84b23ec707b8523fc2275c0ac342eabbe93c0e2d7e2d18db63ea07472c66a99a4f822903dddd994fe870ec8d64b130c49f8685609b56f7d81cce9aaf77de5e8e584c16b2fc254923ef5c819a9867dfa5e242ee189363d97837fd34780694b3c431a06c3f4a21cefb5b196cd81ce33a3c204ef0d81bab09a428bfa0956c3303c880837140581e898a7b466e615eb66ece4c74970a8e81fbb", 0xbf}], 0x8a, &(0x7f0000000280)={[{@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}, {}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ubifs\x00'}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@measure}]}) 11:23:33 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:33 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:34 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:34 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x46dd937e, 0x2, &(0x7f0000000180)=[{&(0x7f00000004c0)="0414be5ffce394e2acbd45346d1ce7a1b519b891119b8767bda8a6b35955f61cdc0632ab6488fc227bc2f5af76ee32821876a26d1a3dff3f6b1abec8f21998335b2d9fa85ee1655fdd12ed85ab38b62bfa95b83703c0261c6f48277d71518f48d628ed4a0163e1a6361d17ca7fbebfc119a2ac8df0b5249593b30c697c31f5583832ffa3cfce2c1c1dd30af6a1b22482daacdf2e38e7d3da53d5face40f20029749a4d025893", 0xa6, 0x5}, {&(0x7f0000000100)="9904e690732afb1dcece5d8a89a52e44e00400000081d9b9d2dc67c825e3bcece9744ef1a8c13b3a0ab428d18cae5102cfd1b79b65fe4cbe608bd3a9ba5183560e69987ac44c8474783569c7000e88cb465377593b7c259e3eff6e62a375bfaab2a4ee94a365507f8e13f97e0447", 0x6e, 0x7fffffff}], 0x804, &(0x7f0000000400)={[{@no_bulk_read}, {@bulk_read}, {@auth_key}, {@compr_lzo}, {}], [{@subj_user={'subj_user', 0x3d, '+]'}}, {@seclabel}, {@audit}, {@obj_role={'obj_role', 0x3d, '/dev/vim2m\x00'}}, {@dont_appraise}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vim2m\x00'}}, {@dont_hash}]}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000200)=@fd={0x4, 0x1, 0x4, 0x0, 0x1f, {}, {0x3, 0xa, 0x3, 0xd7, 0x1, 0x9, "24e62d5f"}, 0x8, 0x4, {}, 0x4, 0x0, r3}) fanotify_mark(0xffffffffffffffff, 0x10, 0x20, r1, &(0x7f0000000280)='./file0\x00') r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000580)={0x0, @pix={0x1f, 0x101, 0x32435750, 0x9, 0x2, 0x6, 0x2, 0xfffffc9d, 0x1, 0x2, 0x0, 0x3}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x59555956, 0x0, 0x0, [{}, {}, {}, {}, {0xfffffffd}]}}) 11:23:34 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x2805401, &(0x7f0000000680)=ANY=[]) 11:23:34 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:34 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:34 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:34 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2111.366852] UBIFS error (pid: 20076): cannot open "/dev/loop5", error -22 11:23:34 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x2805401, &(0x7f0000000680)=ANY=[]) 11:23:34 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) r1 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x46dd937e, 0x2, &(0x7f0000000180)=[{&(0x7f00000004c0)="0414be5ffce394e2acbd45346d1ce7a1b519b891119b8767bda8a6b35955f61cdc0632ab6488fc227bc2f5af76ee32821876a26d1a3dff3f6b1abec8f21998335b2d9fa85ee1655fdd12ed85ab38b62bfa95b83703c0261c6f48277d71518f48d628ed4a0163e1a6361d17ca7fbebfc119a2ac8df0b5249593b30c697c31f5583832ffa3cfce2c1c1dd30af6a1b22482daacdf2e38e7d3da53d5face40f20029749a4d025893", 0xa6, 0x5}, {&(0x7f0000000100)="9904e690732afb1dcece5d8a89a52e44e00400000081d9b9d2dc67c825e3bcece9744ef1a8c13b3a0ab428d18cae5102cfd1b79b65fe4cbe608bd3a9ba5183560e69987ac44c8474783569c7000e88cb465377593b7c259e3eff6e62a375bfaab2a4ee94a365507f8e13f97e0447", 0x6e, 0x7fffffff}], 0x804, &(0x7f0000000400)={[{@no_bulk_read}, {@bulk_read}, {@auth_key}, {@compr_lzo}, {}], [{@subj_user={'subj_user', 0x3d, '+]'}}, {@seclabel}, {@audit}, {@obj_role={'obj_role', 0x3d, '/dev/vim2m\x00'}}, {@dont_appraise}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vim2m\x00'}}, {@dont_hash}]}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000200)=@fd={0x4, 0x1, 0x4, 0x0, 0x1f, {}, {0x3, 0xa, 0x3, 0xd7, 0x1, 0x9, "24e62d5f"}, 0x8, 0x4, {}, 0x4, 0x0, r3}) (async) fanotify_mark(0xffffffffffffffff, 0x10, 0x20, r1, &(0x7f0000000280)='./file0\x00') (async) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000580)={0x0, @pix={0x1f, 0x101, 0x32435750, 0x9, 0x2, 0x6, 0x2, 0xfffffc9d, 0x1, 0x2, 0x0, 0x3}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x59555956, 0x0, 0x0, [{}, {}, {}, {}, {0xfffffffd}]}}) 11:23:34 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:34 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:34 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2112.288445] UBIFS error (pid: 20133): cannot open "/dev/loop3", error -22 11:23:35 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:35 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x2805401, &(0x7f0000000680)=ANY=[]) 11:23:35 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:35 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:35 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:35 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r1 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x46dd937e, 0x2, &(0x7f0000000180)=[{&(0x7f00000004c0)="0414be5ffce394e2acbd45346d1ce7a1b519b891119b8767bda8a6b35955f61cdc0632ab6488fc227bc2f5af76ee32821876a26d1a3dff3f6b1abec8f21998335b2d9fa85ee1655fdd12ed85ab38b62bfa95b83703c0261c6f48277d71518f48d628ed4a0163e1a6361d17ca7fbebfc119a2ac8df0b5249593b30c697c31f5583832ffa3cfce2c1c1dd30af6a1b22482daacdf2e38e7d3da53d5face40f20029749a4d025893", 0xa6, 0x5}, {&(0x7f0000000100)="9904e690732afb1dcece5d8a89a52e44e00400000081d9b9d2dc67c825e3bcece9744ef1a8c13b3a0ab428d18cae5102cfd1b79b65fe4cbe608bd3a9ba5183560e69987ac44c8474783569c7000e88cb465377593b7c259e3eff6e62a375bfaab2a4ee94a365507f8e13f97e0447", 0x6e, 0x7fffffff}], 0x804, &(0x7f0000000400)={[{@no_bulk_read}, {@bulk_read}, {@auth_key}, {@compr_lzo}, {}], [{@subj_user={'subj_user', 0x3d, '+]'}}, {@seclabel}, {@audit}, {@obj_role={'obj_role', 0x3d, '/dev/vim2m\x00'}}, {@dont_appraise}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vim2m\x00'}}, {@dont_hash}]}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000200)=@fd={0x4, 0x1, 0x4, 0x0, 0x1f, {}, {0x3, 0xa, 0x3, 0xd7, 0x1, 0x9, "24e62d5f"}, 0x8, 0x4, {}, 0x4, 0x0, r3}) fanotify_mark(0xffffffffffffffff, 0x10, 0x20, r1, &(0x7f0000000280)='./file0\x00') r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000580)={0x0, @pix={0x1f, 0x101, 0x32435750, 0x9, 0x2, 0x6, 0x2, 0xfffffc9d, 0x1, 0x2, 0x0, 0x3}}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x59555956, 0x0, 0x0, [{}, {}, {}, {}, {0xfffffffd}]}}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x46dd937e, 0x2, &(0x7f0000000180)=[{&(0x7f00000004c0)="0414be5ffce394e2acbd45346d1ce7a1b519b891119b8767bda8a6b35955f61cdc0632ab6488fc227bc2f5af76ee32821876a26d1a3dff3f6b1abec8f21998335b2d9fa85ee1655fdd12ed85ab38b62bfa95b83703c0261c6f48277d71518f48d628ed4a0163e1a6361d17ca7fbebfc119a2ac8df0b5249593b30c697c31f5583832ffa3cfce2c1c1dd30af6a1b22482daacdf2e38e7d3da53d5face40f20029749a4d025893", 0xa6, 0x5}, {&(0x7f0000000100)="9904e690732afb1dcece5d8a89a52e44e00400000081d9b9d2dc67c825e3bcece9744ef1a8c13b3a0ab428d18cae5102cfd1b79b65fe4cbe608bd3a9ba5183560e69987ac44c8474783569c7000e88cb465377593b7c259e3eff6e62a375bfaab2a4ee94a365507f8e13f97e0447", 0x6e, 0x7fffffff}], 0x804, &(0x7f0000000400)={[{@no_bulk_read}, {@bulk_read}, {@auth_key}, {@compr_lzo}, {}], [{@subj_user={'subj_user', 0x3d, '+]'}}, {@seclabel}, {@audit}, {@obj_role={'obj_role', 0x3d, '/dev/vim2m\x00'}}, {@dont_appraise}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vim2m\x00'}}, {@dont_hash}]}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000200)=@fd={0x4, 0x1, 0x4, 0x0, 0x1f, {}, {0x3, 0xa, 0x3, 0xd7, 0x1, 0x9, "24e62d5f"}, 0x8, 0x4, {}, 0x4, 0x0, r3}) (async) fanotify_mark(0xffffffffffffffff, 0x10, 0x20, r1, &(0x7f0000000280)='./file0\x00') (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r4, 0xc0d05605, &(0x7f0000000580)={0x0, @pix={0x1f, 0x101, 0x32435750, 0x9, 0x2, 0x6, 0x2, 0xfffffc9d, 0x1, 0x2, 0x0, 0x3}}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x59555956, 0x0, 0x0, [{}, {}, {}, {}, {0xfffffffd}]}}) (async) [ 2112.722274] UBIFS error (pid: 20182): cannot open "/dev/loop3", error -22 11:23:35 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x58, r0, 0x204, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3e}}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x6) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x3c, r0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x810}, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x1}, {}, {0x0, 0x7}]}}) 11:23:35 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:35 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:35 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014d0, &(0x7f0000000680)=ANY=[]) 11:23:35 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:35 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x58, r0, 0x204, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3e}}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x6) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x3c, r0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x810}, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x1}, {}, {0x0, 0x7}]}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x58, r0, 0x204, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3e}}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x6) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x3c, r0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x810}, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x1}, {}, {0x0, 0x7}]}}) (async) 11:23:35 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:35 executing program 3: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x58, r0, 0x204, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @dev={0xac, 0x14, 0x14, 0x3e}}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e21}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x1}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @broadcast}]}, 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x6) (async) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x3c, r0, 0x200, 0x70bd28, 0x25dfdbff, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0xb}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x810}, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x0, 0x1}, {}, {0x0, 0x7}]}}) 11:23:35 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:35 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'ip_vti0\x00', &(0x7f0000000500)={'tunl0\x00', 0x0, 0x8000, 0x7, 0x401, 0x35, {{0x18, 0x4, 0x1, 0x15, 0x60, 0x68, 0x0, 0x81, 0x29, 0x0, @multicast1, @empty, {[@ssrr={0x89, 0x27, 0x85, [@empty, @remote, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, @remote, @local, @dev={0xac, 0x14, 0x14, 0x23}, @empty, @remote]}, @lsrr={0x83, 0x23, 0x2f, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x11}, @multicast1]}]}}}}}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:35 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:35 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014d0, &(0x7f0000000680)=ANY=[]) 11:23:36 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x4e000, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x8}]}}) 11:23:36 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:36 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x4e000, 0x0) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x8}]}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x4e000, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x8}]}}) (async) 11:23:36 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:36 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:36 executing program 5: syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014d0, &(0x7f0000000680)=ANY=[]) 11:23:36 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:36 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x4e000, 0x0) (async) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x8}]}}) 11:23:36 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:36 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:36 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:36 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:36 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x218202, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x4c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x6, 0xc6d, 0x1, 0x800, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44}, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000004c0)={0x3, @sliced={0x4, [0x80, 0x1, 0x9, 0x1, 0x4, 0x9, 0x0, 0x8000, 0x400, 0xfff8, 0x101, 0x8, 0x400, 0x200, 0x8000, 0x3, 0xff, 0x1, 0x9, 0x4d, 0x0, 0xa20, 0x400, 0x1, 0x200, 0x6, 0xa9f, 0x2, 0x0, 0x7d22, 0x4, 0x0, 0x8f8d, 0x2, 0x1, 0x5, 0x5, 0x7, 0x3, 0xfff8, 0xcde7, 0x2, 0x8271, 0x5, 0x1ff, 0x5, 0x7, 0xff], 0x197b4ccb}}) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x7, 0x1, 0x2, 0x0, 0x21}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x121080, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r4, 0x80044df9, &(0x7f0000000300)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r5) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)=@multiplanar_fd={0x8000, 0x3, 0x4, 0x10, 0x5, {}, {0x0, 0x2, 0xff, 0x1f, 0x1, 0x80, "b60afe9a"}, 0xcb0f, 0x4, {&(0x7f00000000c0)=[{0x1, 0x6, {r0}, 0x200}, {0xa7, 0x0, {r1}, 0x4896}]}, 0xfff}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r6, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000640)=@overlay={0x1, 0x0, 0x4, 0x2, 0x9, {0x77359400}, {0x4, 0x8, 0x7, 0x0, 0x7, 0x0, "2671d8c7"}, 0x0, 0x3, {}, 0x7, 0x0, r6}) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:36 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xfffeffff]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x4, 0x7]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004810}, 0x0) 11:23:37 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:37 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xfffeffff]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x4, 0x7]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004810}, 0x0) 11:23:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x218202, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x4c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x6, 0xc6d, 0x1, 0x800, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44}, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000004c0)={0x3, @sliced={0x4, [0x80, 0x1, 0x9, 0x1, 0x4, 0x9, 0x0, 0x8000, 0x400, 0xfff8, 0x101, 0x8, 0x400, 0x200, 0x8000, 0x3, 0xff, 0x1, 0x9, 0x4d, 0x0, 0xa20, 0x400, 0x1, 0x200, 0x6, 0xa9f, 0x2, 0x0, 0x7d22, 0x4, 0x0, 0x8f8d, 0x2, 0x1, 0x5, 0x5, 0x7, 0x3, 0xfff8, 0xcde7, 0x2, 0x8271, 0x5, 0x1ff, 0x5, 0x7, 0xff], 0x197b4ccb}}) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x7, 0x1, 0x2, 0x0, 0x21}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x121080, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r4, 0x80044df9, &(0x7f0000000300)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r5) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)=@multiplanar_fd={0x8000, 0x3, 0x4, 0x10, 0x5, {}, {0x0, 0x2, 0xff, 0x1f, 0x1, 0x80, "b60afe9a"}, 0xcb0f, 0x4, {&(0x7f00000000c0)=[{0x1, 0x6, {r0}, 0x200}, {0xa7, 0x0, {r1}, 0x4896}]}, 0xfff}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r6, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000640)=@overlay={0x1, 0x0, 0x4, 0x2, 0x9, {0x77359400}, {0x4, 0x8, 0x7, 0x0, 0x7, 0x0, "2671d8c7"}, 0x0, 0x3, {}, 0x7, 0x0, r6}) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x218202, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x4c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x6, 0xc6d, 0x1, 0x800, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44}, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000004c0)={0x3, @sliced={0x4, [0x80, 0x1, 0x9, 0x1, 0x4, 0x9, 0x0, 0x8000, 0x400, 0xfff8, 0x101, 0x8, 0x400, 0x200, 0x8000, 0x3, 0xff, 0x1, 0x9, 0x4d, 0x0, 0xa20, 0x400, 0x1, 0x200, 0x6, 0xa9f, 0x2, 0x0, 0x7d22, 0x4, 0x0, 0x8f8d, 0x2, 0x1, 0x5, 0x5, 0x7, 0x3, 0xfff8, 0xcde7, 0x2, 0x8271, 0x5, 0x1ff, 0x5, 0x7, 0xff], 0x197b4ccb}}) (async) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x7, 0x1, 0x2, 0x0, 0x21}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x121080, 0x0) (async) ioctl$mixer_OSS_ALSAEMULVER(r4, 0x80044df9, &(0x7f0000000300)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r5) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)=@multiplanar_fd={0x8000, 0x3, 0x4, 0x10, 0x5, {}, {0x0, 0x2, 0xff, 0x1f, 0x1, 0x80, "b60afe9a"}, 0xcb0f, 0x4, {&(0x7f00000000c0)=[{0x1, 0x6, {r0}, 0x200}, {0xa7, 0x0, {r1}, 0x4896}]}, 0xfff}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r6, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000640)=@overlay={0x1, 0x0, 0x4, 0x2, 0x9, {0x77359400}, {0x4, 0x8, 0x7, 0x0, 0x7, 0x0, "2671d8c7"}, 0x0, 0x3, {}, 0x7, 0x0, r6}) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) 11:23:37 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xfffeffff]}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x4, 0x7]}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_SECRET={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004810}, 0x0) 11:23:37 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:37 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:37 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:37 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:37 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @vbi={0x1, 0x4, 0x51, 0x59555956, [0x7ef, 0xcf6], [0x1330, 0x3], 0x13a}}) 11:23:37 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:37 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:37 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x218202, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x4c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x6, 0xc6d, 0x1, 0x800, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44}, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000004c0)={0x3, @sliced={0x4, [0x80, 0x1, 0x9, 0x1, 0x4, 0x9, 0x0, 0x8000, 0x400, 0xfff8, 0x101, 0x8, 0x400, 0x200, 0x8000, 0x3, 0xff, 0x1, 0x9, 0x4d, 0x0, 0xa20, 0x400, 0x1, 0x200, 0x6, 0xa9f, 0x2, 0x0, 0x7d22, 0x4, 0x0, 0x8f8d, 0x2, 0x1, 0x5, 0x5, 0x7, 0x3, 0xfff8, 0xcde7, 0x2, 0x8271, 0x5, 0x1ff, 0x5, 0x7, 0xff], 0x197b4ccb}}) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x7, 0x1, 0x2, 0x0, 0x21}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x121080, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r4, 0x80044df9, &(0x7f0000000300)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r5) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)=@multiplanar_fd={0x8000, 0x3, 0x4, 0x10, 0x5, {}, {0x0, 0x2, 0xff, 0x1f, 0x1, 0x80, "b60afe9a"}, 0xcb0f, 0x4, {&(0x7f00000000c0)=[{0x1, 0x6, {r0}, 0x200}, {0xa7, 0x0, {r1}, 0x4896}]}, 0xfff}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r6, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000640)=@overlay={0x1, 0x0, 0x4, 0x2, 0x9, {0x77359400}, {0x4, 0x8, 0x7, 0x0, 0x7, 0x0, "2671d8c7"}, 0x0, 0x3, {}, 0x7, 0x0, r6}) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x218202, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) (async) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000600)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000005c0)={&(0x7f00000003c0)={0x4c, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x6, 0xc6d, 0x1, 0x800, 0x6]}, @SEG6_ATTR_DST={0x14, 0x1, @empty}]}, 0x4c}, 0x1, 0x0, 0x0, 0x44}, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000004c0)={0x3, @sliced={0x4, [0x80, 0x1, 0x9, 0x1, 0x4, 0x9, 0x0, 0x8000, 0x400, 0xfff8, 0x101, 0x8, 0x400, 0x200, 0x8000, 0x3, 0xff, 0x1, 0x9, 0x4d, 0x0, 0xa20, 0x400, 0x1, 0x200, 0x6, 0xa9f, 0x2, 0x0, 0x7d22, 0x4, 0x0, 0x8f8d, 0x2, 0x1, 0x5, 0x5, 0x7, 0x3, 0xfff8, 0xcde7, 0x2, 0x8271, 0x5, 0x1ff, 0x5, 0x7, 0xff], 0x197b4ccb}}) (async) ioctl$vim2m_VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000200)={0x7, 0x1, 0x2, 0x0, 0x21}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x121080, 0x0) (async) ioctl$mixer_OSS_ALSAEMULVER(r4, 0x80044df9, &(0x7f0000000300)) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r5) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)=@multiplanar_fd={0x8000, 0x3, 0x4, 0x10, 0x5, {}, {0x0, 0x2, 0xff, 0x1f, 0x1, 0x80, "b60afe9a"}, 0xcb0f, 0x4, {&(0x7f00000000c0)=[{0x1, 0x6, {r0}, 0x200}, {0xa7, 0x0, {r1}, 0x4896}]}, 0xfff}) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r6, 0x40047438, 0x0) (async) ioctl$vim2m_VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f0000000640)=@overlay={0x1, 0x0, 0x4, 0x2, 0x9, {0x77359400}, {0x4, 0x8, 0x7, 0x0, 0x7, 0x0, "2671d8c7"}, 0x0, 0x3, {}, 0x7, 0x0, r6}) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @vbi={0x1, 0x4, 0x51, 0x59555956, [0x7ef, 0xcf6], [0x1330, 0x3], 0x13a}}) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x0, @vbi={0x1, 0x4, 0x51, 0x59555956, [0x7ef, 0xcf6], [0x1330, 0x3], 0x13a}}) 11:23:38 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0xffffffde}]}}) 11:23:38 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:38 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:38 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="68d9a3b38954460fc88caf6caa80c32ca1d4b6c7bc4b973df039b2cfbc99b30357f4832e12fca9e033dbb56112dacc0892cbcd80184ae25259c6a106112b765b7203ac597b62c82c12af0ce600a6ce6b931bc70dbb884f", 0x57, 0x5}], 0x28014c0, &(0x7f0000000080)=ANY=[]) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0xffffffde}]}}) 11:23:38 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0xffffffde}]}}) 11:23:38 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:38 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:38 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="68d9a3b38954460fc88caf6caa80c32ca1d4b6c7bc4b973df039b2cfbc99b30357f4832e12fca9e033dbb56112dacc0892cbcd80184ae25259c6a106112b765b7203ac597b62c82c12af0ce600a6ce6b931bc70dbb884f", 0x57, 0x5}], 0x28014c0, &(0x7f0000000080)=ANY=[]) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x3) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x0, 0x7, 0x4, {0x1, @pix_mp={0x3, 0x1, 0x51424752, 0x2, 0x1, [{0xfffffffc, 0x2}, {0x0, 0x80000001}, {0x3, 0x6}, {0x8, 0x3}, {0x80000001, 0x3ff}, {0x80000000, 0xdd7f}, {0x29, 0xfa}, {0x2, 0x101}], 0xfc, 0x6, 0x1}}, 0x7}) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x4737f18, 0x0, 0x0, [{}, {}, {0x0, 0x800}, {}, {0x0, 0x1ff}, {}, {}, {0xb8f}], 0x0, 0x0, 0x0, 0x0, 0x2}}) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000180)=0x4) 11:23:38 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) (async) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x3) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x0, 0x7, 0x4, {0x1, @pix_mp={0x3, 0x1, 0x51424752, 0x2, 0x1, [{0xfffffffc, 0x2}, {0x0, 0x80000001}, {0x3, 0x6}, {0x8, 0x3}, {0x80000001, 0x3ff}, {0x80000000, 0xdd7f}, {0x29, 0xfa}, {0x2, 0x101}], 0xfc, 0x6, 0x1}}, 0x7}) (async, rerun: 32) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x4737f18, 0x0, 0x0, [{}, {}, {0x0, 0x800}, {}, {0x0, 0x1ff}, {}, {}, {0xb8f}], 0x0, 0x0, 0x0, 0x0, 0x2}}) (async, rerun: 32) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x1, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000180)=0x4) 11:23:38 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:38 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:38 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:38 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) (async) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) (async, rerun: 32) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (rerun: 32) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="68d9a3b38954460fc88caf6caa80c32ca1d4b6c7bc4b973df039b2cfbc99b30357f4832e12fca9e033dbb56112dacc0892cbcd80184ae25259c6a106112b765b7203ac597b62c82c12af0ce600a6ce6b931bc70dbb884f", 0x57, 0x5}], 0x28014c0, &(0x7f0000000080)=ANY=[]) 11:23:38 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$UI_SET_ABSBIT(0xffffffffffffffff, 0x40045567, 0x3) (async) ioctl$vim2m_VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000080)={0x0, 0x7, 0x4, {0x1, @pix_mp={0x3, 0x1, 0x51424752, 0x2, 0x1, [{0xfffffffc, 0x2}, {0x0, 0x80000001}, {0x3, 0x6}, {0x8, 0x3}, {0x80000001, 0x3ff}, {0x80000000, 0xdd7f}, {0x29, 0xfa}, {0x2, 0x101}], 0xfc, 0x6, 0x1}}, 0x7}) (async) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp={0x0, 0x0, 0x4737f18, 0x0, 0x0, [{}, {}, {0x0, 0x800}, {}, {0x0, 0x1ff}, {}, {}, {0xb8f}], 0x0, 0x0, 0x0, 0x0, 0x2}}) (async) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000000), 0x1, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000180)=0x4) 11:23:39 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:39 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x20002, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)=@fd={0x0, 0x3, 0x4, 0x40, 0xfffff2fb, {r2, r3/1000+60000}, {0x5, 0x1, 0x9, 0x0, 0x80, 0xa7, "b773c6e9"}, 0x6, 0x4, {}, 0x400, 0x0, r4}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x2080, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000240)=@multiplanar_overlay={0x800, 0x4, 0x4, 0x4, 0x5, {r6, r7/1000+60000}, {0x0, 0xc, 0x1, 0x8b, 0x7, 0x32, "d30ade0d"}, 0x200, 0x3, {&(0x7f0000000180)=[{0x9, 0x8001, {0x8}, 0x80}, {0x7, 0x9, {}, 0x401}]}, 0x4, 0x0, r8}) 11:23:39 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:39 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:39 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:39 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x20002, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)=@fd={0x0, 0x3, 0x4, 0x40, 0xfffff2fb, {r2, r3/1000+60000}, {0x5, 0x1, 0x9, 0x0, 0x80, 0xa7, "b773c6e9"}, 0x6, 0x4, {}, 0x400, 0x0, r4}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) (async) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x2080, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000240)=@multiplanar_overlay={0x800, 0x4, 0x4, 0x4, 0x5, {r6, r7/1000+60000}, {0x0, 0xc, 0x1, 0x8b, 0x7, 0x32, "d30ade0d"}, 0x200, 0x3, {&(0x7f0000000180)=[{0x9, 0x8001, {0x8}, 0x80}, {0x7, 0x9, {}, 0x401}]}, 0x4, 0x0, r8}) 11:23:39 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) connect$vsock_stream(r1, &(0x7f0000000400)={0x28, 0x0, 0x2711, @hyper}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8fe402e6520053f2ee5511b98ba57d", 0xf, 0x9}], 0x28014c0, &(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r0]) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/132, &(0x7f0000000280)=0x84) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, &(0x7f0000000140)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) 11:23:39 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000300)={0x2, @pix_mp}) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) (async) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x20002, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000080)=@fd={0x0, 0x3, 0x4, 0x40, 0xfffff2fb, {r2, r3/1000+60000}, {0x5, 0x1, 0x9, 0x0, 0x80, 0xa7, "b773c6e9"}, 0x6, 0x4, {}, 0x400, 0x0, r4}) (async) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) (async) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) (async) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x2080, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r5, 0xc058565d, &(0x7f0000000240)=@multiplanar_overlay={0x800, 0x4, 0x4, 0x4, 0x5, {r6, r7/1000+60000}, {0x0, 0xc, 0x1, 0x8b, 0x7, 0x32, "d30ade0d"}, 0x200, 0x3, {&(0x7f0000000180)=[{0x9, 0x8001, {0x8}, 0x80}, {0x7, 0x9, {}, 0x401}]}, 0x4, 0x0, r8}) 11:23:39 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:39 executing program 3: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:39 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:39 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:39 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) connect$vsock_stream(r1, &(0x7f0000000400)={0x28, 0x0, 0x2711, @hyper}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8fe402e6520053f2ee5511b98ba57d", 0xf, 0x9}], 0x28014c0, &(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r0]) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/132, &(0x7f0000000280)=0x84) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, &(0x7f0000000140)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) connect$vsock_stream(r1, &(0x7f0000000400)={0x28, 0x0, 0x2711, @hyper}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8fe402e6520053f2ee5511b98ba57d", 0xf, 0x9}], 0x28014c0, &(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r0]) (async) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/132, &(0x7f0000000280)=0x84) (async) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, &(0x7f0000000140)) (async) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) (async) 11:23:39 executing program 3: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:39 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) connect$vsock_stream(r1, &(0x7f0000000400)={0x28, 0x0, 0x2711, @hyper}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8fe402e6520053f2ee5511b98ba57d", 0xf, 0x9}], 0x28014c0, &(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r0]) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/132, &(0x7f0000000280)=0x84) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, &(0x7f0000000140)) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) connect$vsock_stream(r1, &(0x7f0000000400)={0x28, 0x0, 0x2711, @hyper}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x9}, @L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="8fe402e6520053f2ee5511b98ba57d", 0xf, 0x9}], 0x28014c0, &(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r0]) (async) getsockopt$bt_sco_SCO_CONNINFO(0xffffffffffffffff, 0x11, 0x2, &(0x7f00000001c0)=""/132, &(0x7f0000000280)=0x84) (async) ioctl$SNDCTL_DSP_STEREO(0xffffffffffffffff, 0xc0045003, &(0x7f0000000140)) (async) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000180)) (async) 11:23:39 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:39 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:39 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="68d9a3b38954460fc88caf6caa80c32ca1d4b6c7bc4b973df039b2cfbc99b30357f4832e12fca9e033dbb56112dacc0892cbcd80184ae25259c6a106112b765b7203ac597b62c82c12af0ce600a6ce6b931bc70dbb884f", 0x57, 0x5}], 0x28014c0, &(0x7f0000000080)=ANY=[]) 11:23:40 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:40 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x9, 0x9, 0x7fff, 0x6}, 'syz0\x00', 0x3e}) 11:23:40 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:40 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:40 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="68d9a3b38954460fc88caf6caa80c32ca1d4b6c7bc4b973df039b2cfbc99b30357f4832e12fca9e033dbb56112dacc0892cbcd80184ae25259c6a106112b765b7203ac597b62c82c12af0ce600a6ce6b931bc70dbb884f", 0x57, 0x5}], 0x28014c0, &(0x7f0000000080)=ANY=[]) 11:23:40 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:40 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:40 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x9, 0x9, 0x7fff, 0x6}, 'syz0\x00', 0x3e}) 11:23:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000080)="68d9a3b38954460fc88caf6caa80c32ca1d4b6c7bc4b973df039b2cfbc99b30357f4832e12fca9e033dbb56112dacc0892cbcd80184ae25259c6a106112b765b7203ac597b62c82c12af0ce600a6ce6b931bc70dbb884f", 0x57, 0x5}], 0x28014c0, &(0x7f0000000080)=ANY=[]) 11:23:40 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:41 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:41 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:41 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:41 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x9, 0x9, 0x7fff, 0x6}, 'syz0\x00', 0x3e}) 11:23:41 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) ioctl$vim2m_VIDIOC_STREAMOFF(r2, 0x40045612, &(0x7f00000003c0)=0x1) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:41 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:41 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:41 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:41 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:41 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) 11:23:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:42 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:42 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:42 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:42 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:42 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) 11:23:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r1, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_genetlink_get_family_id$batadv(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:42 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:42 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:42 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:42 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:42 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:42 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) 11:23:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) openat$khugepaged_scan(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:42 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:42 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:42 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:43 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$dri(&(0x7f00000002c0), 0x3, 0x400) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xc2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xb5c]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x5b, 0x0, 0x1, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fff}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xf5]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x0) 11:23:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 3: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:43 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:43 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xc2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xb5c]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x5b, 0x0, 0x1, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fff}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xf5]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x0) 11:23:43 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 3: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:43 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 3: sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:43 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:43 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x88, r1, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0xc2}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xb5c]}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x5b, 0x0, 0x1, 0x3]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fff}, @SEG6_ATTR_SECRET={0x8, 0x4, [0xf5]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DST={0x14, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x0) 11:23:43 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:43 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:43 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x3995c00, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYBLOB="79400b68ca0985bf824afc3f6b36144413784be87bbe782b5b214e14ec7f96f1c695049ea239dffa09cb5c98061d7ed63072cf1efee0e1b624d6c8850d32879a51868c55cc67e48a230ff42b256b4b21e8f158ba6eb0741780fdad62276ea0d4b571fb74c70eae441195de0078306291be39371f87d6b4c4bea20a9d53988038a266d5482d1a1b50ba9e9913b527a48a17b3836396537dbd6798f553f7dc3e9827c84dce872d641f5eaf655e7ae0ab7452c5391e3ec6e8f494e0ee3a23738420a870758e179bb4aa9f1cb0c328ffb7896d87cac2895b95381e6bfbd50a95d2bf533af3ee4ef71adaa726340bab59", @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0]) 11:23:43 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:43 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:43 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x405) 11:23:44 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:44 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x405) 11:23:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x3995c00, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYBLOB="79400b68ca0985bf824afc3f6b36144413784be87bbe782b5b214e14ec7f96f1c695049ea239dffa09cb5c98061d7ed63072cf1efee0e1b624d6c8850d32879a51868c55cc67e48a230ff42b256b4b21e8f158ba6eb0741780fdad62276ea0d4b571fb74c70eae441195de0078306291be39371f87d6b4c4bea20a9d53988038a266d5482d1a1b50ba9e9913b527a48a17b3836396537dbd6798f553f7dc3e9827c84dce872d641f5eaf655e7ae0ab7452c5391e3ec6e8f494e0ee3a23738420a870758e179bb4aa9f1cb0c328ffb7896d87cac2895b95381e6bfbd50a95d2bf533af3ee4ef71adaa726340bab59", @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0]) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x3995c00, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYBLOB="79400b68ca0985bf824afc3f6b36144413784be87bbe782b5b214e14ec7f96f1c695049ea239dffa09cb5c98061d7ed63072cf1efee0e1b624d6c8850d32879a51868c55cc67e48a230ff42b256b4b21e8f158ba6eb0741780fdad62276ea0d4b571fb74c70eae441195de0078306291be39371f87d6b4c4bea20a9d53988038a266d5482d1a1b50ba9e9913b527a48a17b3836396537dbd6798f553f7dc3e9827c84dce872d641f5eaf655e7ae0ab7452c5391e3ec6e8f494e0ee3a23738420a870758e179bb4aa9f1cb0c328ffb7896d87cac2895b95381e6bfbd50a95d2bf533af3ee4ef71adaa726340bab59", @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0]) (async) 11:23:44 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, 0x0, 0x405) 11:23:44 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:44 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:44 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x3995c00, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYBLOB="79400b68ca0985bf824afc3f6b36144413784be87bbe782b5b214e14ec7f96f1c695049ea239dffa09cb5c98061d7ed63072cf1efee0e1b624d6c8850d32879a51868c55cc67e48a230ff42b256b4b21e8f158ba6eb0741780fdad62276ea0d4b571fb74c70eae441195de0078306291be39371f87d6b4c4bea20a9d53988038a266d5482d1a1b50ba9e9913b527a48a17b3836396537dbd6798f553f7dc3e9827c84dce872d641f5eaf655e7ae0ab7452c5391e3ec6e8f494e0ee3a23738420a870758e179bb4aa9f1cb0c328ffb7896d87cac2895b95381e6bfbd50a95d2bf533af3ee4ef71adaa726340bab59", @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0]) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x3995c00, &(0x7f0000000080)=ANY=[@ANYRES64=r0, @ANYRESOCT=0x0, @ANYRES32=r0, @ANYBLOB="79400b68ca0985bf824afc3f6b36144413784be87bbe782b5b214e14ec7f96f1c695049ea239dffa09cb5c98061d7ed63072cf1efee0e1b624d6c8850d32879a51868c55cc67e48a230ff42b256b4b21e8f158ba6eb0741780fdad62276ea0d4b571fb74c70eae441195de0078306291be39371f87d6b4c4bea20a9d53988038a266d5482d1a1b50ba9e9913b527a48a17b3836396537dbd6798f553f7dc3e9827c84dce872d641f5eaf655e7ae0ab7452c5391e3ec6e8f494e0ee3a23738420a870758e179bb4aa9f1cb0c328ffb7896d87cac2895b95381e6bfbd50a95d2bf533af3ee4ef71adaa726340bab59", @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES16=r0]) (async) 11:23:44 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:44 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:44 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:44 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:44 executing program 5: syz_mount_image$ubifs(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f00000005c0), 0x2803440, &(0x7f0000000100)=ANY=[@ANYBLOB="db20177ef50f71f75b1f0aafb55479a3b573292d900d992138920215b127fabd763ee69fa145f318a6774a95ec1f43e2ff96f6339059a45173f3d20d99bb6608882d9e5146ab0038359b"]) 11:23:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:44 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:44 executing program 5: syz_mount_image$ubifs(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f00000005c0), 0x2803440, &(0x7f0000000100)=ANY=[@ANYBLOB="db20177ef50f71f75b1f0aafb55479a3b573292d900d992138920215b127fabd763ee69fa145f318a6774a95ec1f43e2ff96f6339059a45173f3d20d99bb6608882d9e5146ab0038359b"]) syz_mount_image$ubifs(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f00000005c0), 0x2803440, &(0x7f0000000100)=ANY=[@ANYBLOB="db20177ef50f71f75b1f0aafb55479a3b573292d900d992138920215b127fabd763ee69fa145f318a6774a95ec1f43e2ff96f6339059a45173f3d20d99bb6608882d9e5146ab0038359b"]) (async) 11:23:44 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:44 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:45 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:45 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:45 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:45 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:45 executing program 5: syz_mount_image$ubifs(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f00000005c0), 0x2803440, &(0x7f0000000100)=ANY=[@ANYBLOB="db20177ef50f71f75b1f0aafb55479a3b573292d900d992138920215b127fabd763ee69fa145f318a6774a95ec1f43e2ff96f6339059a45173f3d20d99bb6608882d9e5146ab0038359b"]) syz_mount_image$ubifs(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x5, 0x0, &(0x7f00000005c0), 0x2803440, &(0x7f0000000100)=ANY=[@ANYBLOB="db20177ef50f71f75b1f0aafb55479a3b573292d900d992138920215b127fabd763ee69fa145f318a6774a95ec1f43e2ff96f6339059a45173f3d20d99bb6608882d9e5146ab0038359b"]) (async) 11:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:45 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:45 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:45 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:46 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x25dfdbfc, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000080)="1094fef35f2056ffa4e836537ebb96a786635b61210ad953b25ae88d3833396211d842b8493b58193ad2339e87a1f55b16992070d2c14de22c2e306d3fe663cc5c7637c0f77cdfdf620696ad308ff38980c67c68e077ead8d096f531d006d81f290e32947d25238091f1be0b9929ce2de6ddb86b399d5f96a195d1315d1fcc7b4e45f46d739a954b45e9bc45cddf17381aefe516f639ff3b0d7cf030273aedaf798d534adb1302e665dcecfd75a89afa5f9bbfc1bcd2de407165b726aa090ffc9e65f994912b8a79f744aa6e7e79d562c99f4ff45baea7e59f79f33455e44e3a17", 0xe1, 0x8000}, {&(0x7f0000000180)="9c7e16054587ca7266dc7b3e35c52090b7a165435ccaf36e49b485d9d80f057f9db62ce3663b552715fca1c247c5a0799da7", 0x32, 0x9}, {&(0x7f00000001c0)="f13f228209b6431821c557bb0f17d596e5c2e78ff19972749a74cfce0f776754bf09e5777486b646e4f0a27db64919decfb54b73bb1efb2d5efaff1621eda0252bcd3ef1cb8445e8bb6bef449e071da21283b7499705b1992f81284169e1907dd51cfcc55e4e2a0258fb1fa827108663606948a42b", 0x75, 0x7c5}, {&(0x7f0000000240)="970b4a02e4583c6dcc7fcf40ba4ad7778a86b91dcf7f3f842ea700a6954c03bb635f1e107119c6514901be9a4466a88f9fbccdae08118550c27d6eb3a52909c19945b6c7f88306b7f7e944c6dcaa5921df5a31d819d91df55f2d8caf267d1acc87180476fcac03062f58e6595c03413d0335d4c9bcd8a6fbb22e10d034da2f2834aeb707cbd0f23ecae4534e2bb84066cd520ecb70dd75c18aff686d4077511c884f0d567f8557b44b632bd7deb3351df80372ad9fd42a4b8a6fdc7a848d4b480d3eef0c4b18a4544eac1a91a79d8449024735a792a4266cd321eea45156764ad5eb4edcd18369385020d17684580302004f9669", 0xf4, 0x5}, {&(0x7f0000000340)="5eec049e48465bdc48280731b3b26d862b45aed5cf5c778235dbb5ee329f9d85a75fe359090b08acdd9d6070fe8fc8d1ced47b2abb269cfc7da612ae9882a7", 0x3f, 0x5}, {&(0x7f0000000380)="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", 0xfc, 0x4b}, {&(0x7f0000000480)="3db1f07ec6c9b226180ffe665bfb8f17533738cf4c8b9540b4b0fa2293640f3f73cc76b760de7c4dccc23325d83db2fe03e5b1f47b6a72ad417c39ac545cfc7dbf5bbdeb75a65dff8907f79f446970c704deced9e44d0f3cc013c4d35855e2f42241cfb7e6a44ce264c83f7305e10b92326e3fcc512b2b0fd871d0fd7b8bef1fa645663c0a048be30e25b4a647982364a006f61287881ce502e80efbb6cb07c42a5c254febcb567763354c490eda95260a723ef705b9210585b55c3def5263241e4142fe9cce53bc18b75b34b8d4e208b132423e026949607e2cba0808f168a89a510b2d3e143ad17c514231d1491827cccdf8dcae", 0xf5, 0x2}, {&(0x7f0000000580)="6b9178dedb632bfe87746b3bb70cf627ac78b46973d5f430dcb2ce506f5f6adaaf8302c1cb05a5befb913a6b0f10287d586e19fe721369fc5fbfc2d656d8cadf02769e23fc92ad83c34fe59d696719362afb6fab154202de758b39089c861a4e033eb76a089a6e2c5ed1", 0x6a, 0x7}, {&(0x7f0000000600)="5b5ce1eb0a61f3e95cfa838fd083ada7c460c19c264314f3fbb145ea66b5bae032f901dbd320c83361fef41ee0bb1604894c40b50b379ef8ba8795631f796b5aa43651ab9d7ceef1740e3f5ca662157b8317a5394b1342a5fac50abd7fb9eb800bf3793375f2e9863ea0753bea36387f767936d0b4e99581b943fec0c2dbba40dadcfaea96eeaccb75", 0x89, 0x81}], 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_mount_image$ubifs(&(0x7f00000007c0), &(0x7f0000000800)='./file0\x00', 0x9, 0x6, &(0x7f0000000a80)=[{&(0x7f0000000840)="162c348ade5c3cd65dd9ecf1e9edcc885b102bb3ca0520ddb3125b48c489660b3bdef159cd14d55f1df5c6a527c4d172678bd47619b02e2aa39e96fb05f144faaab2f807f0ac5d06c0c9a827b252179aed754992560aa24169bab7f311c1d826b936a8989bcfae61c1c1d266a9c645c2f55cea5ac363a74e1a", 0x79, 0x81}, {&(0x7f00000008c0)="16dcb0b95c98be956e", 0x9, 0xcfe0000000000000}, {&(0x7f0000000900)="84e41ceb07f747a827f2d1c13c9858927a5563933d5773089c1a67f78616", 0x1e, 0xffffffffffffffb5}, {&(0x7f0000000940)="8d7d35766f2a99be99b1fded1221af9af0907dd1a3da1a3cc7c6701d9d9e45e6cebd9285479e065610e5da7822ec74d81800a1867fa99d72a5516c2aa769cc02261f5f0dac5e1bafffacc5ebf2ca89e2efadcf0117938f8f7f1560423551671a87906402945c64562c0bf226961941daa83c0d2809819ae2cd3ccc", 0x7b, 0x200}, {&(0x7f00000009c0)="4d55f4145a282a120137bcfd3b22562bac70638251369d7c777821b181", 0x1d, 0x266}, {&(0x7f0000000a00)="4cf15f21d200a312a5c2970de2175d2081953c009f10a2f8d2887ec0f654d1dd0e6403135adb593e058588c6fb5f763420a899fd0f1664833e36df5aeb8db043eef82f23de4c6b7c2c1d1e8362f46e3fbf8dc0e6448c4ac22c5748b270588d0a601f16f404", 0x65, 0x2}], 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="617574785f6b65793d2c617574685f6b65793d952c736d616304000000000000003a263a2c0086e8f667bc11a06a00259190a2e933038b67057418272d457a4d64447914961985331129f541d03edf8e47fa45d8d6673738e5f86e532690ba0ae8f4483ec22f1a342bbb0c74260c19bb12a23d77c738832bcb35146757e10909ad3adf2a238f656444a90d92a050c352"]) socket$inet6_dccp(0xa, 0x6, 0x0) 11:23:46 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:46 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) [ 2113.221704] UBIFS error (pid: 20209): cannot open "/dev/loop3", error -22 11:23:46 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000080)="1094fef35f2056ffa4e836537ebb96a786635b61210ad953b25ae88d3833396211d842b8493b58193ad2339e87a1f55b16992070d2c14de22c2e306d3fe663cc5c7637c0f77cdfdf620696ad308ff38980c67c68e077ead8d096f531d006d81f290e32947d25238091f1be0b9929ce2de6ddb86b399d5f96a195d1315d1fcc7b4e45f46d739a954b45e9bc45cddf17381aefe516f639ff3b0d7cf030273aedaf798d534adb1302e665dcecfd75a89afa5f9bbfc1bcd2de407165b726aa090ffc9e65f994912b8a79f744aa6e7e79d562c99f4ff45baea7e59f79f33455e44e3a17", 0xe1, 0x8000}, {&(0x7f0000000180)="9c7e16054587ca7266dc7b3e35c52090b7a165435ccaf36e49b485d9d80f057f9db62ce3663b552715fca1c247c5a0799da7", 0x32, 0x9}, {&(0x7f00000001c0)="f13f228209b6431821c557bb0f17d596e5c2e78ff19972749a74cfce0f776754bf09e5777486b646e4f0a27db64919decfb54b73bb1efb2d5efaff1621eda0252bcd3ef1cb8445e8bb6bef449e071da21283b7499705b1992f81284169e1907dd51cfcc55e4e2a0258fb1fa827108663606948a42b", 0x75, 0x7c5}, {&(0x7f0000000240)="970b4a02e4583c6dcc7fcf40ba4ad7778a86b91dcf7f3f842ea700a6954c03bb635f1e107119c6514901be9a4466a88f9fbccdae08118550c27d6eb3a52909c19945b6c7f88306b7f7e944c6dcaa5921df5a31d819d91df55f2d8caf267d1acc87180476fcac03062f58e6595c03413d0335d4c9bcd8a6fbb22e10d034da2f2834aeb707cbd0f23ecae4534e2bb84066cd520ecb70dd75c18aff686d4077511c884f0d567f8557b44b632bd7deb3351df80372ad9fd42a4b8a6fdc7a848d4b480d3eef0c4b18a4544eac1a91a79d8449024735a792a4266cd321eea45156764ad5eb4edcd18369385020d17684580302004f9669", 0xf4, 0x5}, {&(0x7f0000000340)="5eec049e48465bdc48280731b3b26d862b45aed5cf5c778235dbb5ee329f9d85a75fe359090b08acdd9d6070fe8fc8d1ced47b2abb269cfc7da612ae9882a7", 0x3f, 0x5}, {&(0x7f0000000380)="125663fa4dfa4196905d85ecbf18eed7907fb60306fff6e81f2431755537ac6bbb6d33bf7eb609f3d4d526aa8619da8e44eae2b76e11bb2cda62f656fa683bd195615e42b31c516a31a7e633fe797e1c905c5eed6b49e67320c8a28843e8e5422cc831753c0f1240a104aef40be9b8f9048e421ba0150e56b1a788a1d1217fd17edc4bbda453c802b65342b6d9b46044af0037d1eb9141fb9da09e36fc68fa3b4269b8b148e73f8e9878aab4682c0c3098d3decd6af5ded3c5f0a086fbbf58c10a350dde65a8d36287e5bc14361e7c18fca6500446025f12ad6d9d4c324ffbfb2ab674015ffad7ed0a8cca466701fb1c8fc0f574a2120a2d10f01338", 0xfc, 0x4b}, {&(0x7f0000000480)="3db1f07ec6c9b226180ffe665bfb8f17533738cf4c8b9540b4b0fa2293640f3f73cc76b760de7c4dccc23325d83db2fe03e5b1f47b6a72ad417c39ac545cfc7dbf5bbdeb75a65dff8907f79f446970c704deced9e44d0f3cc013c4d35855e2f42241cfb7e6a44ce264c83f7305e10b92326e3fcc512b2b0fd871d0fd7b8bef1fa645663c0a048be30e25b4a647982364a006f61287881ce502e80efbb6cb07c42a5c254febcb567763354c490eda95260a723ef705b9210585b55c3def5263241e4142fe9cce53bc18b75b34b8d4e208b132423e026949607e2cba0808f168a89a510b2d3e143ad17c514231d1491827cccdf8dcae", 0xf5, 0x2}, {&(0x7f0000000580)="6b9178dedb632bfe87746b3bb70cf627ac78b46973d5f430dcb2ce506f5f6adaaf8302c1cb05a5befb913a6b0f10287d586e19fe721369fc5fbfc2d656d8cadf02769e23fc92ad83c34fe59d696719362afb6fab154202de758b39089c861a4e033eb76a089a6e2c5ed1", 0x6a, 0x7}, {&(0x7f0000000600)="5b5ce1eb0a61f3e95cfa838fd083ada7c460c19c264314f3fbb145ea66b5bae032f901dbd320c83361fef41ee0bb1604894c40b50b379ef8ba8795631f796b5aa43651ab9d7ceef1740e3f5ca662157b8317a5394b1342a5fac50abd7fb9eb800bf3793375f2e9863ea0753bea36387f767936d0b4e99581b943fec0c2dbba40dadcfaea96eeaccb75", 0x89, 0x81}], 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_mount_image$ubifs(&(0x7f00000007c0), &(0x7f0000000800)='./file0\x00', 0x9, 0x6, &(0x7f0000000a80)=[{&(0x7f0000000840)="162c348ade5c3cd65dd9ecf1e9edcc885b102bb3ca0520ddb3125b48c489660b3bdef159cd14d55f1df5c6a527c4d172678bd47619b02e2aa39e96fb05f144faaab2f807f0ac5d06c0c9a827b252179aed754992560aa24169bab7f311c1d826b936a8989bcfae61c1c1d266a9c645c2f55cea5ac363a74e1a", 0x79, 0x81}, {&(0x7f00000008c0)="16dcb0b95c98be956e", 0x9, 0xcfe0000000000000}, {&(0x7f0000000900)="84e41ceb07f747a827f2d1c13c9858927a5563933d5773089c1a67f78616", 0x1e, 0xffffffffffffffb5}, {&(0x7f0000000940)="8d7d35766f2a99be99b1fded1221af9af0907dd1a3da1a3cc7c6701d9d9e45e6cebd9285479e065610e5da7822ec74d81800a1867fa99d72a5516c2aa769cc02261f5f0dac5e1bafffacc5ebf2ca89e2efadcf0117938f8f7f1560423551671a87906402945c64562c0bf226961941daa83c0d2809819ae2cd3ccc", 0x7b, 0x200}, {&(0x7f00000009c0)="4d55f4145a282a120137bcfd3b22562bac70638251369d7c777821b181", 0x1d, 0x266}, {&(0x7f0000000a00)="4cf15f21d200a312a5c2970de2175d2081953c009f10a2f8d2887ec0f654d1dd0e6403135adb593e058588c6fb5f763420a899fd0f1664833e36df5aeb8db043eef82f23de4c6b7c2c1d1e8362f46e3fbf8dc0e6448c4ac22c5748b270588d0a601f16f404", 0x65, 0x2}], 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="617574785f6b65793d2c617574685f6b65793d952c736d616304000000000000003a263a2c0086e8f667bc11a06a00259190a2e933038b67057418272d457a4d64447914961985331129f541d03edf8e47fa45d8d6673738e5f86e532690ba0ae8f4483ec22f1a342bbb0c74260c19bb12a23d77c738832bcb35146757e10909ad3adf2a238f656444a90d92a050c352"]) socket$inet6_dccp(0xa, 0x6, 0x0) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000080)="1094fef35f2056ffa4e836537ebb96a786635b61210ad953b25ae88d3833396211d842b8493b58193ad2339e87a1f55b16992070d2c14de22c2e306d3fe663cc5c7637c0f77cdfdf620696ad308ff38980c67c68e077ead8d096f531d006d81f290e32947d25238091f1be0b9929ce2de6ddb86b399d5f96a195d1315d1fcc7b4e45f46d739a954b45e9bc45cddf17381aefe516f639ff3b0d7cf030273aedaf798d534adb1302e665dcecfd75a89afa5f9bbfc1bcd2de407165b726aa090ffc9e65f994912b8a79f744aa6e7e79d562c99f4ff45baea7e59f79f33455e44e3a17", 0xe1, 0x8000}, {&(0x7f0000000180)="9c7e16054587ca7266dc7b3e35c52090b7a165435ccaf36e49b485d9d80f057f9db62ce3663b552715fca1c247c5a0799da7", 0x32, 0x9}, {&(0x7f00000001c0)="f13f228209b6431821c557bb0f17d596e5c2e78ff19972749a74cfce0f776754bf09e5777486b646e4f0a27db64919decfb54b73bb1efb2d5efaff1621eda0252bcd3ef1cb8445e8bb6bef449e071da21283b7499705b1992f81284169e1907dd51cfcc55e4e2a0258fb1fa827108663606948a42b", 0x75, 0x7c5}, {&(0x7f0000000240)="970b4a02e4583c6dcc7fcf40ba4ad7778a86b91dcf7f3f842ea700a6954c03bb635f1e107119c6514901be9a4466a88f9fbccdae08118550c27d6eb3a52909c19945b6c7f88306b7f7e944c6dcaa5921df5a31d819d91df55f2d8caf267d1acc87180476fcac03062f58e6595c03413d0335d4c9bcd8a6fbb22e10d034da2f2834aeb707cbd0f23ecae4534e2bb84066cd520ecb70dd75c18aff686d4077511c884f0d567f8557b44b632bd7deb3351df80372ad9fd42a4b8a6fdc7a848d4b480d3eef0c4b18a4544eac1a91a79d8449024735a792a4266cd321eea45156764ad5eb4edcd18369385020d17684580302004f9669", 0xf4, 0x5}, {&(0x7f0000000340)="5eec049e48465bdc48280731b3b26d862b45aed5cf5c778235dbb5ee329f9d85a75fe359090b08acdd9d6070fe8fc8d1ced47b2abb269cfc7da612ae9882a7", 0x3f, 0x5}, {&(0x7f0000000380)="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", 0xfc, 0x4b}, {&(0x7f0000000480)="3db1f07ec6c9b226180ffe665bfb8f17533738cf4c8b9540b4b0fa2293640f3f73cc76b760de7c4dccc23325d83db2fe03e5b1f47b6a72ad417c39ac545cfc7dbf5bbdeb75a65dff8907f79f446970c704deced9e44d0f3cc013c4d35855e2f42241cfb7e6a44ce264c83f7305e10b92326e3fcc512b2b0fd871d0fd7b8bef1fa645663c0a048be30e25b4a647982364a006f61287881ce502e80efbb6cb07c42a5c254febcb567763354c490eda95260a723ef705b9210585b55c3def5263241e4142fe9cce53bc18b75b34b8d4e208b132423e026949607e2cba0808f168a89a510b2d3e143ad17c514231d1491827cccdf8dcae", 0xf5, 0x2}, {&(0x7f0000000580)="6b9178dedb632bfe87746b3bb70cf627ac78b46973d5f430dcb2ce506f5f6adaaf8302c1cb05a5befb913a6b0f10287d586e19fe721369fc5fbfc2d656d8cadf02769e23fc92ad83c34fe59d696719362afb6fab154202de758b39089c861a4e033eb76a089a6e2c5ed1", 0x6a, 0x7}, {&(0x7f0000000600)="5b5ce1eb0a61f3e95cfa838fd083ada7c460c19c264314f3fbb145ea66b5bae032f901dbd320c83361fef41ee0bb1604894c40b50b379ef8ba8795631f796b5aa43651ab9d7ceef1740e3f5ca662157b8317a5394b1342a5fac50abd7fb9eb800bf3793375f2e9863ea0753bea36387f767936d0b4e99581b943fec0c2dbba40dadcfaea96eeaccb75", 0x89, 0x81}], 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) syz_mount_image$ubifs(&(0x7f00000007c0), &(0x7f0000000800)='./file0\x00', 0x9, 0x6, &(0x7f0000000a80)=[{&(0x7f0000000840)="162c348ade5c3cd65dd9ecf1e9edcc885b102bb3ca0520ddb3125b48c489660b3bdef159cd14d55f1df5c6a527c4d172678bd47619b02e2aa39e96fb05f144faaab2f807f0ac5d06c0c9a827b252179aed754992560aa24169bab7f311c1d826b936a8989bcfae61c1c1d266a9c645c2f55cea5ac363a74e1a", 0x79, 0x81}, {&(0x7f00000008c0)="16dcb0b95c98be956e", 0x9, 0xcfe0000000000000}, {&(0x7f0000000900)="84e41ceb07f747a827f2d1c13c9858927a5563933d5773089c1a67f78616", 0x1e, 0xffffffffffffffb5}, {&(0x7f0000000940)="8d7d35766f2a99be99b1fded1221af9af0907dd1a3da1a3cc7c6701d9d9e45e6cebd9285479e065610e5da7822ec74d81800a1867fa99d72a5516c2aa769cc02261f5f0dac5e1bafffacc5ebf2ca89e2efadcf0117938f8f7f1560423551671a87906402945c64562c0bf226961941daa83c0d2809819ae2cd3ccc", 0x7b, 0x200}, {&(0x7f00000009c0)="4d55f4145a282a120137bcfd3b22562bac70638251369d7c777821b181", 0x1d, 0x266}, {&(0x7f0000000a00)="4cf15f21d200a312a5c2970de2175d2081953c009f10a2f8d2887ec0f654d1dd0e6403135adb593e058588c6fb5f763420a899fd0f1664833e36df5aeb8db043eef82f23de4c6b7c2c1d1e8362f46e3fbf8dc0e6448c4ac22c5748b270588d0a601f16f404", 0x65, 0x2}], 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="617574785f6b65793d2c617574685f6b65793d952c736d616304000000000000003a263a2c0086e8f667bc11a06a00259190a2e933038b67057418272d457a4d64447914961985331129f541d03edf8e47fa45d8d6673738e5f86e532690ba0ae8f4483ec22f1a342bbb0c74260c19bb12a23d77c738832bcb35146757e10909ad3adf2a238f656444a90d92a050c352"]) (async) socket$inet6_dccp(0xa, 0x6, 0x0) (async) 11:23:46 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:46 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) [ 2124.440009] UBIFS error (pid: 21360): cannot open "/dev/loop5", error -22 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:46 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:47 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:47 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:47 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x9, &(0x7f00000006c0)=[{&(0x7f0000000080)="1094fef35f2056ffa4e836537ebb96a786635b61210ad953b25ae88d3833396211d842b8493b58193ad2339e87a1f55b16992070d2c14de22c2e306d3fe663cc5c7637c0f77cdfdf620696ad308ff38980c67c68e077ead8d096f531d006d81f290e32947d25238091f1be0b9929ce2de6ddb86b399d5f96a195d1315d1fcc7b4e45f46d739a954b45e9bc45cddf17381aefe516f639ff3b0d7cf030273aedaf798d534adb1302e665dcecfd75a89afa5f9bbfc1bcd2de407165b726aa090ffc9e65f994912b8a79f744aa6e7e79d562c99f4ff45baea7e59f79f33455e44e3a17", 0xe1, 0x8000}, {&(0x7f0000000180)="9c7e16054587ca7266dc7b3e35c52090b7a165435ccaf36e49b485d9d80f057f9db62ce3663b552715fca1c247c5a0799da7", 0x32, 0x9}, {&(0x7f00000001c0)="f13f228209b6431821c557bb0f17d596e5c2e78ff19972749a74cfce0f776754bf09e5777486b646e4f0a27db64919decfb54b73bb1efb2d5efaff1621eda0252bcd3ef1cb8445e8bb6bef449e071da21283b7499705b1992f81284169e1907dd51cfcc55e4e2a0258fb1fa827108663606948a42b", 0x75, 0x7c5}, {&(0x7f0000000240)="970b4a02e4583c6dcc7fcf40ba4ad7778a86b91dcf7f3f842ea700a6954c03bb635f1e107119c6514901be9a4466a88f9fbccdae08118550c27d6eb3a52909c19945b6c7f88306b7f7e944c6dcaa5921df5a31d819d91df55f2d8caf267d1acc87180476fcac03062f58e6595c03413d0335d4c9bcd8a6fbb22e10d034da2f2834aeb707cbd0f23ecae4534e2bb84066cd520ecb70dd75c18aff686d4077511c884f0d567f8557b44b632bd7deb3351df80372ad9fd42a4b8a6fdc7a848d4b480d3eef0c4b18a4544eac1a91a79d8449024735a792a4266cd321eea45156764ad5eb4edcd18369385020d17684580302004f9669", 0xf4, 0x5}, {&(0x7f0000000340)="5eec049e48465bdc48280731b3b26d862b45aed5cf5c778235dbb5ee329f9d85a75fe359090b08acdd9d6070fe8fc8d1ced47b2abb269cfc7da612ae9882a7", 0x3f, 0x5}, {&(0x7f0000000380)="125663fa4dfa4196905d85ecbf18eed7907fb60306fff6e81f2431755537ac6bbb6d33bf7eb609f3d4d526aa8619da8e44eae2b76e11bb2cda62f656fa683bd195615e42b31c516a31a7e633fe797e1c905c5eed6b49e67320c8a28843e8e5422cc831753c0f1240a104aef40be9b8f9048e421ba0150e56b1a788a1d1217fd17edc4bbda453c802b65342b6d9b46044af0037d1eb9141fb9da09e36fc68fa3b4269b8b148e73f8e9878aab4682c0c3098d3decd6af5ded3c5f0a086fbbf58c10a350dde65a8d36287e5bc14361e7c18fca6500446025f12ad6d9d4c324ffbfb2ab674015ffad7ed0a8cca466701fb1c8fc0f574a2120a2d10f01338", 0xfc, 0x4b}, {&(0x7f0000000480)="3db1f07ec6c9b226180ffe665bfb8f17533738cf4c8b9540b4b0fa2293640f3f73cc76b760de7c4dccc23325d83db2fe03e5b1f47b6a72ad417c39ac545cfc7dbf5bbdeb75a65dff8907f79f446970c704deced9e44d0f3cc013c4d35855e2f42241cfb7e6a44ce264c83f7305e10b92326e3fcc512b2b0fd871d0fd7b8bef1fa645663c0a048be30e25b4a647982364a006f61287881ce502e80efbb6cb07c42a5c254febcb567763354c490eda95260a723ef705b9210585b55c3def5263241e4142fe9cce53bc18b75b34b8d4e208b132423e026949607e2cba0808f168a89a510b2d3e143ad17c514231d1491827cccdf8dcae", 0xf5, 0x2}, {&(0x7f0000000580)="6b9178dedb632bfe87746b3bb70cf627ac78b46973d5f430dcb2ce506f5f6adaaf8302c1cb05a5befb913a6b0f10287d586e19fe721369fc5fbfc2d656d8cadf02769e23fc92ad83c34fe59d696719362afb6fab154202de758b39089c861a4e033eb76a089a6e2c5ed1", 0x6a, 0x7}, {&(0x7f0000000600)="5b5ce1eb0a61f3e95cfa838fd083ada7c460c19c264314f3fbb145ea66b5bae032f901dbd320c83361fef41ee0bb1604894c40b50b379ef8ba8795631f796b5aa43651ab9d7ceef1740e3f5ca662157b8317a5394b1342a5fac50abd7fb9eb800bf3793375f2e9863ea0753bea36387f767936d0b4e99581b943fec0c2dbba40dadcfaea96eeaccb75", 0x89, 0x81}], 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_mount_image$ubifs(&(0x7f00000007c0), &(0x7f0000000800)='./file0\x00', 0x9, 0x6, &(0x7f0000000a80)=[{&(0x7f0000000840)="162c348ade5c3cd65dd9ecf1e9edcc885b102bb3ca0520ddb3125b48c489660b3bdef159cd14d55f1df5c6a527c4d172678bd47619b02e2aa39e96fb05f144faaab2f807f0ac5d06c0c9a827b252179aed754992560aa24169bab7f311c1d826b936a8989bcfae61c1c1d266a9c645c2f55cea5ac363a74e1a", 0x79, 0x81}, {&(0x7f00000008c0)="16dcb0b95c98be956e", 0x9, 0xcfe0000000000000}, {&(0x7f0000000900)="84e41ceb07f747a827f2d1c13c9858927a5563933d5773089c1a67f78616", 0x1e, 0xffffffffffffffb5}, {&(0x7f0000000940)="8d7d35766f2a99be99b1fded1221af9af0907dd1a3da1a3cc7c6701d9d9e45e6cebd9285479e065610e5da7822ec74d81800a1867fa99d72a5516c2aa769cc02261f5f0dac5e1bafffacc5ebf2ca89e2efadcf0117938f8f7f1560423551671a87906402945c64562c0bf226961941daa83c0d2809819ae2cd3ccc", 0x7b, 0x200}, {&(0x7f00000009c0)="4d55f4145a282a120137bcfd3b22562bac70638251369d7c777821b181", 0x1d, 0x266}, {&(0x7f0000000a00)="4cf15f21d200a312a5c2970de2175d2081953c009f10a2f8d2887ec0f654d1dd0e6403135adb593e058588c6fb5f763420a899fd0f1664833e36df5aeb8db043eef82f23de4c6b7c2c1d1e8362f46e3fbf8dc0e6448c4ac22c5748b270588d0a601f16f404", 0x65, 0x2}], 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="617574785f6b65793d2c617574685f6b65793d952c736d616304000000000000003a263a2c0086e8f667bc11a06a00259190a2e933038b67057418272d457a4d64447914961985331129f541d03edf8e47fa45d8d6673738e5f86e532690ba0ae8f4483ec22f1a342bbb0c74260c19bb12a23d77c738832bcb35146757e10909ad3adf2a238f656444a90d92a050c352"]) socket$inet6_dccp(0xa, 0x6, 0x0) 11:23:47 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:47 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = fanotify_init(0x20, 0x800) fanotify_mark(r1, 0x4c, 0x0, r0, &(0x7f0000000340)='./file0\x00') fanotify_init(0x8, 0x40000) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="ea9af267d81356470e048e5245f531e5cdbc281f5cd2fab198fc8cae169440829b55486837ffb9074998831415c7edcce524b541a6695406a939e8341cefbbef008a170c710a12d817183a5e3a1828cd9e2b74d175bf7502560f55850a586e03140a9051c622ecdc2a5731fb54cf142cc4fa369214a6fa6ae535a225023be7395bffeb56c8718e2eb4c9f18710959ae42b42a0d645253b02f50496f8d11f94892c0aea3234b8cb1ae0e788c718", 0xad, 0x8f}, {&(0x7f00000001c0)="ac10fef910daa539577c8e46b5696a98e63652da6b82d36a356a114f0262b9020c0dbae3e3686e7599992c4f3f6d58e1cc7ecb3a719435ac28a8a00ab580f1c652566d691a079eee0db939a9cce00b2881f6c84f", 0x54, 0x8}, {&(0x7f0000000240)="13c5056810d05382", 0x8, 0x9}], 0x80000, &(0x7f0000000480)=ANY=[@ANYBLOB="6375626a0800000000000000d45d18721e7d2659f7819b07c38d27ffc34c65ca57fc9a9e16b5b0bafd91c915d768bb307a1affbf83b1268ac74a2c753677ca1c3f03763d1c591dbf32f3637bd683f9fcc50dfb8205ee20088126e21028e2bbdadd1240e659f28cf3f6740d0ab073c4f422ee79e01db82aac4ac5c190aac1a8d60202786cfcfa3f543c023c76e7d27fd6828b7fdafd89883cc3086393936127e90afa199eb9c5aee9494ddfb41424f667a6d55b4e31f1dcfab1c2a0a7f700"/209]) 11:23:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:47 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:47 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df70", 0x51, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:47 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:47 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:47 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:47 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = fanotify_init(0x20, 0x800) fanotify_mark(r1, 0x4c, 0x0, r0, &(0x7f0000000340)='./file0\x00') fanotify_init(0x8, 0x40000) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="ea9af267d81356470e048e5245f531e5cdbc281f5cd2fab198fc8cae169440829b55486837ffb9074998831415c7edcce524b541a6695406a939e8341cefbbef008a170c710a12d817183a5e3a1828cd9e2b74d175bf7502560f55850a586e03140a9051c622ecdc2a5731fb54cf142cc4fa369214a6fa6ae535a225023be7395bffeb56c8718e2eb4c9f18710959ae42b42a0d645253b02f50496f8d11f94892c0aea3234b8cb1ae0e788c718", 0xad, 0x8f}, {&(0x7f00000001c0)="ac10fef910daa539577c8e46b5696a98e63652da6b82d36a356a114f0262b9020c0dbae3e3686e7599992c4f3f6d58e1cc7ecb3a719435ac28a8a00ab580f1c652566d691a079eee0db939a9cce00b2881f6c84f", 0x54, 0x8}, {&(0x7f0000000240)="13c5056810d05382", 0x8, 0x9}], 0x80000, &(0x7f0000000480)=ANY=[@ANYBLOB="6375626a0800000000000000d45d18721e7d2659f7819b07c38d27ffc34c65ca57fc9a9e16b5b0bafd91c915d768bb307a1affbf83b1268ac74a2c753677ca1c3f03763d1c591dbf32f3637bd683f9fcc50dfb8205ee20088126e21028e2bbdadd1240e659f28cf3f6740d0ab073c4f422ee79e01db82aac4ac5c190aac1a8d60202786cfcfa3f543c023c76e7d27fd6828b7fdafd89883cc3086393936127e90afa199eb9c5aee9494ddfb41424f667a6d55b4e31f1dcfab1c2a0a7f700"/209]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) fanotify_init(0x20, 0x800) (async) fanotify_mark(r1, 0x4c, 0x0, r0, &(0x7f0000000340)='./file0\x00') (async) fanotify_init(0x8, 0x40000) (async) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="ea9af267d81356470e048e5245f531e5cdbc281f5cd2fab198fc8cae169440829b55486837ffb9074998831415c7edcce524b541a6695406a939e8341cefbbef008a170c710a12d817183a5e3a1828cd9e2b74d175bf7502560f55850a586e03140a9051c622ecdc2a5731fb54cf142cc4fa369214a6fa6ae535a225023be7395bffeb56c8718e2eb4c9f18710959ae42b42a0d645253b02f50496f8d11f94892c0aea3234b8cb1ae0e788c718", 0xad, 0x8f}, {&(0x7f00000001c0)="ac10fef910daa539577c8e46b5696a98e63652da6b82d36a356a114f0262b9020c0dbae3e3686e7599992c4f3f6d58e1cc7ecb3a719435ac28a8a00ab580f1c652566d691a079eee0db939a9cce00b2881f6c84f", 0x54, 0x8}, {&(0x7f0000000240)="13c5056810d05382", 0x8, 0x9}], 0x80000, &(0x7f0000000480)=ANY=[@ANYBLOB="6375626a0800000000000000d45d18721e7d2659f7819b07c38d27ffc34c65ca57fc9a9e16b5b0bafd91c915d768bb307a1affbf83b1268ac74a2c753677ca1c3f03763d1c591dbf32f3637bd683f9fcc50dfb8205ee20088126e21028e2bbdadd1240e659f28cf3f6740d0ab073c4f422ee79e01db82aac4ac5c190aac1a8d60202786cfcfa3f543c023c76e7d27fd6828b7fdafd89883cc3086393936127e90afa199eb9c5aee9494ddfb41424f667a6d55b4e31f1dcfab1c2a0a7f700"/209]) (async) 11:23:47 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:47 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:47 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x405) 11:23:48 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b379354", 0x5e, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x34}}, 0x405) 11:23:48 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:48 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = fanotify_init(0x20, 0x800) fanotify_mark(r1, 0x4c, 0x0, r0, &(0x7f0000000340)='./file0\x00') fanotify_init(0x8, 0x40000) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="ea9af267d81356470e048e5245f531e5cdbc281f5cd2fab198fc8cae169440829b55486837ffb9074998831415c7edcce524b541a6695406a939e8341cefbbef008a170c710a12d817183a5e3a1828cd9e2b74d175bf7502560f55850a586e03140a9051c622ecdc2a5731fb54cf142cc4fa369214a6fa6ae535a225023be7395bffeb56c8718e2eb4c9f18710959ae42b42a0d645253b02f50496f8d11f94892c0aea3234b8cb1ae0e788c718", 0xad, 0x8f}, {&(0x7f00000001c0)="ac10fef910daa539577c8e46b5696a98e63652da6b82d36a356a114f0262b9020c0dbae3e3686e7599992c4f3f6d58e1cc7ecb3a719435ac28a8a00ab580f1c652566d691a079eee0db939a9cce00b2881f6c84f", 0x54, 0x8}, {&(0x7f0000000240)="13c5056810d05382", 0x8, 0x9}], 0x80000, &(0x7f0000000480)=ANY=[@ANYBLOB="6375626a0800000000000000d45d18721e7d2659f7819b07c38d27ffc34c65ca57fc9a9e16b5b0bafd91c915d768bb307a1affbf83b1268ac74a2c753677ca1c3f03763d1c591dbf32f3637bd683f9fcc50dfb8205ee20088126e21028e2bbdadd1240e659f28cf3f6740d0ab073c4f422ee79e01db82aac4ac5c190aac1a8d60202786cfcfa3f543c023c76e7d27fd6828b7fdafd89883cc3086393936127e90afa199eb9c5aee9494ddfb41424f667a6d55b4e31f1dcfab1c2a0a7f700"/209]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) fanotify_init(0x20, 0x800) (async) fanotify_mark(r1, 0x4c, 0x0, r0, &(0x7f0000000340)='./file0\x00') (async) fanotify_init(0x8, 0x40000) (async) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="ea9af267d81356470e048e5245f531e5cdbc281f5cd2fab198fc8cae169440829b55486837ffb9074998831415c7edcce524b541a6695406a939e8341cefbbef008a170c710a12d817183a5e3a1828cd9e2b74d175bf7502560f55850a586e03140a9051c622ecdc2a5731fb54cf142cc4fa369214a6fa6ae535a225023be7395bffeb56c8718e2eb4c9f18710959ae42b42a0d645253b02f50496f8d11f94892c0aea3234b8cb1ae0e788c718", 0xad, 0x8f}, {&(0x7f00000001c0)="ac10fef910daa539577c8e46b5696a98e63652da6b82d36a356a114f0262b9020c0dbae3e3686e7599992c4f3f6d58e1cc7ecb3a719435ac28a8a00ab580f1c652566d691a079eee0db939a9cce00b2881f6c84f", 0x54, 0x8}, {&(0x7f0000000240)="13c5056810d05382", 0x8, 0x9}], 0x80000, &(0x7f0000000480)=ANY=[@ANYBLOB="6375626a0800000000000000d45d18721e7d2659f7819b07c38d27ffc34c65ca57fc9a9e16b5b0bafd91c915d768bb307a1affbf83b1268ac74a2c753677ca1c3f03763d1c591dbf32f3637bd683f9fcc50dfb8205ee20088126e21028e2bbdadd1240e659f28cf3f6740d0ab073c4f422ee79e01db82aac4ac5c190aac1a8d60202786cfcfa3f543c023c76e7d27fd6828b7fdafd89883cc3086393936127e90afa199eb9c5aee9494ddfb41424f667a6d55b4e31f1dcfab1c2a0a7f700"/209]) (async) 11:23:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xffffffffffffff6f, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x34}}, 0x0) 11:23:48 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:48 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:48 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:48 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0081000000fcfddbdf250100000208000af82961eddd1896ca000b00000006001d00000000000500050001000000"], 0x34}, 0x1, 0x0, 0x0, 0x4040095}, 0x40000c0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x200008c0}, 0x24000000) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:48 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:48 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f7", 0x65, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:48 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:48 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0081000000fcfddbdf250100000208000af82961eddd1896ca000b00000006001d00000000000500050001000000"], 0x34}, 0x1, 0x0, 0x0, 0x4040095}, 0x40000c0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x200008c0}, 0x24000000) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:49 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:49 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:49 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0081000000fcfddbdf250100000208000af82961eddd1896ca000b00000006001d00000000000500050001000000"], 0x34}, 0x1, 0x0, 0x0, 0x4040095}, 0x40000c0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r2, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x2}, @L2TP_ATTR_PEER_SESSION_ID={0x8, 0xc, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x200008c0}, 0x24000000) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:49 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:49 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:49 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831", 0x68, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:49 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$input_event(r0, &(0x7f00000000c0)={{}, 0x5, 0x4, 0x5}, 0x18) 11:23:49 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:49 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:49 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:49 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:49 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$input_event(r0, &(0x7f00000000c0)={{}, 0x5, 0x4, 0x5}, 0x18) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) write$input_event(r0, &(0x7f00000000c0)={{}, 0x5, 0x4, 0x5}, 0x18) (async) 11:23:49 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:50 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:50 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async, rerun: 32) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 32) write$input_event(r0, &(0x7f00000000c0)={{}, 0x5, 0x4, 0x5}, 0x18) 11:23:50 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:50 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204", 0x6a, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:50 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:50 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:50 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:50 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) socket$l2tp6(0xa, 0x2, 0x73) 11:23:51 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:51 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:51 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:51 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) socket$l2tp6(0xa, 0x2, 0x73) 11:23:51 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:51 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) socket$l2tp6(0xa, 0x2, 0x73) 11:23:51 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:51 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:51 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:51 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fanotify_init(0x9, 0x2) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f00000000c0)) 11:23:51 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:51 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:52 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:52 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fanotify_init(0x9, 0x2) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f00000000c0)) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) fanotify_init(0x9, 0x2) (async) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f00000000c0)) (async) 11:23:52 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:52 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = openat$dsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fanotify_init(0x9, 0x2) (async, rerun: 64) ioctl$SNDCTL_DSP_GETODELAY(r0, 0x80045017, &(0x7f00000000c0)) (rerun: 64) 11:23:52 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:52 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:52 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES16=r0, @ANYBLOB="bf8a8801efa7dd290c27978de2df610ee26d5834353ab7e8f37d11e00db9b605c3075f271f0ba90349d793", @ANYRES64=0x0, @ANYBLOB="7bce5d15b5440f9c7f7854aff12b340b6915e562a62ab613c52f5f760270a91838d836e5b6cad9a557d1f74ff4dfbafe9c67d74ad4914e571a076afc4aac8651c77910a3090f4d5c25a7fef32fbed82ea8e4bb0cc5c43009b63edc85f9dc9a3ed2bc19969bbe7b7f8230b9c372d409a5140c9f2ec1e4a486b9", @ANYRESDEC=r0, @ANYRESHEX=r0]) 11:23:52 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:52 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES16=r0, @ANYBLOB="bf8a8801efa7dd290c27978de2df610ee26d5834353ab7e8f37d11e00db9b605c3075f271f0ba90349d793", @ANYRES64=0x0, @ANYBLOB="7bce5d15b5440f9c7f7854aff12b340b6915e562a62ab613c52f5f760270a91838d836e5b6cad9a557d1f74ff4dfbafe9c67d74ad4914e571a076afc4aac8651c77910a3090f4d5c25a7fef32fbed82ea8e4bb0cc5c43009b63edc85f9dc9a3ed2bc19969bbe7b7f8230b9c372d409a5140c9f2ec1e4a486b9", @ANYRESDEC=r0, @ANYRESHEX=r0]) 11:23:52 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f00000004c0)=ANY=[@ANYRES64, @ANYRES16=r0, @ANYBLOB="bf8a8801efa7dd290c27978de2df610ee26d5834353ab7e8f37d11e00db9b605c3075f271f0ba90349d793", @ANYRES64=0x0, @ANYBLOB="7bce5d15b5440f9c7f7854aff12b340b6915e562a62ab613c52f5f760270a91838d836e5b6cad9a557d1f74ff4dfbafe9c67d74ad4914e571a076afc4aac8651c77910a3090f4d5c25a7fef32fbed82ea8e4bb0cc5c43009b63edc85f9dc9a3ed2bc19969bbe7b7f8230b9c372d409a5140c9f2ec1e4a486b9", @ANYRESDEC=r0, @ANYRESHEX=r0]) 11:23:52 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:52 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:52 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:52 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:53 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:53 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) fanotify_mark(r1, 0x8, 0x10, r0, &(0x7f0000000080)='./file0\x00') socket$vsock_stream(0x28, 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), r1) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000280)="f9d5bc502b85697f578a3f1788992662a5fcd7704aa4830b1b3e1423217e29545390c2c5b23d63f23e9e862b93ccf44c21f90d35062ec3674ef1faf6697c0e167f017442954ef1d9ceb3a7f8c161f6c6e1bafb0561ef49cbb49cd24ef92ffc8e3b9db49db02b3338ac6ccba22edbafa54eef9a935ccda817ee086fc781ea64093cc77af8265fdf265e9763e0eeaef73a74c7ae5c5d0f0548d68e659f2be1153f1fcb19105cb6bdf4949d8d24d793e2bb0e1d7c69ec0e43d50e4df22c7112e1b82d34dccc686a5e268adc8f21a33646674de24c2c8a5b5269d72b6d938aa1c99e75178dbcf9ec3c", 0xe7) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r3, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x10001]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x800) 11:23:53 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:53 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:53 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) fanotify_mark(r1, 0x8, 0x10, r0, &(0x7f0000000080)='./file0\x00') socket$vsock_stream(0x28, 0x1, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), r1) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000280)="f9d5bc502b85697f578a3f1788992662a5fcd7704aa4830b1b3e1423217e29545390c2c5b23d63f23e9e862b93ccf44c21f90d35062ec3674ef1faf6697c0e167f017442954ef1d9ceb3a7f8c161f6c6e1bafb0561ef49cbb49cd24ef92ffc8e3b9db49db02b3338ac6ccba22edbafa54eef9a935ccda817ee086fc781ea64093cc77af8265fdf265e9763e0eeaef73a74c7ae5c5d0f0548d68e659f2be1153f1fcb19105cb6bdf4949d8d24d793e2bb0e1d7c69ec0e43d50e4df22c7112e1b82d34dccc686a5e268adc8f21a33646674de24c2c8a5b5269d72b6d938aa1c99e75178dbcf9ec3c", 0xe7) (async) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r3, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x10001]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x800) 11:23:53 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:53 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:53 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 5: r0 = syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) fanotify_mark(r1, 0x8, 0x10, r0, &(0x7f0000000080)='./file0\x00') socket$vsock_stream(0x28, 0x1, 0x0) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), r1) (async) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000280)="f9d5bc502b85697f578a3f1788992662a5fcd7704aa4830b1b3e1423217e29545390c2c5b23d63f23e9e862b93ccf44c21f90d35062ec3674ef1faf6697c0e167f017442954ef1d9ceb3a7f8c161f6c6e1bafb0561ef49cbb49cd24ef92ffc8e3b9db49db02b3338ac6ccba22edbafa54eef9a935ccda817ee086fc781ea64093cc77af8265fdf265e9763e0eeaef73a74c7ae5c5d0f0548d68e659f2be1153f1fcb19105cb6bdf4949d8d24d793e2bb0e1d7c69ec0e43d50e4df22c7112e1b82d34dccc686a5e268adc8f21a33646674de24c2c8a5b5269d72b6d938aa1c99e75178dbcf9ec3c", 0xe7) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x48, r3, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x10001]}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x800) 11:23:53 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:53 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:53 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:53 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x245, 0x88800) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3061) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1b, 0x2, 0x9, 0x1, "35338339fb7dc6a7f4123326eea29ae908938a4f93a19bd17851160f4255cba1acc0845f585338899d0b9db886654dbcc1ef7e15ca155b282884d9e29dda5d24", "de87970a8f5958253405a99610bccd2865e41c38ce1f050761d146c4a3631223", [0x80, 0x4]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 11:23:54 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:54 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:54 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:54 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:54 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x245, 0x88800) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3061) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1b, 0x2, 0x9, 0x1, "35338339fb7dc6a7f4123326eea29ae908938a4f93a19bd17851160f4255cba1acc0845f585338899d0b9db886654dbcc1ef7e15ca155b282884d9e29dda5d24", "de87970a8f5958253405a99610bccd2865e41c38ce1f050761d146c4a3631223", [0x80, 0x4]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) syz_open_dev$loop(&(0x7f0000000080), 0x245, 0x88800) (async) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3061) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1b, 0x2, 0x9, 0x1, "35338339fb7dc6a7f4123326eea29ae908938a4f93a19bd17851160f4255cba1acc0845f585338899d0b9db886654dbcc1ef7e15ca155b282884d9e29dda5d24", "de87970a8f5958253405a99610bccd2865e41c38ce1f050761d146c4a3631223", [0x80, 0x4]}) (async) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) 11:23:54 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:54 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:54 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:54 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x245, 0x88800) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3061) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x1b, 0x2, 0x9, 0x1, "35338339fb7dc6a7f4123326eea29ae908938a4f93a19bd17851160f4255cba1acc0845f585338899d0b9db886654dbcc1ef7e15ca155b282884d9e29dda5d24", "de87970a8f5958253405a99610bccd2865e41c38ce1f050761d146c4a3631223", [0x80, 0x4]}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 11:23:54 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:54 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:54 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2124.836951] UBIFS error (pid: 21412): cannot open "/dev/loop5", error -22 11:23:54 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:55 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x2, 0x80000) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x7, 0x1526d3c5, 0x22, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x9, 0x400, 0x6, 0x10, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 11:23:55 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a559059", 0x26, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:55 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:55 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2132.913864] UBIFS error (pid: 22422): cannot open "/dev/loop4", error -22 11:23:55 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:55 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x2, 0x80000) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x7, 0x1526d3c5, 0x22, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x9, 0x400, 0x6, 0x10, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) syz_open_dev$sg(&(0x7f0000000180), 0x2, 0x80000) (async) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x7, 0x1526d3c5, 0x22, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x9, 0x400, 0x6, 0x10, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) (async) 11:23:55 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:55 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:55 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:55 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) [ 2133.144920] UBIFS error (pid: 22452): cannot open "/dev/loop4", error -22 11:23:55 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:55 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = syz_open_dev$sg(&(0x7f0000000180), 0x2, 0x80000) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x2, 0x7, 0x1526d3c5, 0x22, 0x1, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x11, 0x9, 0x400, 0x6, 0x10, r1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 11:23:55 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:23:55 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:55 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:55 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:23:55 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20048024) r4 = syz_open_dev$sg(&(0x7f00000000c0), 0x1f, 0x230483) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7b1b447, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2, @ANYBLOB="072bfeb26bf8f3f85f6917aa099801bcf96215a8f11022596991d385620b2000bae90b"]) r5 = syz_open_dev$sg(&(0x7f0000000100), 0x1ff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) 11:23:55 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:55 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:55 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8", 0x2c, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2133.434074] UBIFS error (pid: 22495): cannot open "/dev/loop4", error -22 11:23:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20048024) r4 = syz_open_dev$sg(&(0x7f00000000c0), 0x1f, 0x230483) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7b1b447, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2, @ANYBLOB="072bfeb26bf8f3f85f6917aa099801bcf96215a8f11022596991d385620b2000bae90b"]) r5 = syz_open_dev$sg(&(0x7f0000000100), 0x1ff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20048024) (async) syz_open_dev$sg(&(0x7f00000000c0), 0x1f, 0x230483) (async) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7b1b447, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2, @ANYBLOB="072bfeb26bf8f3f85f6917aa099801bcf96215a8f11022596991d385620b2000bae90b"]) (async) syz_open_dev$sg(&(0x7f0000000100), 0x1ff, 0x0) (async) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) (async) 11:23:56 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:23:56 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:56 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:56 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:56 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) [ 2134.042124] UBIFS error (pid: 22573): cannot open "/dev/loop0", error -22 11:23:56 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:56 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) 11:23:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x200000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r3, 0x4, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x20048024) (async) r4 = syz_open_dev$sg(&(0x7f00000000c0), 0x1f, 0x230483) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7b1b447, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2, @ANYBLOB="072bfeb26bf8f3f85f6917aa099801bcf96215a8f11022596991d385620b2000bae90b"]) (async) r5 = syz_open_dev$sg(&(0x7f0000000100), 0x1ff, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r5, 0x5380) 11:23:56 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:56 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:56 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:56 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) 11:23:56 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000000, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x200880, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) 11:23:56 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e", 0x2f, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:56 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:56 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:56 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) 11:23:57 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:57 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:57 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000000, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x200880, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000000, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x200880, 0x0) (async) ioctl$RTC_WIE_ON(r0, 0x700f) (async) 11:23:57 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:57 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) 11:23:57 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:57 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:57 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:57 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x400000000, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x200880, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) 11:23:57 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) 11:23:57 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:57 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb", 0x31, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:57 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:57 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xc394}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x4008014) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xf4, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:useradd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:framebuf_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:clock_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0xf4}, 0x1, 0x0, 0x0, 0x400c000}, 0x800) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 11:23:57 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:57 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) 11:23:57 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:57 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:57 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:58 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:58 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xc394}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x4008014) (async) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xf4, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:useradd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:framebuf_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:clock_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0xf4}, 0x1, 0x0, 0x0, 0x400c000}, 0x800) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 11:23:58 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:58 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) 11:23:58 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:58 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2134.310945] UBIFS error (pid: 22594): cannot open "/dev/loop0", error -22 11:23:58 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:58 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r0) (async) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x44, 0x0, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xc394}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0}, 0x4008014) (async, rerun: 32) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000380), r0) (rerun: 32) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)={0xf4, r1, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:useradd_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:framebuf_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:clock_device_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_SECCTX={0x25, 0x7, 'system_u:object_r:getty_etc_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0xf4}, 0x1, 0x0, 0x0, 0x400c000}, 0x800) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @loopback}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 11:23:58 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) 11:23:58 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:58 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2136.211883] UBIFS error (pid: 22825): cannot open "/dev/loop2", error -22 11:23:58 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="31157488368b9c3250acaa6668355259567875f9beffcb1528ff952232e81f97b1074d0b5f64c4b29b9e2ae223a191809c8f7d6e360d1d5e4d9d2eb368a5c827272354ca2a6e78042da52ad1914ae2be71009d7b6c70854545aefdd00aa21149edb6369ee7620c36b4965c598d8a98d08472aa968f1de4c124654f09668f6213089be79ebd22e2907fd5725938ccc54cc48a602d799ea5df234f879a1eda4b0ce4096f89c97191b4c1ed334bd5034778d9a6f50616c865845a0e336b15", 0xbd}, {&(0x7f0000000140)="2f74938725cd031d52021773beee277c992c9abf538208f3b14d751680a057d47d06643a849be33fe71368247ffeadee22db2f29bb3c46848f13e988993deefb04651f7a", 0x44, 0x401}, {&(0x7f00000001c0)="1ca7e530771b4d787674872409f275b707bacd74a6a128d7ce5fa6ec3f69dbae2447691c58bf40521fcebdbd91dfda17c14b8a703b61edf87cfedfa1010d7718f8a9d1b2cfeb46d901b6c43a7f1bcf4a3e11a03bb69749ccef3f05c492d6a82a924805a1d4d4969e9176450ca5b4f73c459e4562354447ac08fed2db62f3be1414d3ac479b0116275fc8d2f41fe41898d885bb6fb2255eb53984ef493fb976cff4fc6a89bc56f5a83d5ec499b091d9eff11e2a641b786f", 0xb7, 0x7fffffff}], 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:58 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) 11:23:58 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:58 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:58 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:58 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:58 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="31157488368b9c3250acaa6668355259567875f9beffcb1528ff952232e81f97b1074d0b5f64c4b29b9e2ae223a191809c8f7d6e360d1d5e4d9d2eb368a5c827272354ca2a6e78042da52ad1914ae2be71009d7b6c70854545aefdd00aa21149edb6369ee7620c36b4965c598d8a98d08472aa968f1de4c124654f09668f6213089be79ebd22e2907fd5725938ccc54cc48a602d799ea5df234f879a1eda4b0ce4096f89c97191b4c1ed334bd5034778d9a6f50616c865845a0e336b15", 0xbd}, {&(0x7f0000000140)="2f74938725cd031d52021773beee277c992c9abf538208f3b14d751680a057d47d06643a849be33fe71368247ffeadee22db2f29bb3c46848f13e988993deefb04651f7a", 0x44, 0x401}, {&(0x7f00000001c0)="1ca7e530771b4d787674872409f275b707bacd74a6a128d7ce5fa6ec3f69dbae2447691c58bf40521fcebdbd91dfda17c14b8a703b61edf87cfedfa1010d7718f8a9d1b2cfeb46d901b6c43a7f1bcf4a3e11a03bb69749ccef3f05c492d6a82a924805a1d4d4969e9176450ca5b4f73c459e4562354447ac08fed2db62f3be1414d3ac479b0116275fc8d2f41fe41898d885bb6fb2255eb53984ef493fb976cff4fc6a89bc56f5a83d5ec499b091d9eff11e2a641b786f", 0xb7, 0x7fffffff}], 0x28014c0, &(0x7f0000000680)=ANY=[]) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="31157488368b9c3250acaa6668355259567875f9beffcb1528ff952232e81f97b1074d0b5f64c4b29b9e2ae223a191809c8f7d6e360d1d5e4d9d2eb368a5c827272354ca2a6e78042da52ad1914ae2be71009d7b6c70854545aefdd00aa21149edb6369ee7620c36b4965c598d8a98d08472aa968f1de4c124654f09668f6213089be79ebd22e2907fd5725938ccc54cc48a602d799ea5df234f879a1eda4b0ce4096f89c97191b4c1ed334bd5034778d9a6f50616c865845a0e336b15", 0xbd}, {&(0x7f0000000140)="2f74938725cd031d52021773beee277c992c9abf538208f3b14d751680a057d47d06643a849be33fe71368247ffeadee22db2f29bb3c46848f13e988993deefb04651f7a", 0x44, 0x401}, {&(0x7f00000001c0)="1ca7e530771b4d787674872409f275b707bacd74a6a128d7ce5fa6ec3f69dbae2447691c58bf40521fcebdbd91dfda17c14b8a703b61edf87cfedfa1010d7718f8a9d1b2cfeb46d901b6c43a7f1bcf4a3e11a03bb69749ccef3f05c492d6a82a924805a1d4d4969e9176450ca5b4f73c459e4562354447ac08fed2db62f3be1414d3ac479b0116275fc8d2f41fe41898d885bb6fb2255eb53984ef493fb976cff4fc6a89bc56f5a83d5ec499b091d9eff11e2a641b786f", 0xb7, 0x7fffffff}], 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) [ 2136.460427] UBIFS error (pid: 22854): cannot open "/dev/loop2", error -22 11:23:58 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:23:58 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:58 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:58 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:23:58 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:59 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="31157488368b9c3250acaa6668355259567875f9beffcb1528ff952232e81f97b1074d0b5f64c4b29b9e2ae223a191809c8f7d6e360d1d5e4d9d2eb368a5c827272354ca2a6e78042da52ad1914ae2be71009d7b6c70854545aefdd00aa21149edb6369ee7620c36b4965c598d8a98d08472aa968f1de4c124654f09668f6213089be79ebd22e2907fd5725938ccc54cc48a602d799ea5df234f879a1eda4b0ce4096f89c97191b4c1ed334bd5034778d9a6f50616c865845a0e336b15", 0xbd}, {&(0x7f0000000140)="2f74938725cd031d52021773beee277c992c9abf538208f3b14d751680a057d47d06643a849be33fe71368247ffeadee22db2f29bb3c46848f13e988993deefb04651f7a", 0x44, 0x401}, {&(0x7f00000001c0)="1ca7e530771b4d787674872409f275b707bacd74a6a128d7ce5fa6ec3f69dbae2447691c58bf40521fcebdbd91dfda17c14b8a703b61edf87cfedfa1010d7718f8a9d1b2cfeb46d901b6c43a7f1bcf4a3e11a03bb69749ccef3f05c492d6a82a924805a1d4d4969e9176450ca5b4f73c459e4562354447ac08fed2db62f3be1414d3ac479b0116275fc8d2f41fe41898d885bb6fb2255eb53984ef493fb976cff4fc6a89bc56f5a83d5ec499b091d9eff11e2a641b786f", 0xb7, 0x7fffffff}], 0x28014c0, &(0x7f0000000680)=ANY=[]) 11:23:59 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:59 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:23:59 executing program 4: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:23:59 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:59 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x240080c0}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES64=r1, @ANYRESOCT=r0]) 11:23:59 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) 11:23:59 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:23:59 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) [ 2136.754339] UBIFS error (pid: 22903): cannot open "/dev/loop2", error -22 11:23:59 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x240080c0}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES64=r1, @ANYRESOCT=r0]) 11:23:59 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) [ 2137.567964] UBIFS error (pid: 22993): cannot open "/dev/loop5", error -22 11:23:59 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) 11:23:59 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:23:59 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x240080c0}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES64=r1, @ANYRESOCT=r0]) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x0, 0x240080c0}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r0, @ANYRES64=r1, @ANYRESOCT=r0]) (async) 11:23:59 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) 11:24:00 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:00 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) 11:24:00 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x0, 0x13, 0xffffffffffffffff, 0x0) [ 2137.833954] UBIFS error (pid: 23021): cannot open "/dev/loop5", error -22 [ 2138.092530] UBIFS error (pid: 23049): cannot open "/dev/loop5", error -22 11:24:00 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x210004, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x28a000, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000200), 0x3390c0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(0xffffffffffffffff, 0xc0045004, &(0x7f00000001c0)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000140)=0x202) 11:24:00 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) 11:24:00 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2138.171034] UBIFS error (pid: 23062): cannot open "/dev/loop5", error -22 11:24:00 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x210004, &(0x7f0000000680)=ANY=[]) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x28a000, 0x0) (async, rerun: 64) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000200), 0x3390c0, 0x0) (async, rerun: 64) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$SNDCTL_DSP_GETBLKSIZE(0xffffffffffffffff, 0xc0045004, &(0x7f00000001c0)) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) (async) ioctl$RTC_UIE_OFF(r2, 0x7004) (async) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000140)=0x202) 11:24:00 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) 11:24:00 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2138.462460] UBIFS error (pid: 23088): cannot open "/dev/loop5", error -22 11:24:00 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x210004, &(0x7f0000000680)=ANY=[]) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x28a000, 0x0) (async) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000200), 0x3390c0, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$SNDCTL_DSP_GETBLKSIZE(0xffffffffffffffff, 0xc0045004, &(0x7f00000001c0)) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) ioctl$RTC_UIE_OFF(r2, 0x7004) (async) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000140)=0x202) 11:24:00 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) [ 2138.629054] UBIFS error (pid: 23101): cannot open "/dev/loop5", error -22 11:24:00 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:00 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) mmap$dsp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100001f, 0x10, r0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x850}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f0000000000)) syz_mount_image$ubifs(&(0x7f00000002c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000540)="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", 0x1d7, 0x400000000379a}], 0x1, &(0x7f0000000300)=ANY=[@ANYRES16=r0]) 11:24:00 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2138.772704] UBIFS error (pid: 23120): cannot open "/dev/loop5", error -22 11:24:01 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) 11:24:01 executing program 0: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x0, 0x10, 0xffffffffffffffff, 0x0) 11:24:01 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) mmap$dsp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100001f, 0x10, r0, 0x0) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x850}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f0000000000)) syz_mount_image$ubifs(&(0x7f00000002c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000540)="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", 0x1d7, 0x400000000379a}], 0x1, &(0x7f0000000300)=ANY=[@ANYRES16=r0]) 11:24:01 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:01 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2138.993404] UBIFS error (pid: 23146): cannot open "/dev/loop5", error -22 11:24:01 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) mmap$dsp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100001f, 0x10, r0, 0x0) (async) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x30}, 0x1, 0x0, 0x0, 0x850}, 0x0) (async) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$SNDCTL_DSP_STEREO(r1, 0xc0045003, &(0x7f0000000000)) (async) syz_mount_image$ubifs(&(0x7f00000002c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{&(0x7f0000000540)="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", 0x1d7, 0x400000000379a}], 0x1, &(0x7f0000000300)=ANY=[@ANYRES16=r0]) 11:24:01 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:01 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) [ 2139.217422] UBIFS error (pid: 23166): cannot open "/dev/loop5", error -22 11:24:01 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:01 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000080)=ANY=[]) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001}) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) 11:24:01 executing program 2: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) 11:24:01 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000080)=ANY=[]) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001}) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000080)=ANY=[]) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001}) (async) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) (async) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) (async) 11:24:01 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050", 0xab, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:01 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:01 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000080)=ANY=[]) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001}) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000080)=ANY=[]) (async) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x7fff, 0x0, 0x10001}) (async) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) (async) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) (async) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000480), &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="a15773ba4390f465bc06d1ea830d1c8c84d956c5d017470de4e02c000000000000006e8d1e87b19e36", 0x29, 0x76}, {&(0x7f00000000c0)="3bb1eb5856dccd44f6a933986000a61222abde540cbe894edd10d26731caf83605e0f9ab82b342039dee49493d508bbb3164b995345f9301285335c83d303831f04e9f480c4f24621de3912801180aa931c605028746e2316cba7c24819e8207c6ea9f5a2eafb406360df7dd11ccca68fa7dafe9872af6e0b29f0102cc9f6a44be998a892359b297ed040ea23c6a2234b36e27b536c97b2eb673a1f17dcf2dcc12191b52d41918873ff062f3cb290ff8b961d6f6024662dcb6f53930bfa9d0067e8a6de64b8b24a075e567c05414d5e8d66a4848809531a7ba597fd9037e0905416f325a1b214c66c5c5d399c5", 0xed, 0x9}, {&(0x7f00000001c0)="4f3af1eaee1610d14fe40450e1506e997ce49fe22fe1eef76302eed7a63b4c5ceb4568b838a65103087768dd51492807024eb7a5597e45cbbb9a8c0f5a53d17e509da4dafda9e4cf4c8a24ddaefc5662b6c2018dd3c2c74d5a5a6cb6208546681b3cd22e2eeeb5e40c4d36bf4d9c825621e1ba6c4abad7932253b9804216a7c26c3c9a2b8710af", 0x87, 0x400}, {&(0x7f0000000280)="e03d36eb193e39fe569d2c5857e2ae52a3c52c88fb921f358ee0d995d9b688cbe41bf6117f761b5f99fbe7ff4c81ff4ef13a8524d55148e9384e22e1fc1fe90f801dbb77b988072b03ce701f9accf21368daa007a4b6722fb8a471205ecf723784a92581c51b4d886f5aed9bdf368022d9a203247ccc15cccd5b8af3ac460a8674874e8ab273e4fb3f29aa6a3072f49aecfaeea29332265863ca13ba541e5cbb1b5eaf8ca53c3bc12da9cedc9895da", 0xaf, 0x10001}], 0x28214c8, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="2a28477db1a0b23355e165a1253f1d17cc010f7d4b4747458806aa80dc9f6f16860c20ef004b9505f29ffd84d0ce141944acfb808aa52f783ecdb9c038567acfddc302986e4b872165b1b440aceed97b76fe8287ba23f6aad1ec99", @ANYRES16=r0]) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{r1, r2/1000+60000}, 0x0, 0xf9, 0xb6f}, 0x18) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x300000, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1e) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6", 0xc8, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) syz_mount_image$ubifs(&(0x7f0000000480), &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="a15773ba4390f465bc06d1ea830d1c8c84d956c5d017470de4e02c000000000000006e8d1e87b19e36", 0x29, 0x76}, {&(0x7f00000000c0)="3bb1eb5856dccd44f6a933986000a61222abde540cbe894edd10d26731caf83605e0f9ab82b342039dee49493d508bbb3164b995345f9301285335c83d303831f04e9f480c4f24621de3912801180aa931c605028746e2316cba7c24819e8207c6ea9f5a2eafb406360df7dd11ccca68fa7dafe9872af6e0b29f0102cc9f6a44be998a892359b297ed040ea23c6a2234b36e27b536c97b2eb673a1f17dcf2dcc12191b52d41918873ff062f3cb290ff8b961d6f6024662dcb6f53930bfa9d0067e8a6de64b8b24a075e567c05414d5e8d66a4848809531a7ba597fd9037e0905416f325a1b214c66c5c5d399c5", 0xed, 0x9}, {&(0x7f00000001c0)="4f3af1eaee1610d14fe40450e1506e997ce49fe22fe1eef76302eed7a63b4c5ceb4568b838a65103087768dd51492807024eb7a5597e45cbbb9a8c0f5a53d17e509da4dafda9e4cf4c8a24ddaefc5662b6c2018dd3c2c74d5a5a6cb6208546681b3cd22e2eeeb5e40c4d36bf4d9c825621e1ba6c4abad7932253b9804216a7c26c3c9a2b8710af", 0x87, 0x400}, {&(0x7f0000000280)="e03d36eb193e39fe569d2c5857e2ae52a3c52c88fb921f358ee0d995d9b688cbe41bf6117f761b5f99fbe7ff4c81ff4ef13a8524d55148e9384e22e1fc1fe90f801dbb77b988072b03ce701f9accf21368daa007a4b6722fb8a471205ecf723784a92581c51b4d886f5aed9bdf368022d9a203247ccc15cccd5b8af3ac460a8674874e8ab273e4fb3f29aa6a3072f49aecfaeea29332265863ca13ba541e5cbb1b5eaf8ca53c3bc12da9cedc9895da", 0xaf, 0x10001}], 0x28214c8, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="2a28477db1a0b23355e165a1253f1d17cc010f7d4b4747458806aa80dc9f6f16860c20ef004b9505f29ffd84d0ce141944acfb808aa52f783ecdb9c038567acfddc302986e4b872165b1b440aceed97b76fe8287ba23f6aad1ec99", @ANYRES16=r0]) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{r1, r2/1000+60000}, 0x0, 0xf9, 0xb6f}, 0x18) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x300000, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1e) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f0000000480), &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="a15773ba4390f465bc06d1ea830d1c8c84d956c5d017470de4e02c000000000000006e8d1e87b19e36", 0x29, 0x76}, {&(0x7f00000000c0)="3bb1eb5856dccd44f6a933986000a61222abde540cbe894edd10d26731caf83605e0f9ab82b342039dee49493d508bbb3164b995345f9301285335c83d303831f04e9f480c4f24621de3912801180aa931c605028746e2316cba7c24819e8207c6ea9f5a2eafb406360df7dd11ccca68fa7dafe9872af6e0b29f0102cc9f6a44be998a892359b297ed040ea23c6a2234b36e27b536c97b2eb673a1f17dcf2dcc12191b52d41918873ff062f3cb290ff8b961d6f6024662dcb6f53930bfa9d0067e8a6de64b8b24a075e567c05414d5e8d66a4848809531a7ba597fd9037e0905416f325a1b214c66c5c5d399c5", 0xed, 0x9}, {&(0x7f00000001c0)="4f3af1eaee1610d14fe40450e1506e997ce49fe22fe1eef76302eed7a63b4c5ceb4568b838a65103087768dd51492807024eb7a5597e45cbbb9a8c0f5a53d17e509da4dafda9e4cf4c8a24ddaefc5662b6c2018dd3c2c74d5a5a6cb6208546681b3cd22e2eeeb5e40c4d36bf4d9c825621e1ba6c4abad7932253b9804216a7c26c3c9a2b8710af", 0x87, 0x400}, {&(0x7f0000000280)="e03d36eb193e39fe569d2c5857e2ae52a3c52c88fb921f358ee0d995d9b688cbe41bf6117f761b5f99fbe7ff4c81ff4ef13a8524d55148e9384e22e1fc1fe90f801dbb77b988072b03ce701f9accf21368daa007a4b6722fb8a471205ecf723784a92581c51b4d886f5aed9bdf368022d9a203247ccc15cccd5b8af3ac460a8674874e8ab273e4fb3f29aa6a3072f49aecfaeea29332265863ca13ba541e5cbb1b5eaf8ca53c3bc12da9cedc9895da", 0xaf, 0x10001}], 0x28214c8, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="2a28477db1a0b23355e165a1253f1d17cc010f7d4b4747458806aa80dc9f6f16860c20ef004b9505f29ffd84d0ce141944acfb808aa52f783ecdb9c038567acfddc302986e4b872165b1b440aceed97b76fe8287ba23f6aad1ec99", @ANYRES16=r0]) (async) clock_gettime(0x0, &(0x7f00000003c0)) (async) write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{r1, r2/1000+60000}, 0x0, 0xf9, 0xb6f}, 0x18) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x300000, 0x0) (async) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1e) (async) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:02 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) (async) syz_mount_image$ubifs(&(0x7f0000000480), &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="a15773ba4390f465bc06d1ea830d1c8c84d956c5d017470de4e02c000000000000006e8d1e87b19e36", 0x29, 0x76}, {&(0x7f00000000c0)="3bb1eb5856dccd44f6a933986000a61222abde540cbe894edd10d26731caf83605e0f9ab82b342039dee49493d508bbb3164b995345f9301285335c83d303831f04e9f480c4f24621de3912801180aa931c605028746e2316cba7c24819e8207c6ea9f5a2eafb406360df7dd11ccca68fa7dafe9872af6e0b29f0102cc9f6a44be998a892359b297ed040ea23c6a2234b36e27b536c97b2eb673a1f17dcf2dcc12191b52d41918873ff062f3cb290ff8b961d6f6024662dcb6f53930bfa9d0067e8a6de64b8b24a075e567c05414d5e8d66a4848809531a7ba597fd9037e0905416f325a1b214c66c5c5d399c5", 0xed, 0x9}, {&(0x7f00000001c0)="4f3af1eaee1610d14fe40450e1506e997ce49fe22fe1eef76302eed7a63b4c5ceb4568b838a65103087768dd51492807024eb7a5597e45cbbb9a8c0f5a53d17e509da4dafda9e4cf4c8a24ddaefc5662b6c2018dd3c2c74d5a5a6cb6208546681b3cd22e2eeeb5e40c4d36bf4d9c825621e1ba6c4abad7932253b9804216a7c26c3c9a2b8710af", 0x87, 0x400}, {&(0x7f0000000280)="e03d36eb193e39fe569d2c5857e2ae52a3c52c88fb921f358ee0d995d9b688cbe41bf6117f761b5f99fbe7ff4c81ff4ef13a8524d55148e9384e22e1fc1fe90f801dbb77b988072b03ce701f9accf21368daa007a4b6722fb8a471205ecf723784a92581c51b4d886f5aed9bdf368022d9a203247ccc15cccd5b8af3ac460a8674874e8ab273e4fb3f29aa6a3072f49aecfaeea29332265863ca13ba541e5cbb1b5eaf8ca53c3bc12da9cedc9895da", 0xaf, 0x10001}], 0x28214c8, &(0x7f0000000580)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0, @ANYRESOCT=0x0, @ANYRES16, @ANYRESHEX=r0, @ANYBLOB="2a28477db1a0b23355e165a1253f1d17cc010f7d4b4747458806aa80dc9f6f16860c20ef004b9505f29ffd84d0ce141944acfb808aa52f783ecdb9c038567acfddc302986e4b872165b1b440aceed97b76fe8287ba23f6aad1ec99", @ANYRES16=r0]) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$input_event(0xffffffffffffffff, &(0x7f0000000400)={{r1, r2/1000+60000}, 0x0, 0xf9, 0xb6f}, 0x18) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x300000, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1e) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb2730711", 0xd6, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:02 executing program 5: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="e6351dfb6bafcd3428f665d8175ce2158644e8ef4dfe1edc8b5623f273aac487f903e8963d41d5eb5f51c23292fd0621c02d8689ce2029bac285f282a7442621009bb0353c7543fea6a688bd850d2e8d489663e74b189a62953fcb5df565527f43c8ff7a731ebfd02efc1f6c0ceb2acae76b75f33673ef59d74fa346dcf2f4a822cf2af1c2389ec566b20d94e96f9da289976ae587f0edec64d5b62ce04a9cee9e072860644a6c53d031aff51f4fc5a30a818057358c4c18d8aa7c759c1e4fd8045f89303d99823d80e8b2ec39ca450ccb3dccd81412d5785efef0a704169883b330b85ac2811a8db8591d306ca4bbbbdaef26abc871193064a878", 0xfb, 0x200}, {&(0x7f0000000200)="0ea44ae1f39948281729f9723acaafea55545d3d9740a3", 0x17, 0xfffffffffffeffff}, {&(0x7f0000000240)="47d9b77ff9774eda5c3a37f8acdf00e7a706cdfcb8a3d2f839c446bd33af3ad348b0ead0c11a4f4b9f733fe050feeec8faa0cc4dc4330fd42d7f44bc138c4c990d32617ad45ac688a18431d95581974e5ea5359ef982521a9184589d76b241e0ff0b32387a37", 0x66, 0xe41}, {&(0x7f00000002c0)="ea7a3fcd3793761d66880911d48a4359d9ebc930c7d7a01127db7bc97c1469cfe873fe8d17275ae0b28821cd32c9fe08d53e806dba0f1e9adc3c66a5056f077b85e0c7c6869332c8d93a5c92d75ebcd95fa7da6afefc7578d22ab1c75f2c39e468b092cc8513dd69", 0x68, 0xae9}], 0x40021, &(0x7f00000003c0)={[{@compr_none}, {@auth_key={'auth_key', 0x3d, 'ubifs\x00'}}, {}, {@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}, {@compr_zstd}], [{@permit_directio}, {@euid_lt={'euid<', 0xee01}}]}) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000740)=""/165, &(0x7f0000000800)=0xa5) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x20, &(0x7f00000009c0)={&(0x7f0000000880), 0x0, 0x0, &(0x7f00000008c0)=""/200, 0xc8}}, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xa3b}]}, 0x44}, 0x1, 0x0, 0x0, 0x34000004}, 0x4004800) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xd153}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}]}, 0x4c}}, 0x2004c885) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r5, &(0x7f0000000580)={0x1f, @fixed}, 0x8) connect$bt_sco(r5, &(0x7f0000000840), 0x8) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:02 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75", 0xdd, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0", 0xe1, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 5: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="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", 0xfb, 0x200}, {&(0x7f0000000200)="0ea44ae1f39948281729f9723acaafea55545d3d9740a3", 0x17, 0xfffffffffffeffff}, {&(0x7f0000000240)="47d9b77ff9774eda5c3a37f8acdf00e7a706cdfcb8a3d2f839c446bd33af3ad348b0ead0c11a4f4b9f733fe050feeec8faa0cc4dc4330fd42d7f44bc138c4c990d32617ad45ac688a18431d95581974e5ea5359ef982521a9184589d76b241e0ff0b32387a37", 0x66, 0xe41}, {&(0x7f00000002c0)="ea7a3fcd3793761d66880911d48a4359d9ebc930c7d7a01127db7bc97c1469cfe873fe8d17275ae0b28821cd32c9fe08d53e806dba0f1e9adc3c66a5056f077b85e0c7c6869332c8d93a5c92d75ebcd95fa7da6afefc7578d22ab1c75f2c39e468b092cc8513dd69", 0x68, 0xae9}], 0x40021, &(0x7f00000003c0)={[{@compr_none}, {@auth_key={'auth_key', 0x3d, 'ubifs\x00'}}, {}, {@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}, {@compr_zstd}], [{@permit_directio}, {@euid_lt={'euid<', 0xee01}}]}) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000740)=""/165, &(0x7f0000000800)=0xa5) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x20, &(0x7f00000009c0)={&(0x7f0000000880), 0x0, 0x0, &(0x7f00000008c0)=""/200, 0xc8}}, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xa3b}]}, 0x44}, 0x1, 0x0, 0x0, 0x34000004}, 0x4004800) (async) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x1}, 0x14}}, 0x0) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xd153}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}]}, 0x4c}}, 0x2004c885) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r5, &(0x7f0000000580)={0x1f, @fixed}, 0x8) (async) connect$bt_sco(r5, &(0x7f0000000840), 0x8) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e", 0xe3, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:03 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2139.458173] UBIFS error (pid: 23186): cannot open "/dev/loop5", error -22 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x0, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2142.203100] UBIFS error (pid: 23401): cannot open "/dev/loop1", error -22 11:24:04 executing program 5: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4, 0x4, &(0x7f0000000340)=[{&(0x7f0000000100)="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", 0xfb, 0x200}, {&(0x7f0000000200)="0ea44ae1f39948281729f9723acaafea55545d3d9740a3", 0x17, 0xfffffffffffeffff}, {&(0x7f0000000240)="47d9b77ff9774eda5c3a37f8acdf00e7a706cdfcb8a3d2f839c446bd33af3ad348b0ead0c11a4f4b9f733fe050feeec8faa0cc4dc4330fd42d7f44bc138c4c990d32617ad45ac688a18431d95581974e5ea5359ef982521a9184589d76b241e0ff0b32387a37", 0x66, 0xe41}, {&(0x7f00000002c0)="ea7a3fcd3793761d66880911d48a4359d9ebc930c7d7a01127db7bc97c1469cfe873fe8d17275ae0b28821cd32c9fe08d53e806dba0f1e9adc3c66a5056f077b85e0c7c6869332c8d93a5c92d75ebcd95fa7da6afefc7578d22ab1c75f2c39e468b092cc8513dd69", 0x68, 0xae9}], 0x40021, &(0x7f00000003c0)={[{@compr_none}, {@auth_key={'auth_key', 0x3d, 'ubifs\x00'}}, {}, {@auth_hash_name={'auth_hash_name', 0x3d, 'ghash'}}, {@compr_zstd}], [{@permit_directio}, {@euid_lt={'euid<', 0xee01}}]}) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000480)={&(0x7f0000000380), 0xc, &(0x7f0000000440)={0x0}}, 0x20008051) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000740)=""/165, &(0x7f0000000800)=0xa5) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000600)={'batadv0\x00', 0x0}) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x20, &(0x7f00000009c0)={&(0x7f0000000880), 0x0, 0x0, &(0x7f00000008c0)=""/200, 0xc8}}, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x44, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xa3b}]}, 0x44}, 0x1, 0x0, 0x0, 0x34000004}, 0x4004800) r4 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r4, 0x1}, 0x14}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, r4, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x7}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xd153}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}]}, 0x4c}}, 0x2004c885) (async) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) connect$bt_sco(r5, &(0x7f0000000580)={0x1f, @fixed}, 0x8) connect$bt_sco(r5, &(0x7f0000000840), 0x8) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) [ 2142.301785] UBIFS error (pid: 23406): cannot open "/dev/loop1", error -22 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:04 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xc001) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f00000005c0), 0x2841cc0, &(0x7f0000000680)=ANY=[]) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) syz_open_dev$sg(&(0x7f0000000200), 0x5, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r7 = socket(0x21, 0x800, 0xa7) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fddbdf250300000008000100000000004c00078008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="ae312e176d42e4e9800c053da1fd08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c000200e6050000000000000c000600020000000000000009000a006c32747000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000004) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xc001) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f00000005c0), 0x2841cc0, &(0x7f0000000680)=ANY=[]) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r1) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) (async) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) r4 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) (async) syz_open_dev$sg(&(0x7f0000000200), 0x5, 0x0) (async) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) (async) r7 = socket(0x21, 0x800, 0xa7) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fddbdf250300000008000100000000004c00078008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="ae312e176d42e4e9800c053da1fd08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c000200e6050000000000000c000600020000000000000009000a006c32747000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000004) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: r0 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xc001) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f00000005c0), 0x2841cc0, &(0x7f0000000680)=ANY=[]) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r4 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) syz_open_dev$sg(&(0x7f0000000200), 0x5, 0x0) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) r7 = socket(0x21, 0x800, 0xa7) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fddbdf250300000008000100000000004c00078008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="ae312e176d42e4e9800c053da1fd08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c000200e6050000000000000c000600020000000000000009000a006c32747000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000004) syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0), 0xffffffffffffffff) (async) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @rand_addr=0x64010101}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0xc001) (async) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f00000005c0), 0x2841cc0, &(0x7f0000000680)=ANY=[]) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nbd(&(0x7f0000000040), r1) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r2, 0x40047438, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) socket$l2tp6(0xa, 0x2, 0x73) (async) ioctl$LOOP_SET_FD(r2, 0x4c00, r4) (async) syz_open_dev$sg(&(0x7f0000000200), 0x5, 0x0) (async) ioctl$PPPIOCATTCHAN(r3, 0x40047438, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r5, 0x40047438, 0x0) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)) (async) socket(0x21, 0x800, 0xa7) (async) sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="8c000000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fddbdf250300000008000100000000004c00078008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="ae312e176d42e4e9800c053da1fd08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="0c000200e6050000000000000c000600020000000000000009000a006c32747000000000"], 0x8c}, 0x1, 0x0, 0x0, 0x40800}, 0x4000004) (async) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x210800, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/49, &(0x7f0000000180)=0x31) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000080)) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x9) (async) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x210800, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/49, &(0x7f0000000180)=0x31) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000080)) 11:24:05 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x0, 0x13, r0, 0x0) 11:24:05 executing program 5: syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x9) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x210800, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/49, &(0x7f0000000180)=0x31) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000080)) syz_mount_image$ubifs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x28014c0, &(0x7f0000000680)=ANY=[]) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) (async) ioctl$PPPIOCATTCHAN(r1, 0x40047438, 0x0) (async) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x9) (async) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x210800, 0x0) (async) getsockopt$bt_sco_SCO_CONNINFO(r2, 0x11, 0x2, &(0x7f0000000140)=""/49, &(0x7f0000000180)=0x31) (async) ioctl$PPPIOCATTCHAN(r0, 0x40047438, 0x0) (async) ioctl$mixer_OSS_ALSAEMULVER(r0, 0x80044df9, &(0x7f0000000080)) (async) [ 2142.396808] UBIFS error (pid: 23411): cannot open "/dev/loop1", error -22 [ 2143.675076] Bluetooth: hci4: command 0x0405 tx timeout 11:24:05 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:05 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, r0, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:06 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x0, 0x13, r0, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:06 executing program 5: socket$phonet(0x23, 0x2, 0x1) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:06 executing program 5: syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:06 executing program 5: syz_mount_image$ubifs(0x0, &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0) 11:24:07 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x0, 0x13, r0, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, 0x0) 11:24:07 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {0x0, 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x10, r0, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc470", 0x36, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9e", 0x1, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240), 0x0, 0x7}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:08 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x10, r0, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {0x0, 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991", 0x19, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:09 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x10, r0, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442b", 0xd, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200), 0x0, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8", 0x1}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8", 0x1}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:10 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:24:10 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8", 0x1}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{0x0, 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416", 0x72, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:11 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5", 0x39, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e4", 0x1d, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 1: socket$phonet(0x23, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'ip_vti0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0xaaaaabb, &(0x7f00000002c0)=[{&(0x7f0000000100)="a137ea3b9f0197ea266b69b3b30eb52b21c23860805f97a30ed25af4e445c526bd21262d978e6d9ab0ce76b347298adc46361f8ce4d396d6f5ffeba289e196ffb8efbcd922b45e09a8a5bf70e8652f7ee7fb2b408ac4af674e2e5da5a2bc9bd13ab5bb762f3bcce67ee53f67d221e7077416557a91a39643279724dff03d6984675707e00fa2aa0e0370cb69a4c795795291fd2b2a41cf54c2fcb452a553585915fecd0b37c55407516050f83391ad2fce91bb7d54cfc31393ecb5802d57d195faec907753fd6cf6b5f0fca2dd10298475cdb27307114f5b100386ea75b02892c0610e45", 0xe4, 0xeb}, {&(0x7f0000000200)="b8af00af8f853e02390561442bbd0417c595325ac7023cf991794d1786045ff954448a5590595dee2b6993e8d27a9e10bb70", 0x32, 0x100000001}, {&(0x7f0000000240)="9ef4dcf901c9c7c15b2fb41b5e88f6ab179b930e9de24717c8428f64454e33074c7eefe242449c6a84ed55bb9034acb0b812e16bc4707c9c3903fda06e562f88bab0655c9b7c835a512c03242ac180df706cc90765642358b2039b3793549b83e5b62597f75f9831e204d2", 0x6b, 0x7}], 0x20000, &(0x7f0000000340)={[], [{@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, '[\x16'}}, {@hash}, {@audit}]}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) mmap$KVM_VCPU(&(0x7f0000ffc000/0x3000)=nil, 0x930, 0x3000003, 0x13, 0xffffffffffffffff, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a1", 0x1, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:12 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100), 0x0, 0xeb}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:13 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a1", 0x1}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x20000, 0x0) 11:24:13 executing program 5: syz_mount_image$ubifs(0x0, 0x0, 0x0, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="a1", 0x1}, {&(0x7f0000000200)="b8", 0x1, 0x100000001}, {&(0x7f0000000240)="9e", 0x1}], 0x0, 0x0) [ 2161.434718] ieee802154 phy0 wpan0: encryption failed: -22 [ 2161.440314] ieee802154 phy1 wpan1: encryption failed: -22 [ 2181.913065] ================================================================== [ 2181.920474] BUG: KASAN: use-after-free in __lock_acquire+0x2cb4/0x3ff0 [ 2181.927124] Read of size 8 at addr ffff8880a9458620 by task kworker/1:1/8604 [ 2181.934292] [ 2181.935914] CPU: 1 PID: 8604 Comm: kworker/1:1 Not tainted 4.19.211-syzkaller #0 [ 2181.943425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2181.952772] Workqueue: events sco_sock_timeout [ 2181.957338] Call Trace: [ 2181.959915] dump_stack+0x1fc/0x2ef [ 2181.963532] print_address_description.cold+0x54/0x219 [ 2181.968803] kasan_report_error.cold+0x8a/0x1b9 [ 2181.973483] ? __lock_acquire+0x2cb4/0x3ff0 [ 2181.977815] __asan_report_load8_noabort+0x88/0x90 [ 2181.982732] ? __lock_acquire+0x2cb4/0x3ff0 [ 2181.987034] __lock_acquire+0x2cb4/0x3ff0 [ 2181.991195] ? mark_held_locks+0xf0/0xf0 [ 2181.995256] ? mark_held_locks+0xf0/0xf0 [ 2181.999304] ? lock_acquire+0x170/0x3c0 [ 2182.003281] ? trace_hardirqs_off+0x64/0x200 [ 2182.007707] ? sco_sock_timeout+0x5d/0x1b0 [ 2182.011929] lock_acquire+0x170/0x3c0 [ 2182.015717] ? sco_sock_timeout+0x7b/0x1b0 [ 2182.019950] _raw_spin_lock+0x2a/0x40 [ 2182.023731] ? sco_sock_timeout+0x7b/0x1b0 [ 2182.027947] sco_sock_timeout+0x7b/0x1b0 [ 2182.032087] process_one_work+0x864/0x1570 [ 2182.036315] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2182.040964] worker_thread+0x64c/0x1130 [ 2182.045022] ? __kthread_parkme+0x133/0x1e0 [ 2182.049321] ? process_one_work+0x1570/0x1570 [ 2182.053810] kthread+0x33f/0x460 [ 2182.057164] ? kthread_park+0x180/0x180 [ 2182.061135] ret_from_fork+0x24/0x30 [ 2182.064827] [ 2182.066432] Allocated by task 23358: [ 2182.070246] __kmalloc+0x15a/0x3c0 [ 2182.073780] sk_prot_alloc+0x1e2/0x2d0 [ 2182.077661] sk_alloc+0x36/0xec0 [ 2182.081010] sco_sock_alloc.constprop.0+0x31/0x200 [ 2182.085920] sco_sock_create+0xd5/0x180 [ 2182.089877] bt_sock_create+0x154/0x2a0 [ 2182.093846] __sock_create+0x3d8/0x740 [ 2182.097718] __sys_socket+0xef/0x200 [ 2182.101409] __x64_sys_socket+0x6f/0xb0 [ 2182.105362] do_syscall_64+0xf9/0x620 [ 2182.109141] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.114309] [ 2182.115929] Freed by task 23359: [ 2182.119291] kfree+0xcc/0x210 [ 2182.122375] __sk_destruct+0x684/0x8a0 [ 2182.126244] __sk_free+0x165/0x3b0 [ 2182.129770] sk_free+0x3b/0x50 [ 2182.132946] sco_sock_kill.part.0+0xaa/0xc0 [ 2182.137259] sco_sock_release+0x1a2/0x330 [ 2182.141386] __sock_release+0xcd/0x2a0 [ 2182.145340] sock_close+0x15/0x20 [ 2182.148771] __fput+0x2ce/0x890 [ 2182.152040] task_work_run+0x148/0x1c0 [ 2182.155913] get_signal+0x1b64/0x1f70 [ 2182.159692] do_signal+0x8f/0x1670 [ 2182.163211] exit_to_usermode_loop+0x204/0x2a0 [ 2182.167770] do_syscall_64+0x538/0x620 [ 2182.171650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.176820] [ 2182.178431] The buggy address belongs to the object at ffff8880a9458580 [ 2182.178431] which belongs to the cache kmalloc-2048 of size 2048 [ 2182.191249] The buggy address is located 160 bytes inside of [ 2182.191249] 2048-byte region [ffff8880a9458580, ffff8880a9458d80) [ 2182.203206] The buggy address belongs to the page: [ 2182.208121] page:ffffea0002a51600 count:1 mapcount:0 mapping:ffff88813bff0c40 index:0x0 compound_mapcount: 0 [ 2182.218071] flags: 0xfff00000008100(slab|head) [ 2182.222739] raw: 00fff00000008100 ffffea0002ce1a88 ffffea000240d208 ffff88813bff0c40 [ 2182.230697] raw: 0000000000000000 ffff8880a9458580 0000000100000003 0000000000000000 [ 2182.238564] page dumped because: kasan: bad access detected [ 2182.244270] [ 2182.245880] Memory state around the buggy address: [ 2182.250793] ffff8880a9458500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 2182.258158] ffff8880a9458580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2182.265497] >ffff8880a9458600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2182.272837] ^ [ 2182.277237] ffff8880a9458680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2182.284586] ffff8880a9458700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2182.292104] ================================================================== [ 2182.299465] Disabling lock debugging due to kernel taint [ 2182.304893] Kernel panic - not syncing: panic_on_warn set ... [ 2182.304893] [ 2182.312245] CPU: 1 PID: 8604 Comm: kworker/1:1 Tainted: G B 4.19.211-syzkaller #0 [ 2182.321153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.331109] Workqueue: events sco_sock_timeout [ 2182.335701] Call Trace: [ 2182.338622] dump_stack+0x1fc/0x2ef [ 2182.342241] panic+0x26a/0x50e [ 2182.345920] ? __warn_printk+0xf3/0xf3 [ 2182.349800] ? lock_downgrade+0x720/0x720 [ 2182.353938] ? print_shadow_for_address+0xb8/0x114 [ 2182.359049] ? trace_hardirqs_off+0x64/0x200 [ 2182.363462] kasan_end_report+0x43/0x49 [ 2182.367427] kasan_report_error.cold+0xa7/0x1b9 [ 2182.372092] ? __lock_acquire+0x2cb4/0x3ff0 [ 2182.376409] __asan_report_load8_noabort+0x88/0x90 [ 2182.381341] ? __lock_acquire+0x2cb4/0x3ff0 [ 2182.385658] __lock_acquire+0x2cb4/0x3ff0 [ 2182.389808] ? mark_held_locks+0xf0/0xf0 [ 2182.393872] ? mark_held_locks+0xf0/0xf0 [ 2182.397917] ? lock_acquire+0x170/0x3c0 [ 2182.401881] ? trace_hardirqs_off+0x64/0x200 [ 2182.406282] ? sco_sock_timeout+0x5d/0x1b0 [ 2182.410504] lock_acquire+0x170/0x3c0 [ 2182.414291] ? sco_sock_timeout+0x7b/0x1b0 [ 2182.418509] _raw_spin_lock+0x2a/0x40 [ 2182.422378] ? sco_sock_timeout+0x7b/0x1b0 [ 2182.426594] sco_sock_timeout+0x7b/0x1b0 [ 2182.430658] process_one_work+0x864/0x1570 [ 2182.434884] ? pwq_dec_nr_in_flight+0x2d0/0x2d0 [ 2182.439535] worker_thread+0x64c/0x1130 [ 2182.443490] ? __kthread_parkme+0x133/0x1e0 [ 2182.447793] ? process_one_work+0x1570/0x1570 [ 2182.452271] kthread+0x33f/0x460 [ 2182.455644] ? kthread_park+0x180/0x180 [ 2182.459706] ret_from_fork+0x24/0x30 [ 2182.463692] Kernel Offset: disabled [ 2182.467311] Rebooting in 86400 seconds..