bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:40:57 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bind$rds(r2, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c000000000701010000000000000000000a0900010073797a31000000000c0002400000000000f9f94008000540000000010c00024000000000000010000c0002400000000000000008"], 0x4c}}, 0x20004000) 08:40:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc0", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:57 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:40:57 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x0) 08:40:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:58 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x0) 08:40:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:40:58 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:40:58 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1005.811511][T31325] ptrace attach of "/root/syz-executor.4"[31324] was attempted by "/root/syz-executor.4"[31325] [ 1005.942039][T31331] ptrace attach of "/root/syz-executor.4"[31330] was attempted by "/root/syz-executor.4"[31331] 08:41:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc0", 0xe1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:00 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:00 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:00 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:00 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)={0x121c, 0x15, 0x10, 0x70bd28, 0x25dfdbfc, {0x11, 0xc4}, [@INET_DIAG_REQ_BYTECODE={0x80, 0x1, "3adaba379e05d7d3755ea89e90b9665e49035080e417f346c02ec061a949d8a006f9b690aa99531e80f095c3fb11cf7d408bc108004d8ed209c55212044f6f8537d8cff90db2f12a31403d2a33f8eee623aa0dbe704787e652696a1911470b4037d8d89ef5fe3a0c024c597035e6a4e690da218ff08a1aca0856bbe9"}, @INET_DIAG_REQ_BYTECODE={0x8a, 0x1, "90aa35f249a3a65c248498f0493b13bf168120e34cf12fccbf2f254286143e78b353bc8ee2ee3cbab23f64062a0285fecd01a4325ad9eb7dcc07291cbfd5d543475f76a99fb77e1f6523c82c27c65178b8aafdabaec5fa3fb0bf0db4bc8db3b9e2d67c6127c643da7accfa3c1daa955dd256f913230a39403a9889f5783764eaa530f163223d"}, @INET_DIAG_REQ_BYTECODE={0xf5, 0x1, "39a599cede8452b5f5ab63dead71712caf71c15588e4e6498e34a65819b1262acccf359dcc041889b96f6aa481c0f309a199658dfbaf52cb15fb0fd0680edda5bf5f26f9f1d923cc198a474a9e5e34fd552aae94e180cf0858eea1efcafe09aaca3136c43fce01ccc5e772bf9f561efc2f5302b2bc62a19314d7a41227face48a38ae0133550467b5177367aeac45915d708939b45aeb4fa466b8bc97552f83895f527aef1d8e728dd9348d5b69742d02210b8fd712ba60d53c1a95dda510dd1d5442c24d4a4b4a113a38f6daa4afad3de5a38b792410bcad5e64a18bbf6308203fe69f718f4ef436b1c515094012b0a24"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x121c}}, 0x40000) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000440)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="100027a19014ce7f9ebd7000fbdbdf250300000008000500ac1414aa08000400ac1e000108000400ffffffff14000200fc010600000000000000000000000001050001000000000014000300fc020000000000000000000000000000050001000000000028f6e8e3f54b1261400be9755feefb1f23c288df40579e490225e824a712b5ccd3312ebacec4a320f3c13ed20ded41b439ea85d76bf41d8bcecc6dab208d44fb1d27ccefc871c058db47eeac6111786c987cab"], 0x64}, 0x1, 0x0, 0x0, 0x4808}, 0x4000000) sendmsg$NLBL_UNLABEL_C_ACCEPT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r4, @ANYBLOB="000125bd7000000000000000000008000400ac1414bb14000300fe8000000000000000000000000000aa14000200fc02000000000000000000000000000114000600626f6e645f736c6176655f300000000014000300fe80008cb1b3d4f67f2d94000000003314000300fc01000000000000000000000000000014000200fc0200000000000000000000000000012800070073797374656d5f753a6f626a6563745f723a706f7765725f6465766963655f743a7330001400030000000000000000000000ffffe0000001"], 0xd0}, 0x1, 0x0, 0x0, 0x8800}, 0x4040000) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc3, &(0x7f0000000100)={&(0x7f0000000280)={0x24, r4, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}, @NLBL_UNLABEL_A_IPV6ADDR={0x0, 0x2, @dev={0xfe, 0x80, [], 0xa}}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x8040) sendmsg$NLBL_UNLABEL_C_STATICADD(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r4, 0x800, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000091}, 0x80) sendmsg$NLBL_UNLABEL_C_LIST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000001700)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="080026bd7000fddbdf2502000000050001000100000014000600766972745f7769666930000000000000a3d75be3711de481905a813e464562ea77960a4c0d08c39de15ae8d33980b5179a98719a4d7ea84948bd5ce5dca13a4ea251e68df5a97f6f7aad858f7ef5f616d0e0c808a0ef99132017e641873b50518e0bfeb30f4a92244491310dc58ee8ae969807f21950637eee9ecba07ed4530da85f597d88b12ec3e0"], 0x30}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000001) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x4c, r4, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @empty}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x27}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x90}, 0x800) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r2, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r4, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ipvlan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8010}, 0x0) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1008.105097][T31353] ptrace attach of "/root/syz-executor.4"[31352] was attempted by "/root/syz-executor.4"[31353] 08:41:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0xca, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:01 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00') sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:01 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000000080), 0x0, 0x0) 08:41:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:03 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:03 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400000, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0xca8bd64d8cc61ab0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x6, 0x2, 0x4, 0x800, 0x20, {r1, r2/1000+60000}, {0x5, 0x2, 0x12, 0x6, 0x8, 0x7, "221c0597"}, 0x7, 0x2, @offset=0x8000, 0x3, 0x0, r3}) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r4, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r4, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) openat$cgroup_procs(r5, &(0x7f0000000380)='tasks\x00', 0x2, 0x0) 08:41:03 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, &(0x7f00000000c0)={0x6, 0xd9d2, 0x8000, 0x8, 0x1a, 0x4}) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000010010000010000002f000484bdca0000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:04 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000010012000010000002f000000005f2957731003eaa8576aa010bae153c778f3c8f092fc40bc41bda0524cb935675f590e02d5561c74e7793d963863bc8377bcaac36d79939fa6436444817dc8dba951c490b3db24b6e8bfb427b710e7832719f438b250743eb53d83168d884a549923e6b756beb42e17f6ea19bccab9bed85684ea54030a5cd5e1f87b551ec5265e18a49393a1b2f970544d8a40705a4737c9f821319aac0f71afea408c"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x2f, 0xff, 0x3, 0x8, 0x1f, @dev={0xfe, 0x80, [], 0x19}, @local, 0x7d, 0x700, 0x0, 0x5}}) sendmsg$nl_route(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=@ipv6_newaddrlabel={0x90, 0x48, 0x111, 0x70bd2a, 0x25dfdbff, {0xa, 0x0, 0x78, 0x0, r2, 0x100}, [@IFAL_LABEL={0x8, 0x2, 0x3}, @IFAL_LABEL={0x8, 0x2, 0xb}, @IFAL_ADDRESS={0x14, 0x1, @private2={0xfc, 0x2, [], 0x1}}, @IFAL_ADDRESS={0x14, 0x1, @mcast1}, @IFAL_ADDRESS={0x14, 0x1, @local}, @IFAL_ADDRESS={0x14, 0x1, @mcast2}, @IFAL_ADDRESS={0x14, 0x1, @ipv4={[], [], @multicast1}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4004001}, 0x40000) 08:41:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:04 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x111001, 0x0) connect$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0xfffe, 0x2, 0x10, {0x2, 0x4e20, @private=0xa010102}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000010d5249b6c899a88b500000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:06 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000180)={r3, &(0x7f00000000c0)=""/73}) 08:41:06 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d3740000000000", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:06 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket(0x1d, 0x800, 0x80000001) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x101, 0x2, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) 08:41:06 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = accept4$packet(r1, 0x0, &(0x7f0000000180), 0x80000) getsockname$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast1}}, 0x24) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1803000900000000200000000000b65e0000000000000000449ff7b7a65deb964625b8a5a248a51afb42ace53970d97ae45dff543498907043"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e22, @broadcast}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:07 executing program 1: r0 = socket(0x21, 0x800, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x1, 0x0, @ioapic={0xe004, 0x4, 0x400, 0x0, 0x0, [{0x1, 0x0, 0x1, [], 0x20}, {0xe3, 0x3, 0x50, [], 0x28}, {0x3f, 0x4, 0x1, [], 0x6}, {0x3f, 0xcc, 0x42, [], 0x56}, {0x5e, 0x1f, 0xff, [], 0x7f}, {0x6, 0xf7, 0x80}, {0x4, 0x1, 0xa6, [], 0x8}, {0x6, 0x2, 0x4, [], 0x6}, {0xa4, 0x80, 0x0, [], 0x1}, {0x1, 0x7f, 0x2f, [], 0x20}, {0x3, 0x19, 0x4, [], 0x9}, {0xc4, 0x3, 0x81, [], 0x9}, {0x0, 0x7, 0x3, [], 0x1f}, {0x0, 0x6, 0x41, [], 0x8}, {0x3, 0xb4, 0x7, [], 0x7f}, {0x94, 0x5, 0x0, [], 0x7}, {0x1f, 0x8}, {0x3, 0x1, 0x81, [], 0x7}, {0x20, 0x7, 0x7f, [], 0x40}, {0x7f, 0x2, 0x1, [], 0x5}, {0x8, 0x6, 0x1, [], 0xbb}, {0x81, 0x4, 0x20, [], 0x1f}, {0x3, 0x7}, {0x3, 0x12, 0x0, [], 0x1}]}}) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bind$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, @fixed={[], 0x12}}, 0xa) 08:41:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000010010000010000002100001000000000a70585bfcd1b657bcac47aa91fee0c76825edf7cf1a3ea9a14cab59cc3c704c6"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:07 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000080)=0xfffffff7, 0x4) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg$unix(r2, &(0x7f00000000c0), 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) [ 1016.958379][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 08:41:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:09 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}, @NL80211_ATTR_MESH_CONFIG={0x14, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_RSSI_THRESHOLD={0x8, 0x14, 0xffffffffffffff0c}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x2}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40020}, 0x4090) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:09 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:09 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0, 0x3f00000000000000}}], 0x2, 0x0) 08:41:09 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) r1 = dup(0xffffffffffffffff) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:09 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) recvmmsg(r1, &(0x7f0000003d80)=[{{&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1}, 0x7fffffff}, {{&(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @initdev}}}}, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000240)=""/219, 0xdb}, {&(0x7f0000000340)=""/245, 0xf5}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/15, 0xf}], 0x4, &(0x7f0000002500)=""/199, 0xc7}}, {{&(0x7f0000002600)=@ethernet, 0x80, &(0x7f00000036c0)=[{&(0x7f0000002680)=""/41, 0x29}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x2, &(0x7f0000003700)=""/162, 0xa2}}, {{&(0x7f00000037c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000003b00)=[{&(0x7f0000003840)=""/201, 0xc9}, {&(0x7f0000003940)=""/12, 0xc}, {&(0x7f0000003980)=""/7, 0x7}, {&(0x7f00000039c0)=""/228, 0xe4}, {&(0x7f0000003ac0)=""/35, 0x23}], 0x5, &(0x7f0000003c40)=""/93, 0x5d}, 0x9}, {{&(0x7f0000003cc0)=@un=@abs, 0x80, &(0x7f0000003d40)=[{&(0x7f0000003b80)=""/41, 0x29}], 0x1}, 0x4000}], 0x5, 0x40000000, &(0x7f0000003ec0)={0x77359400}) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r2, 0xc01c64ad, &(0x7f0000000080)={0x0, 0x2, 0x5, 0x0, 0x4, 0x8, 0x3ff}) 08:41:10 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_PROTO_DOWN={0x5, 0x27, 0x1}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022cbd7000fddbdf250800000008000300", @ANYRES32=r4, @ANYBLOB="0c00990000080000010000001400040076657468305f6d61637674617000000008000500010000007c8d95b7325b72a9b3bff3f1b30be4e880495f688a628618e5e9ab4d4e1e0317aec5e54c74dc5a3b4c8a938f992fd03dd856bf75520dd83699cfa275a09d396f"], 0x44}, 0x1, 0x0, 0x0, 0x20000080}, 0x80d0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:10 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000180)={'broute\x00'}, &(0x7f0000000100)=0x78) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e23}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000001000000001000000a6bf7fc8781ef92f5a1ef74c0ba5adc964ab3cc163d81eb970f344caa283148292ceb3b8ef393fe0060afc3c69e417ed8d"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:10 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:10 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000800000000010010000010000002f0000eaffffff00"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:12 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000100100003fc0254f3e2815ba03f10df81d011236435b1f127f9115eb08102da8c3bd8faee30000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f00000000c0)=0x1) msgget(0x0, 0x20) 08:41:12 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f1", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:12 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) r1 = dup(0xffffffffffffffff) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r0, 0xc080661a, &(0x7f0000000080)={{0x2, 0x0, @identifier="c51cf454f07286e4c66294adc9a875d5"}}) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x4b6, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000100)={0x1, 0x1, 0xa00, 0x9, r1}) r2 = socket(0x1a, 0x0, 0x7cb1) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r2, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) connect$netrom(r3, &(0x7f0000000180)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1}, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) 08:41:13 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x68, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x54, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x200}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xc2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @private2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) 08:41:13 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffe}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18001f376ef7ffff77cfd48d26d5a43100000000002f00"/37], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast1, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'rose0\x00', r2}) 08:41:13 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e21, 0x2, @remote, 0x1}}, 0x24) 08:41:13 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:13 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @local, 'veth0_to_bond\x00'}}, 0x1e) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @local}}, 0x80, 0x0}}], 0x2, 0xc000) 08:41:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:14 executing program 1: r0 = socket(0x1f, 0x2, 0x9) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0xffff, @rand_addr=0x100000}}, 0xffffffffffffff20) clone(0x11df580, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='projid_map\x00') r2 = getpid() tkill(r2, 0x38) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000080)={'veth1_to_hsr\x00', {0x2, 0x4e20, @private=0xa010100}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x258) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2104}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x80, 0x2, 0x7, 0x5, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_FILTER={0x34, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x8}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xc610}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x63a}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x4}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x10000}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x7}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x72}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xfffffffffffff558}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xc6f}]}, 0x80}, 0x1, 0x0, 0x0, 0xa040}, 0x40044) write$binfmt_elf64(r1, 0x0, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$netlink(r6, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg(r6, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000019010000010800"/24], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rc={0x1f, @any, 0x46}, 0x80, 0x0}}], 0x2, 0x4000000) 08:41:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f1", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:15 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:15 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$VIDIOC_G_FREQUENCY(r1, 0xc02c5638, &(0x7f0000000080)={0x6, 0x5, 0x2}) 08:41:15 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0, 0x4000000000000}}], 0x2, 0x0) 08:41:15 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:41:16 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, r2, 0x0, 0xaf}}}, 0x78) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'vcan0\x00', 0x5800}) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r1], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x20044001) 08:41:16 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:16 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x114, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$netlink(r6, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r7 = dup(0xffffffffffffffff) getsockopt$netlink(r7, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r8 = dup(0xffffffffffffffff) getsockopt$netlink(r8, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$FUSE_BMAP(r8, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x8, {0x6}}, 0x18) 08:41:16 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r0, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:17 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000000000), 0x0, 0x4000815) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/icmp\x00') r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockname$ax25(r2, &(0x7f0000000180)={{0x3, @default}, [@default, @default, @null, @null, @netrom, @netrom, @default, @netrom]}, &(0x7f0000000040)=0x8b) socket$netlink(0x10, 0x3, 0xf) 08:41:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f1", 0xf9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:18 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r0, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:18 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) 08:41:18 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:41:19 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e20, @broadcast}}, 0x24) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e20, @loopback}}, 0x0, 0x0, 0x26, 0x0, "9a7643c8585a8c98303e99df02f27fc235e44307fe56a22cbc92dfa23441c995399746f0f1b796449512bb949c1b5d01b78529a7d6484916ddb7e1e04ba58b16f5530f45101fc1c87b244f85422f4256"}, 0xd8) recvfrom$rxrpc(r0, &(0x7f00000004c0)=""/4096, 0x1000, 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2d6879965854180000200000000030010000010100002f00000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:19 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f00000000c0)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0xfffffff7, @mcast1, 0x2}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e23, @rand_addr=0x64010102}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000100)={0x2, 0xcb}, 0x2) mkdir(&(0x7f0000000080)='./file0\x00', 0x4) 08:41:19 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r0, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:19 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x50) fsmount(r1, 0x1, 0xf) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:19 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:19 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r6, r5, 0x0) keyctl$search(0xa, r3, &(0x7f0000000080)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, r6) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) dup(0xffffffffffffffff) 08:41:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:22 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:22 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwritev2(r1, &(0x7f00000000c0)=[{&(0x7f0000000080)="009ff16fc4276a9055ed1ec6319befaf23f72136954c88ce517c03cc3b82dedea3d31fc1ad693fa6a88daaf5121a03af2ce950d6fc1279cecb81b2", 0x3b}, {&(0x7f00000004c0)="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", 0x1000}], 0x2, 0x3, 0x8, 0x10) r2 = socket$inet(0x2, 0x6, 0x3283) sendmmsg(r2, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYRES32], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e24, @broadcast}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:22 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x700, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:22 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:22 executing program 1: r0 = dup(0xffffffffffffffff) mmap$usbfs(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xa, 0x110, r0, 0x2) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x7, 0x0, 0x3}, [@NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4040800) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000080)) r2 = socket(0x2000000000000021, 0x2, 0x10000000000002) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) connect$rxrpc(r2, &(0x7f0000000140)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x100, @dev={0xfe, 0x80, [], 0x17}, 0xff}}, 0x24) sendmmsg(r2, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000ffffffff000000000020002f00000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x5, 0x2, 0x10, {0x2, 0x4e23, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:22 executing program 1: r0 = dup(0xffffffffffffffff) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f0000000200)=""/18, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000000380)={'filter\x00', 0x0, 0x80014, 0x2, [], 0x0, &(0x7f0000000080), &(0x7f00000000c0)=""/2}, &(0x7f0000000100)=0x78) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="1c000000030001030000000000000000070000090800034000000005"], 0x1c}, 0x1, 0x0, 0x0, 0x40005}, 0x40) connect$rxrpc(r3, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r3, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000000000000fbdd2ecd26420015aa2f64c7dc3d9b000000000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:22 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:22 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000080)=0x2, 0x4) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000c00000010010000010000002f00000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:22 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}}, 0x24) syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x220840) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x200, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000200)=""/118) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="18008f4510bdaf008e554fa3734723a57a00f7000000002f00567b80a7e764664261d3a47fac1f66b400000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0x2) connect(r2, &(0x7f0000000180)=@phonet={0x23, 0x7f, 0x7, 0x40}, 0x80) 08:41:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:25 executing program 2: chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:25 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:25 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:25 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0), 0x0, 0x0) 08:41:25 executing program 2: chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:25 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x1819c0, 0x4, 0x20}, 0x18) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) linkat(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00', 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0), 0x0, 0x88010) 08:41:25 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x90400, 0x0) bind$rose(r1, &(0x7f0000000240)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x5, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x40) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r2, 0x0, 0x480, &(0x7f0000000280), &(0x7f00000002c0)=0x40) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_KEY(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x40, r4, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_SEQ={0x14, 0xa, "4c1e127159a495a74dabb2488ee16b49"}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x24048850) 08:41:25 executing program 2: chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfd}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:28 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x3, 0x8, 0x401, 0x0, 0x0, {0x7, 0x0, 0x1}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8001}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x40}, 0x1, 0x0, 0x0, 0x2401c0d0}, 0x40000) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000840), r5, 0x1}}, 0x18) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x378, r3, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x19a0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2138}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x49}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x148, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4e, 0x3, "58d2a6e432944adb7918f03251300335ce992747eb1da850fb1407c414005b6eeb5a1a3e2a242e004429bb9060ef51ac64b4e137ae0817e0b94203cf71bd4834d582cbc46eb2aa568e06"}, @TIPC_NLA_NODE_ID={0x5e, 0x3, "bed72e872eeb5255edd096f07bc0e0a086a51110772b049a07183f181a43938eb38cbcfa1448b129cc0fc91b259890d6b0f9845d920f53c320171c496819134a969e1988bb533291a2e0f8afcb01f49b02b75eef1be6431bc37e"}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "3359117b88dd0da6790ac7545b051389076f27e2fded25b40c80"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "e2e26297215f79130a6e42bb4e8505053f33d315ab4999a47b7449"}}]}, @TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x82}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff81}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffe}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x64}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x311ee56c}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb12}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x18000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x378}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 08:41:28 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:28 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) 08:41:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000", 0x80}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:28 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000410010000010000002f00000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:28 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:28 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="ae05ea25654d95280cdcca5ff508ee3ed18a64341da7bf34965467544e46ca6b709f8f94586b857fe2f93883f15839b4896b3ffe6af88cb854c0b3b4aef16c25f4141011d758984611af5766651ccf04d2fe85dabaccd593c196e4c43edd1a71e95745f5834daba61adb20ccfc11042c5db9bcbd39010705c05fbdda8bce59a3c942522c9c863295fcd559750c5d1b8658085962e71e3bdd78ae7fc585653997865c522a5ab2378464df8ae9a31f473b28717c4bcddd7e44eff3f951344a779948278f62f077b9b9c1128977da4811f6bc31eaf52daf551b3e920b13b965", 0xde}, {&(0x7f0000000280)="d96add7d7312031349dea9e17a10e54a8e8492aabaff1d5b611e95e5724c2cedefc221565bf1c4866b3bea0ed735d84a7f5451fd5315e12929a8e723e123dcac1dee18467570c9fb9aa20dfeb6f516c5a15786cec1eb8abdbf91d7f55817dd8600dded383660b5a2665b6e20c19b7cdeacc5b1f691ad9d459f5d5d00ad95be0b11ff91b85d062e88c6772e61c00f23a91d20164097a383d390417c081f489172a813af6e46f671d4d83746f24d72e5cc4a11e57a6af3b0428b683c027b7d64922b84b3fe858b689973f9864578c7db0de1f61bc1d64274b364267067c124545ad8128ddde90c8cf3de3ac10ac8eb37cd", 0xf0}], 0x2, &(0x7f0000000380)=[{0xf8, 0x109, 0x8001, "a46c02d5c7edde740db8a6f0b60b96a5cd8fa00b026ad3be8d00eb8560afb980fec502689f2b818ebd6223c3f82d04edb8a994bf0fd780ac85d97dc3a818ba8260bc5983bfc51dd08fcdc6767f736a3bed7bdc3429d8168a2e6ff11f5bd2761fc7175e6fa73cda0ba7b09c2ed92217294db7d5b9e2eb7002922d69d72e32a04981c9d12bfe8cbaba7a10fe5266eeec674970461c3978919d83f01ac6742b2b80c239b27881c517867c0c1432d542d4d1fdb2a77da7fbfe4b31888ce5385f7267fadc5be83e13b1045f9af1cd58d27f506217053e7fd3184cfe7d3738635fe9b13252d779686d7c"}, {0xa8, 0x101, 0x101, "4c8fe5efccebb0b8c690636cb57a1ffc2ae9b1a2cdb5bd2fce07f55347f0fecee9f303ca57238c7e2c56efa21c0220bafabd3aef379e17e98ea5a7ebe2f27b10d0461d707082b6b4580d6fc74d15470c8536c99041bf0f50570cb90e76b34ab2863215e05c629ae180db99b55b14585959a73cdc2ad40d19d2996bb8c1ae4ba90929a75a366dc54682a1254e041910d92c14d4aff6"}, {0xf8, 0x1f, 0x7, "e322f7213389cb988538888c91a9418d3725fd197d6a41f0211abf813a6d4fd4450ee30a8aec1f5ad1da9fdfb408b1a1b18cf6ada7d3db5013c08e527aebb1f6a4bdf7f27bed918b6161a9bd9c8602a11376ab98f8738293ce536817110bf04fed90503842cafd612a21c604928557c3a523f6aa13034938ff8b057795dc61e5581dfa3149855ae57375b1cc6e7f6b63cb1c12c3a41dcbaffef83b7cd0ffaea29bc488514fc9fb45ba0408eeb952aa634fbd77be21f9a7941da2aa8b9207a9f4fb80b82b24fba1b3e3b61f79731189ee15088b978b723f82ebb4635bc47bfb6a2abf92"}, {0x48, 0x10e, 0x5, "f9ffffff35179990893fafa501af1e78bf07db8ad83507b17a9548c4b8000000000200a12eb243474f78b97982ce000000"}, {0x28, 0x0, 0x1f, "79f785e23dbd2ca2166d11a79482cb240a44ce1a"}, {0xa0, 0x101, 0x0, "de34a52b06a3105de06754dafba87ee2352d2385912d3c1fc424f345cc81cceadd28916d5c02c2257a169cfb13d29e6d0091d0884c31082e09856a43155b73438b46e1c17f4aeb5204c9d5bcfd78b331a087cb69e0025475238dcefe02d572a4e94d5cfe77cce70bbc3e4c095c505097d3a91f9614078308228dae21b31acd933c35d45eb22a4ec020774391"}, {0xf8, 0x10e, 0x10000, "872e8f41a2a5af2195b3b29982144d37216d34de329681fa66a51bb8cd4de996ae77f2274fbb3306b193d63f4420419f7a9fdf99b559a88cef75f94697922a74104afad9116dba14ef42d2087d17fbdec4a4b53754b189b30e174ae6bdcb64dee27ba72f7dead3a8567a1a7713e6931288eb32e63434b46aa04b18894efec444e7ac00d9138334108c77bb5bab8f47ba890514145f8b0206572dfdd77c400c4d129a706ed5b3b25376b132821543dfaf02e5d67d03a3adee2e3c3d857f773c66409554371ea63650b7a229dee08c9b4de8a6209d516bed83afda9d4a8ec70529d6"}, {0xc8, 0x102, 0x4b26, "970b6bc5adacb99162709e1a2d7cac5c97457b5db606637e0e92e8a234c98d57d9ff53de8d3ade227f2144564e5e0a659d011db3efe33a853b4c11096a75450b0a90560b10caf946c60d5b88d2bffd4b669b1c53c24fd5d31c9d79630e4f222ab6e64fcde68e74c87e8feaacfdc70f917d31b05b3be808fabf5e442fe377460a1384f58256dd4dd3d73cd6afea62a5a7237b6e56d9088e0f49078548ca33e7745ae3ac65143b80369ab8c0e7b883f0e733ae"}, {0xd0, 0x1, 0x7ff, "b9fd39ef290782156a357d7780f6009c7967bff72043f063ef308c22d46844288fd41dce947050df9d896b7ddb28ba0c1cab5f71dcebec1e1d55caac4148f94c51ed803f72b5b249c9905574edb3b9f6c139bb1c76afdb0920fc1da851609a7868fe60611b385a2fba941e965e5283361e037a66cd51e163ac820bcc7d42cd1a451522db4d270f4034d158e46ca71d72f94d2d973e77bf2a988d82fbe2ba3afc0ebd6cdddeae0574efe8505a0626dda18404b2e476916f8b3d"}, {0x78, 0x101, 0x0, "8f8dd26a0261657afcfc3160ddb98a761dd2111153856b1316f30aa34422c35a070c33b11bfebe00ccdf5d5d5c85a4dd857681f69425dc8bc865cf7eceabd7634b63ce1f9d00d865b7e14e1d98e0b49758856de9128bf792f809e7308cefaa290678251759"}], 0x6b0}}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f00000000c0)="edd4bcc9ce6e83d414ad15e33936d34a53d7356585f14b772124adf8aa18c539599f001ab0e08b65fc1d0607a66fc9fcd6713ca1f2f4b37fb60f2b5ae5d6df11b5cf", 0x42}, {&(0x7f0000000a40)="525600650a4cc1bf3d320fd16bec20866ba34c512f32e669c8d195206febdc7ac552319518ee8351316028249059995dec2478bcfafd21160f36e659a503e73a95b568f2fd7b39fc3aef6bf95d0306c303cb4eadbdb6a38891e33978b248d09e5573c857a54f726ee472413c6a6d109687e8cb57d761e1f3e5d5f15609df3e161d57e106ceb878210f1b02871343d471c314ea497424108889907460fc005c339f336bc8defb4407492e2859311cd637ed36d241c04f", 0xb6}, {&(0x7f0000000b00)="5aae8f54085d01030f07346161561f05909eb747b7682fe2aa030aaf66d6cbf1bac43187854974a286356ae13e7e1d2dd17f37928f292132f6f59b799487fda70c436495695ce4e357a2af4231ffc22aff6fe5d39dd3660632f48ad18827ea7a4a4fbb31dcc80c738ac1a11bdc732f63152383a0ae5e922d0e1cc1eb", 0x7c}, {&(0x7f0000000b80)="0b282262dfadcf4938f54574daa24f81b0889fe5ba071e1f94c570fc1194d98b80710d6e73c3d157a46777d0b98a34e555ab284e9a8d96", 0x37}, {&(0x7f0000000bc0)="a799b08abc198c576b8f6a02ab8755b28059dad3439b2ee2e3aec2e7beec1b9146ca5728bf9effb09f073af8b966e14f527fa8a76794b79ba5bb13e765ebc1719d6d29437640037a8e0513bc93f409fe4726c62b62789b87fef3b11762650e36c122331f6122ff62eefa3cec95eea564a0982f8bf19f30c13993dd5fe894d770a5d26abaa435ff7cee1717472681a69fe0072671267f", 0x96}, {&(0x7f0000000c80)="cf544092635c086ffc811a6d5d796cec43a29d6c42e9da47a19fb5c15ebdc49d26f19662b958ebabe54f14868bf49c6ec283ba5f3e1d930a39c8f233", 0x3c}], 0x6, &(0x7f0000000d40)=[{0x68, 0x10b, 0x2, "9f34882661c13e6e24b0bd7076952b7a49d35316bd8f42795b944a3cfbf1b8a702a0f4fcb7ebcc973a77085b49de2cbf8734dced79b57bfce8045f98accd6f7b57fbe953d2153b89b1aa2254a2848344459025f9"}, {0x40, 0x10e, 0x8, "fd0f364b2ff877f0135804e385bb5e89c943bd9bb25ab345b6f97223521adcd5551f87a71f474e8cdd08d3f02e7fbc"}, {0x50, 0x1, 0x58, "115e59038fad15bc40147a2fa5223693399288c8423984ceaec1ed6327d52033ed7f13b879e0a0568818a3d9b51e90d7b2429673633cd05dd73a72ee17"}, {0x88, 0x114, 0x81, "80b31981f625ab3a0b05408e558d24cd31b35d73d30151acdc9135122e84cd4ff0da57436c94fcfc65831a9f67ef869ff6b325d0a7110cf716c4a26a1ffd0371bdce610c4a745624a1bdc6bd93d48375cf5711da6e6c469809366965a0174c636be7169c185aa9b74d988df242491ea67d9adb71faf6"}, {0x80, 0x109, 0x4, "9bda1dc0db986024a900b79a6a3185a4a03faee69ada3351062379cd79b53fb11ed421fb1eaba8cc5d2f2ff2ca434d29323aa0ef92dd491103b995b89a494022de0924f9f7773fa9550f56bc24d5cb16d561351df82554fa65b063c744efc567f22ce9dcc6e28912ffa0"}, {0x80, 0x110, 0x1822, "efbffa39d4dc11602090f971b38d851481f915b1745314d48494cfe276e660bf47c802302f4c8beb49782e8331151a55f5f4cef7699413c0d58f5fc18b899ce809f3fd6f20121449ae783a009ee90cbfb2c5d07a93fe333c0bb8defaa872a3e2e80a01c4f47f9df127a5d727ca749f"}, {0xf0, 0x10b, 0x2, "497a4a503946e27da7cdde5b19df1ea64f40414c458dca672c35d935ad1535b20b179452dd5003588f67e87070387a26eff524127dc6abaea9672ff52d1bbc255bb658763cd8872bdb1d156265bcec4b11e67fce9447fe26de94d7abccdb1365b5b4a96fa76545a1ec1c4cbc292d6519a3b483ddc3a96eff7a9fa20a1dec9f0d2fe1be5f671e274feb004f4008e07cc0d6bad4400ac4611b3030383cbede4f717eeafc0061a2425495744556968aa80d161d9725af6a2f6d09b56557056cbed9c88be6fc12b670de0e97a8ad8725eb721725d325c85afac04365eb"}], 0x370}}, {{&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x2, @rand_addr=0x64010102}}, 0x80, &(0x7f0000001180)=[{&(0x7f0000001140)="88fdffc8af1abe5f37c881ef9e03370c39f8f86db7fb5a06af5ba82db340", 0x1e}], 0x1, &(0x7f00000011c0)=[{0x28, 0x101, 0x400, "bd13e3ac6b42903b24fb96e680216b5954c8de51e5b1"}, {0x40, 0x44e1ca78fed50076, 0x3f, "255f8ab295120f19907dcb0d88c47373f3444ab885f62ea876f9865d5b4dbb15c800914f29201d4284fe7385ea9cef"}, {0x110, 0x108, 0xa6, "d81300f3d60689013d76e7b4b951c1de3fe7bdb8d7ae1c8f9710f2923929827ba8d00f9d20cbd7fa9f7dfb6571531745e2d847e9be935110b75f6629618a1bb8cca8a1336b17fdd61332735dce1c5884ef4985bb529ee69cb98229dfc2c2805657cd268967f208ab3849b9ba7d3ac899a467a04dec7cb37297610d4be4ed3d115da87346f93405e8bd4790b24aeeabc2b4ca67cd876822534dee6186f2c49bc21b7ebc1302591e85a032c17fe47a05c24cd96450beb1cdb82af4560b9f8e9519bc2c24374e7150f5c79adf7aecdbf860d00424ea56efd4291b9f92be858091fbc4630eeebd447e919b029dfb86d112667b029cfc5614451f19914d53"}, {0x18, 0x0, 0x2, "9168b7a372b68e"}, {0x18, 0x0, 0x8, "f518"}, {0x90, 0x113, 0x0, "dc9a644373104deaf416c3ec10a79b8f3e67f3e2f51dee601ff8c55c8f3c1d1ff258478dfc922e3ab756584b83761eb4491ee54b55b649daa64412ac13ffd93a4423fc78677ab10505c4096e2a2f02ca61d317a4e05ea8fccd0d537aeaf3b9f8a6e916e68a4aeddd56b4ecf782913b83c8b96bbe90de1ee46f182b514617"}, {0xd8, 0x10d, 0x1ff, "2cfcf92ea04bc0ad8d95e2e62821787f6176276b6bbe4cd2a1542d77ab34adcc6027cef69c17b9f83343e256d66f50bd77b49dda24a4794f6f085bf790e8cc96d29bedc534db3a2878a4db83a6fca65e1d76f7ee35d53d5192bfafdf028088af54b649e9023acef414f170e5e34d6977ebde75907ec20ea4892e2855a29b1962bb04b1cbaebc06a10ed837b85b066feb446b63092ef8ea8b2309aaf6ae3d89401607e08eafa3098f4845a4d5e49e99b6062bbd44641a8c5d1ed9225b404a171d2cc76664"}, {0x50, 0x11, 0x9, "9d16b69ca753b17e7331e2b5c5ac36a29c4b08b9ec3e0bfedb7e3000a51e9cfd95b51a16590cacf34f705a9e29a7dbf5f7a18c8820637026e3620749e5919a20"}, {0xa0, 0x1, 0x9, "d417fdd5efd45ac2391cf361330463b372ef40a92b1dcc0edaac0bbb34ae75616b7a3c175bbf2d984e29ff8b86e75844b73c8fc41ae436bbf8588db160f6f6b8e58ba734a22c9cd9209d5a72f3f72217b6e27e61acbbab7c066055d77f1bf7fa184c3fe235d915035766cb5189de9213c874841829cbb6b9f47a89315daa816aaffc957b36eca2728840f2341c94"}, {0xb0, 0x10f, 0x143d1ad2, "3b385ea6364fd70d8c871150451ee6a0758a908b6014f10bdf90f7033d7aaa15e39d52df6f55c59e008b566003c74343e3efe66713d8d2b40d559b62a798f5095dfd57230c2c92d3585353ee009d8c77c1f61134bcb055728282390a4e9f88f99eb44adfda6ec39697a0e43eca183bc18610cbba33b476a5d1bde2ae3d240fad59daed7a9afd392d8781d1b9065c3d473ffc67e120fc585bfbcb"}], 0x4b0}}, {{&(0x7f0000001680)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000001700)="fd21a4844ec872d0561babfe4f4708c6303fcac36be359299659870ba4d556f2ef39132b3dfba3165186978cb8f4", 0x2e}, {&(0x7f0000001740)="032e021c246c1500f6628954e23fbd0c98d2f90f8b7f3b77dd4ac0e9802e270a5ae606acd8ff623fc47dacd1d75325d5092c7397a734bb5bf6fffd2ebbae6462842e1ab9886993a6f9f2b307ee4659d1ea3f61b7a70d21a470769bcc66d0713bcd7b0970becf81f29796b1698727a5ac668ca068b1027772f20a5a19bde1f1914e53300dde0c96bd9aa066d1b5044ab018e02b942a8459d734b69bda726cec40f942ad6ff861ac476e08ea672a621bac35581e7a401bd62b1c36eccf5f69ea3a8f6cc2804aa43450f36c63e109f8b1c86200702ebc3b8b33744e976e76ad3725a0b0789c4b9d61a5b0dde51a43a83cca94f33cb2ac", 0xf5}, {&(0x7f0000001840)="626862b8b0918aa0659a7fa57a12ffd57e1ee5b6b880c6d64d47e53face886f936b15ae2e193a0b40351b885b6bf216714b66b5d44f2211f2c719ce92b39ab1eea41830d27af", 0x46}, {&(0x7f00000018c0)="0445c0d6896a9470fa5764f90c3842f598f78f3da0935f5db2e72d9120a4035354ee5d4c22430d47e3ffdbbf9bed06b0bba429d07d0c4f49b2241b8d2262de0b0cc3ef40be8ffe83424f78ff5e577b22d9b345ffe9ec26b49ddee17ccae8e703f750805ac885e52e95b9621eb54fdc2661568642ac6e02e3d0af835c34bf180458654a0c1474297e0b37895bd72ae14cc42873d5bd26b78afebb03690397661342dbdef253d22b18b218afa9383448f05be32d12f16f1e875f1b092af00216b80e8d3aecd91406181b6ebef5", 0xcc}], 0x4}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001a00)="fed50ecaadd7087af75a00653e331e9030bf2779a299694c691090c159889f80f787163c131205b2660a2360e9efdd804354d005a6f6e55863199e0b54f8424063ecdbf02bfdb24ba4e8013b71f7b51cfc52a189c1e606c96c4f2d3cd64c6379dd889a205807cc800ae7a548ecb6687c2933bdd0ccf583fc6eb3f86b", 0x7c}, {&(0x7f0000001a80)="6b23fb1985fe80700a2763c0dca93d923cae9290e51867a5cd27d59cd22664aff78d7b6df65bc9621f3390f11d5730d11456c39f0698943a37ab02e026a5a4c1164c84866634d924f56b4d6979347dd1077f6b7ac057f0d07007b3b4af463ed706634c2a07e2b38d8b1c95782e8a9ecbdc8fbe39dd2672c6456c459c376fd689cd56c204313c04eacd28e0325ff3cbc605203325023711b81273a9226366af61dbccbbf3", 0xa4}, {&(0x7f0000001b40)="07dffaa0353071d224ea1d592cc61af82c495aa3d5b85326a2890ec89b326d08ae95eaeeba04a6d49dbc5362c25a0f11b36acc6bbf4e825736", 0x39}, {&(0x7f0000001b80)="4cd83a1cc8e85c0c04308d8ed11a39ffefaed6c36410732b07d1b9899f93b6d452a7115002aaab41f4c570503e7bf48d8f897f55e46a1760a6b574a1ccd0dd41f2ed97ff9436edccd9ef2715c2fb1ad189b4d95ba522bb2196a1d8fb5aa2926212e8b8bdafc7590de0ec33699301d4db8209a884522453c3c88b52e8c2d1f06b922f", 0x82}, {&(0x7f0000001c40)="4c3bef9bb7a797bf32cee931589d9b16ab406b729f8fe0250d89fec01caed6f523792b5ea190d52196e2caec833c738e46a453c17f231c3e9cc347eab000f21422150a0f35a5418e542e9ee70c4ee1e8b0182fe9258c550036dc8c78b326360156395dba8dc6e1618e6322ceb34edbc7a48dba75c34a61509c91622c7031178cabc5ccd1fe81a1e766212cfcee71a36932f8edce5db82d0fc9a14f3c02c1dc75cb1b978cf1c19609e2e786d9f89ef7a966c44a4d48bdb291a268d07ebb8732a18953189b17ad2abdc9237fcbb4d39dc901", 0xd1}], 0x5}}, {{0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000001dc0)="9f83b4f1e1bca6dcb00960698257407883d64f33dfdd3bb91e7a5279eb6ad7d4b7fced61818a198f7988139f71c9e52571638150aa960303f922d8c2c21c578f4dae3ce08d22ffbb4a3c3189c9cf61f57bd0280459b1e80da0265a52034551eb6d1a6831205c6168fa930eccf6fcf523bd083e0842a0d0631cd6c9ba56747d47f1a058a6cac0db6c0446915d73c457", 0x8f}, {&(0x7f0000001e80)="156a9f25ec7c6d9bd694296350afb75167540ab839a9ef84bf1a698e116771cfb7646381ea29ff55e72f37ade37db32215c8c427788364d32e1e3f30dd182c22ce1657fbed25d06ef04fe017632017aa82b846014d8d93557e4ef31d5b6ee5042a2a8dcc3b9d6df512661e6fe38bc24b6f5705d09b86260d8b4b963f0ea5c89f7363c7a420b64fdb1032230bf7d32e5828f74530e0e6655f6f17e93ca952c9458c77e0d76e84a6d92ec9141396b502b3566ee8aa2b3af0c5fcc7e9d8de52a91e37f1b9e9c821766cd2d261c5290487dde210bc1660b066ae0647856dd952c0499d71daa5ae85bbbd5c991fdebfc613299a6d6678", 0xf4}, {&(0x7f0000001f80)="0c728062ed34af16dbd1b04366d687ac70b830ed54e964ba8eb53118751b10f699fa7725ff84e691813eeb907e46804e43463e3e85cdae2ab8ba676556950c3e0a641dd5793b37ab520a2116a610289c93bc54aa943013f4b99a813c8dfd445f2d287d16c179f2833a78350722c8f11a4eca4199556df70047319a5ba458e7623ac610e8bf564aacee485dc8a93ace7e13dbe904c44ed74718db7624a41a", 0x9e}, {&(0x7f0000002040)="6801f3b915dabab43120963cd946aab0acb7d49bce4bbb99c347ff1278f8d8be7546763ed05fd9817e0a4185732cc00aceac0474677ed65d0f18ad5fc5782bd7d5552aa23dacdad710c1eef8d07f2bb828f2b15d42904faeaa1efbf334280dcf5dce630404302a95794504697b6b4076ce349db97c815d53bb5ed3432121c3def982ff4e4a6534e3920ee30082bc3651ebfdbd76eaf201f9b35f48f1e741145c0f3c3b34a88bb668c0fd0836b9b1e207c5ba9252c02dd703f8d4e1f212146f2df0301801c6bf08092339a7290a6be035c252e166713043eb8e83ed41cbb876da6834d0abbcde", 0xe6}, {&(0x7f0000002140)="951c45ce583c4969febdcb3d0a6dc1b60d85402c9ea1ac311b19e1dc7bf9152e337111caea5ac236481956da2d843d6d7821e3c96d9b29fe9fd4300ab34fe5c350133aafe6edeb2593b55aca93ab48d984dadd0b9a3a4c5665eb121a301d49c0d7bdce1614543b09f86122766b0402ce56f1cede35de9ad0112f5bb00bd5db268bf56a78da023c9872e1f9ba06e4800361ef2fa36c313c3eb70d7b0c259f944475489b65988d96b15b472852", 0xac}, {&(0x7f0000002200)="f34f2443b1e96a3d98716b96c9aa3c9e6b8d04f777a2fe", 0x17}, {&(0x7f0000002240)="1bfafabcb450d626767a5358bd558827a8c601d708a9b43c3ab779bf85275dde840165814dbd3b3baec2390004daad", 0x2f}, {&(0x7f0000002280)="4d02b281d61f0234c119fbbc18a7b99d59e797821f11ebb1520c62a0673e78f902e85c78e2cdb39569c8315d00dcb049f5d03494976bc06e562918823f4c0a92485d68fd73749bead4e4bc666b98f542270afb81801ff56c221120b4fc0d530ca57781f3a6a1", 0x66}, {&(0x7f0000002300)="8aad16355a293aea6248f9bfe47bd7bae8fbbc3dfdb277fc312036236592cb1489e68a52a5adfda66ba59922259e6e62509978820fb1b2599388638a45e7635c647700e8432c74fae383afadf2d50d13907063ebdcfe85d52da953d9e247f5c2dca2932f4acfae271859e7bd6781382084725c3e59341f2b25512e96da8ff2e693cf8c8a25e124475e2ac40887805cd93d9d7fa95d2ccf669a64e0cc1e3c317f6f52f0d86b5d3c594efc65", 0xab}], 0x9, &(0x7f0000002480)=[{0x60, 0x101, 0x80, "58802747a5633514275bf9913826daec554dc4bfc6aad8f6228d19de7609fdda58ce3f95cbd9365fdad521b37bc28c48f78161b566a24abe259a3b43b121efc1a7169c65c3c45e5b8ab3b9d890161239"}, {0x18, 0x104, 0x9ea, "b5e378772c31"}, {0xa0, 0x107, 0x1, "a4816e8daf44485c39b0b3e42a26d5b7b1f65169e936604d54503bbe0b38697b4504dc61e76523f3fd96b0cd65d45547a4182c44876ac1eb2267cc7a5b4cfe74f0da2f78a9cab0262ba17672a45fa57fbafcf37f72b3d1f91322c00bce2053ee260fa65590850a335e17d00d4497a1ee4ae7f36f3a5023e5f567d34fdbf1867fa1a9b1582ff062ed1aeaacea"}, {0xf8, 0x119, 0x9, "16878b74466b3b144ed61fdc60267ff6a19bfd218a9c4f03bf92102e83a192877b39852f005300121b44f757bb16947d01ceccde100cc12687017e750e1f16839577809e07d7cc54d99d99b972e0b8024eb7d026ffc2c92bb3db78738a1c04b4c04b23e5aa38bce19730d7ea780fe3ed9f4c6fda97ea7e0ee99dea0c7fe1024a2f1c41f5161f7d1f69fdc2ac77d188dfa2825f740537cb5f450ef2c7f88203157bcf7eabade5278f0f3fa9ed12ec2902427cd41d2309770ec3faa6101052dd3c96c5b0112cc817525d4bea5f9516a410213449ac9b431a7fd2ac82af73319a78e96797d618"}, {0x70, 0x105, 0x10001, "367665cabf2bd9765bad4afd8a3a77e525cabc7ddc3531f1283f3f7caace741d360cfed085c46f3479fb700bf7010fe9882fccad14c2312807f13af38b2912e4557623afaab02de182de5c378735d1ae813e1ecfe8771f62e04f7adaef"}], 0x280}}], 0x6, 0x0) 08:41:28 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$inet_udplite(0x2, 0x2, 0x88) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x3, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000010010000010000002f000000000000001a02b5e476ae2e730b541f79349114ac67979dddb84e86eed1b2546b74febd816d4e0dc65a0261"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x3, @local, 'veth0_to_bond\x00'}}, 0x80, 0x0}}], 0x2, 0x20004040) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000080)) 08:41:28 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)="e9c0b59f615e1ee3bc52bb0b99a28dbbd95523d21a9b7947a677c7a636b50fdbf299b610a6d57a03effbb9681fff25003019ac98112b3c91e647470b9fc149021ca8af6aee2b9cf645ffac77136e565e7da0c0c3c83a45f336bf315a6deda52c096d56843aaf911e56947387e09f04f5dac0b7e3636b48caa63e4656b04333984eb804b9f552a391044e0422ac5aa3356e3e5fd27c1933bb33be57a17e5b0798dc6adcf8ad38860223e77bc5332b677ca42b2dff5bcd212a555c7536c33724bb1046718c", 0xc4}, {&(0x7f0000000280)="a0a65cde9475ac8784664d28165353eebceaceaaac47f04756a24dc766d615775fb60a63c3faac387bc0c2cc0ac25fe1c38b178fbb4d6a20129e83a7f2d175530802b34c68d2c26e9171ed7feba8f9a556aa8c4dec37259dda073afe4eb9c2ed6ce0c3aaf3656442903231b9a280cc6988b6118a239f1ef87fb71aa147bbaeb627b20f61ea3aaa3872cb49f0b4de78b6726dbaa6f4a95d4739601d6a3d079808fcd9e1abd9f6359213d8438dadfd3aaf26afa8dbde5f8755ce1c7a2aec29075f2ce75cb807", 0xc5}, {&(0x7f0000000380)="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", 0xfe}, {&(0x7f0000000080)="e8c8133b18669946742f6858c9e45a1b2abceaf9b1b3b8168aa0968cf564cc81f3b8c08a5af4391c4ae8b7acca1618ef0d5806563e057ba17ea15b42d8eb5fd5192a2b890d95f4e3b15878dbdcc6c29734307457f5b9c5fe6190716011928d1d0ebb52b2e6f86c199b51db6e0f1e79abdf490998d025ab80c6596a3ab596bf490b5d8daaf592", 0x86}, {&(0x7f00000004c0)="257c0a8609a169b2a687e5a278f8de31ee9ae268bab2cf0a4aa728f983f33facdfecbd175f5174d06f0b121bd9bd79dcc5efc06a62a1a77277a035665b42", 0x3e}, {&(0x7f0000000500)="3ab464193112b82be0efa203fbfb9d62cebbb51303df10b26c914bb85306001316fe663411205c8dd2aa47c5edc0721f93ed46d19643b66631d300ec00f4b0ac8bb019d6043ea08910cfeacf8e4c55d51aa202015626641b71c972682626d031943fea3d9e2d9e5ef6c82363f112fdf6c1ade25d2af1329b060390ed2b2a4a597fbbc92dba7c50441755916cc2dc3f6a5f1334db48cf163fb58a19c645b91dda1880ce15e6851bd0dc01f8cc832375da2e4c5bf5bf7b2dfad97d", 0xba}], 0x6, &(0x7f0000000640)=[@tclass={{0x14, 0x29, 0x43, 0x3f}}, @dstopts_2292={{0x18}}, @hoplimit={{0x14, 0x29, 0x34, 0x80000001}}, @dontfrag={{0x14, 0x29, 0x3e, 0xb4f3}}], 0x60}, 0x2785128bb0ea30de) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:29 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000080)={'netpci0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="180020000000000010010000010000002ffaff000000004d2ae0566be5b805645c581ab77befc946928a93907f87868b5e5a9c0f8607a8689c57d5dd84ec3a941dca139328d0f0b73acf8526480b5af4afde44170637e1806093d1bda427ffbd77c8ba3dcfc0e02d5b11a4cb09cfcd56775142be00"/132], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:31 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:31 executing program 3: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x40, 0x3, 0x8, 0x401, 0x0, 0x0, {0x7, 0x0, 0x1}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8001}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x40}, 0x1, 0x0, 0x0, 0x2401c0d0}, 0x40000) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r5}}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f00000002c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000840), r5, 0x1}}, 0x18) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x378, r3, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x19a0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}, @TIPC_NLA_LINK={0x4}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2138}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x49}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}]}, @TIPC_NLA_NODE={0x148, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x4e, 0x3, "58d2a6e432944adb7918f03251300335ce992747eb1da850fb1407c414005b6eeb5a1a3e2a242e004429bb9060ef51ac64b4e137ae0817e0b94203cf71bd4834d582cbc46eb2aa568e06"}, @TIPC_NLA_NODE_ID={0x5e, 0x3, "bed72e872eeb5255edd096f07bc0e0a086a51110772b049a07183f181a43938eb38cbcfa1448b129cc0fc91b259890d6b0f9845d920f53c320171c496819134a969e1988bb533291a2e0f8afcb01f49b02b75eef1be6431bc37e"}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "3359117b88dd0da6790ac7545b051389076f27e2fded25b40c80"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "e2e26297215f79130a6e42bb4e8505053f33d315ab4999a47b7449"}}]}, @TIPC_NLA_SOCK={0x80, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x82}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffffff81}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffe}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffffa}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x64}]}, @TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x10000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffd}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x311ee56c}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb12}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x18000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x378}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) 08:41:31 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x7, 0x4) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = dup(0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r2, 0x4008642b, &(0x7f0000000000)={r3, 0x3}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f0000000040)={r3, 0x7}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000100)={r3, &(0x7f00000004c0)=""/4096}) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:31 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) mq_open(&(0x7f0000000100)='\\!\xa3\x00', 0x2, 0x9, &(0x7f0000000140)={0x5, 0x2, 0x7, 0x4}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) 08:41:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:31 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg(r2, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x201, 0x8, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000080)=@pptp={0x18, 0x2, {0x3, @rand_addr=0x64010102}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:31 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180001000004190005"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:31 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:31 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000966c9376da71a6691e934225a0dcfa706a0c057f07eff19c0000001c001280"], 0x3c}}, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$netlink(r6, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) syz_kvm_setup_cpu$x86(r5, r6, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="36652e640fc71966baf80cb828f24484ef66bafc0ced66b80b010f00d0660f3882b241b700000fc7788926660f3881b9cc00000066bad104ecf2ab66f30f09c744240000800000c74424020f000000c7442406000000000f011424", 0x5b}], 0x1, 0x8, &(0x7f0000000280)=[@cstype3={0x5, 0x9}, @vmwrite={0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2, 0x0, 0x58}], 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', r4}) [ 1039.301839][T32023] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1039.390291][T32023] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. 08:41:32 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:34 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:34 executing program 3 (fault-call:7 fault-nth:0): syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:41:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1042.018001][T32056] FAULT_INJECTION: forcing a failure. [ 1042.018001][T32056] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.114171][T32056] CPU: 0 PID: 32056 Comm: syz-executor.3 Not tainted 5.8.0-rc6-next-20200724-syzkaller #0 [ 1042.124097][T32056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.134150][T32056] Call Trace: [ 1042.137456][T32056] dump_stack+0x18f/0x20d [ 1042.141808][T32056] should_fail.cold+0x5/0x14 [ 1042.146414][T32056] should_failslab+0x5/0xf [ 1042.150843][T32056] slab_pre_alloc_hook.constprop.0+0xf4/0x1f0 [ 1042.156922][T32056] kmem_cache_alloc+0x46/0x3a0 [ 1042.161707][T32056] vm_area_dup+0x88/0x2b0 [ 1042.166052][T32056] ? mark_lock+0xbc/0x1710 [ 1042.170492][T32056] ? kvm_sched_clock_read+0x14/0x40 [ 1042.175705][T32056] ? sched_clock+0x2a/0x40 [ 1042.180132][T32056] ? sched_clock_cpu+0x18/0x1b0 [ 1042.184991][T32056] ? sched_clock_cpu+0x18/0x1b0 [ 1042.189855][T32056] ? __lock_acquire+0xbcc/0x5650 [ 1042.194825][T32056] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1042.201002][T32056] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 1042.207000][T32056] ? trace_hardirqs_on+0x5f/0x220 [ 1042.212041][T32056] ? lockdep_hardirqs_on+0x76/0xf0 [ 1042.217170][T32056] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1042.223349][T32056] ? vm_area_alloc+0x110/0x110 [ 1042.228124][T32056] ? mark_lock+0xbc/0x1710 [ 1042.232556][T32056] ? kvm_sched_clock_read+0x14/0x40 [ 1042.237769][T32056] ? sched_clock+0x2a/0x40 [ 1042.242202][T32056] ? mark_held_locks+0x9f/0xe0 [ 1042.246994][T32056] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1042.253165][T32056] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 1042.259159][T32056] ? trace_hardirqs_on+0x5f/0x220 [ 1042.264202][T32056] ? lockdep_hardirqs_on+0x76/0xf0 [ 1042.269333][T32056] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1042.275542][T32056] ? vmacache_find+0x62/0x310 [ 1042.280237][T32056] __split_vma+0xa5/0x560 [ 1042.284593][T32056] __do_munmap+0xe9b/0x1170 [ 1042.289119][T32056] ? mmap_region+0x38/0x1590 [ 1042.293726][T32056] mmap_region+0x257/0x1590 [ 1042.298244][T32056] ? do_mmap+0x9d4/0x1170 [ 1042.302580][T32056] do_mmap+0xca8/0x1170 [ 1042.306753][T32056] vm_mmap_pgoff+0x197/0x200 [ 1042.311363][T32056] ? randomize_stack_top+0x100/0x100 [ 1042.316662][T32056] ? ksys_mmap_pgoff+0x326/0x560 [ 1042.321612][T32056] ksys_mmap_pgoff+0x43a/0x560 [ 1042.326388][T32056] ? find_mergeable_anon_vma+0x240/0x240 [ 1042.332047][T32056] do_syscall_64+0x60/0xe0 [ 1042.336479][T32056] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1042.342376][T32056] RIP: 0033:0x45c369 [ 1042.346273][T32056] Code: Bad RIP value. [ 1042.350345][T32056] RSP: 002b:00007f92b74aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 08:41:34 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1042.358768][T32056] RAX: ffffffffffffffda RBX: 000000000001f600 RCX: 000000000045c369 [ 1042.366749][T32056] RDX: 0000000000000002 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1042.374728][T32056] RBP: 00007f92b74aeca0 R08: 0000000000000005 R09: 0000000000080000 [ 1042.382709][T32056] R10: 0000000000028011 R11: 0000000000000246 R12: 0000000000000000 [ 1042.390690][T32056] R13: 00007ffe8cd2836f R14: 00007f92b74af9c0 R15: 000000000078bf0c 08:41:35 executing program 3 (fault-call:7 fault-nth:1): syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:41:35 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1042.901410][T32095] FAULT_INJECTION: forcing a failure. [ 1042.901410][T32095] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.930758][T32095] CPU: 0 PID: 32095 Comm: syz-executor.3 Not tainted 5.8.0-rc6-next-20200724-syzkaller #0 [ 1042.940691][T32095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1042.950760][T32095] Call Trace: [ 1042.954071][T32095] dump_stack+0x18f/0x20d [ 1042.958428][T32095] should_fail.cold+0x5/0x14 [ 1042.963040][T32095] should_failslab+0x5/0xf [ 1042.967471][T32095] slab_pre_alloc_hook.constprop.0+0x3d/0x1f0 [ 1042.973552][T32095] kmem_cache_alloc+0x46/0x3a0 [ 1042.978337][T32095] anon_vma_clone+0xe0/0x5f0 [ 1042.982950][T32095] __split_vma+0x179/0x560 [ 1042.987379][T32095] __do_munmap+0xe9b/0x1170 [ 1042.991899][T32095] ? mmap_region+0x1fe/0x1590 [ 1042.996592][T32095] mmap_region+0x257/0x1590 [ 1043.001113][T32095] ? do_mmap+0x8ea/0x1170 [ 1043.005453][T32095] do_mmap+0xca8/0x1170 [ 1043.009631][T32095] vm_mmap_pgoff+0x197/0x200 [ 1043.014243][T32095] ? randomize_stack_top+0x100/0x100 [ 1043.019551][T32095] ksys_mmap_pgoff+0x43a/0x560 [ 1043.024329][T32095] ? find_mergeable_anon_vma+0x240/0x240 [ 1043.029970][T32095] ? lock_is_held_type+0xbb/0xf0 [ 1043.034921][T32095] ? do_syscall_64+0x1c/0xe0 [ 1043.039527][T32095] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 1043.045519][T32095] do_syscall_64+0x60/0xe0 [ 1043.049951][T32095] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1043.055848][T32095] RIP: 0033:0x45c369 [ 1043.059737][T32095] Code: Bad RIP value. [ 1043.063806][T32095] RSP: 002b:00007f92b748dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1043.072225][T32095] RAX: ffffffffffffffda RBX: 000000000001f600 RCX: 000000000045c369 [ 1043.080203][T32095] RDX: 0000000000000002 RSI: 0000000000b36000 RDI: 0000000020000000 [ 1043.088181][T32095] RBP: 00007f92b748dca0 R08: 0000000000000003 R09: 0000000000080000 [ 1043.096155][T32095] R10: 0000000000028011 R11: 0000000000000246 R12: 0000000000000001 [ 1043.104132][T32095] R13: 00007ffe8cd2836f R14: 00007f92b748e9c0 R15: 000000000078bfac 08:41:36 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:36 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:41:36 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:37 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c", 0xc0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:37 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:38 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:39 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:39 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:39 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f00000000c0)='./bus\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="687567653d616c77617973b802962f84c6c9ec6ff315762a4380aaffecd59ab76e2d919e2e0f2d7a358970945a8ed53ed5af"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) [ 1047.262985][T32193] tmpfs: Bad value for 'huge' [ 1047.483790][T32193] tmpfs: Bad value for 'huge' 08:41:40 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x2, 0x0) bind$nfc_llcp(r0, &(0x7f0000000380)={0x27, 0x1, 0x0, 0x5, 0x1, 0x7, "9aca081cca7002706f2c290e5cf61034529cda525cec73c1a1fbf169c80fcf14362387e4640c6ab4a3230539149347bdc298eadcca8e301aa640fda5236359", 0x29}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x501000, 0x0) ioctl$RAW_CHAR_CTRL_GETBIND(r3, 0xac01, &(0x7f0000000140)={0x0, 0x7, 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r2, 0x89f0, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f00000006c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={[], [], @private=0xa010101}, @empty, 0x0, 0x0, 0x0, 0xfffffffc}}) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsu\x00', 0x2ce580, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r4, 0xc0505510, &(0x7f0000000300)={0xc412, 0xa, 0x5, 0x8001, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x3) 08:41:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b325", 0x79}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:40 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=a']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09af", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:40 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x71}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$DRM_IOCTL_UNLOCK(r1, 0x4008642b, &(0x7f0000000100)) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) [ 1048.417728][T32238] tmpfs: Bad value for 'huge' 08:41:41 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=a']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1048.802456][T32251] tmpfs: Bad value for 'huge' 08:41:41 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=a']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1049.138579][T32266] tmpfs: Bad value for 'huge' 08:41:41 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x4b6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfc, 0x27, 0x0, 0x0, 0x41c1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7a, 0x5}, 0x0, 0xfffffffffffffffd, 0x100, 0x0, 0xfffffffffffffffb, 0x0, 0x1}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200, 0x0) bind$isdn_base(r3, &(0x7f0000000300)={0x22, 0xff, 0xe, 0xbf, 0x9}, 0x6) sendmsg$IPSET_CMD_HEADER(r3, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x60, 0xc, 0x6, 0x1a7d63e827da77ad, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x8880}, 0x20044) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$HIDIOCGRAWPHYS(r4, 0x80404805, &(0x7f0000000340)) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:41:41 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alwa']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1049.462625][T32280] tmpfs: Bad value for 'huge' 08:41:42 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, r1, 0x0, 0xaf}}}, 0x78) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0xfffffffffffffffb, 0x0, 0x0, 0x3110480, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x80000) bind$bt_hci(r2, &(0x7f0000000000)={0x1f, 0x3, 0x1}, 0x6) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) 08:41:42 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alwa']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:42 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000080)) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000001c0)={0x172, 0xffffffffffffffff}, 0x8) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000200)={0x20, r2}, 0x8) setsockopt$inet6_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000180)="3bbeb65c398f9e43df7f47c1b69d549de894937009d596122cd3acd19c66", 0x1e) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800005072480b0010000000000000000000000000000051487a7b707c0d127384812575b9b173ac13daa893f0c3ada585c05ce239fd35f904ca52163a0dc78df880f0be90b3bbd206044890f73ddeecd5f002d8604c0d8e3fe9da47b2313e2374ecb0ea45a47688920106686e4e37db08000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@ethernet={0x6, @remote}, 0x80, 0x0}}], 0x2, 0x0) [ 1049.973949][T32302] tmpfs: Bad value for 'huge' 08:41:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b325", 0x79}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:43 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x3, 0x2, 0x10}, 0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000002e0076cb62ef0000000000009500009a4e000000"], &(0x7f0000000180)='GPL\x00'}, 0x48) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:43 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x8100, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="04c1eb67000000"], 0x2, 0x2) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f00000000c0)={0x3, 0x0, 0x15, 0x3, 0x61, &(0x7f0000000440)}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000300)=@rc={0x1f, @any, 0x6}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000280)="b0efe143f24f4de655e14d2241504127c702ccebb96bf097d7a5c929002a88ec39fe04d12982425f76e7341ef7c6503f1cada76b", 0x34}], 0x1}, 0x0) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000200)="9426e0548a04023d24a7b52f42ada53b524b18fbd921532f6ae596e9c9fdbd2da48651cab23a12bc09ecb834f8bb093ee80284438dce69860826285b632859a04d2311a4b630", 0xffffffffffffff6f, 0x3) 08:41:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09af", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:43 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alwa']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:43 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x16c, r1, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x800}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000000}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xec8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x25}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x81}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @private=0xa010100}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'macvlan0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x16c}, 0x1, 0x0, 0x0, 0x8000}, 0x40) socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@llc={0x1a, 0x323, 0x81, 0x3, 0xb6, 0x7, @broadcast}, 0x80, 0x0}}], 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000740)=ANY=[@ANYBLOB="000003008b420fa99ac026c503bd89882b6e2ee4a6c870eff04db55c6b8fd7145854d970cf0545472967f4b1b30484e9ee95fc0f4bbce5ae8f5157ed5a1f6fc9fd4c1a3bc376574a4d40b349383032bf8ee12d83138e6de4efe5b3923fcf9df61bddcb23aa4ba26bc13b3a258a75a6c7e156d56395f7b3d8db1c5fc91bdb894bad4d64625cd91a4945615d977e856a17c4c545add46a9fe32f2e25f3d4e76ae74491efc91dd6be11010a6bb7931d442bd658a4d670bdce296183ce8a7459156d957e0ca8a38ce8295284c2259ac763ea9c3bcea96746e0389876e17bd12c05f44efccb0f5904e4912c6ac9a5fab45876683e7414d99c56b0d451310653d56c6f66fb1ba4278a3bb08fbb9df037cbd80c752369f6ee7186c927834d6ba2eb0a4aa31a3d820791b95aa8e8a3a132bbea5f7708a7b6cb01eb930cb29a4a66d97c6ee79e9682b7ee4fb521c9ea23e102cc91c5b6b9c403f8128c298cd87fdeb242c17e5f6a65e6f9bf89395e0f1fbff7e23aa9d4310856f668808d26a07dff680c45489ab2d38810b26e2711c9ca7847af9bba91c6dbce2f10b5a9bfda8d31710b44dd55ced23eecc830e50fa18261e306a22fb7ab1636cc9cf9da663e3d008021049d1e2984887e2229ecc12f84104c894b6571f794cc0cf1f109e94bc308c6a4ef805400"/498, @ANYBLOB="9d492a7980e29e82ac74ea5c9b434e81aac97d814fe91804e1916b438f3cc454d0e52304c2bdfa24e298d1bb6e773d7f310c4e7191f7746ea6a3cf7e415f1563f5ee7be14a7e6753af063de960d60e9f80edcb7386ca4af2f920379a2c3e97e70f6b05aad5c93181f5917c0b1396ee92dd6d8ba2f66865ad27", @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x6c, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r7 = dup(0xffffffffffffffff) getsockopt$netlink(r7, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000500)=@proc={0x10, 0x0, 0x25dfdbff, 0x80000000}, 0xc, &(0x7f0000001680)=[{&(0x7f0000003c40)={0x2070, 0x3a, 0x10, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x45, 0x0, 0x0, @pid}, @generic="5ec54933573af6d3f1af2797cebb3ddabf3b11389ea63ce7a48032f6383217e9a7f75ac82b0ef0574a309b9cb25e20ca7b5454eb72e794a46211bc6af895eef1643b48e97c", @generic="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", @typed={0x8, 0x5a, 0x0, 0x0, @u32=0x7ff}, @generic="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", @typed={0x8, 0x17, 0x0, 0x0, @ipv4=@loopback}]}, 0x2070}, {&(0x7f00000004c0)={0x18, 0x29, 0x4, 0x70bd26, 0x25dfdbfe, "", [@typed={0x8, 0x52, 0x0, 0x0, @pid}]}, 0x18}], 0x2, &(0x7f00000016c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r7, r2]}}], 0x20, 0x4}, 0x20000080) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000000c0)={0xffff, 0x1, 0x209, 0x6, 0xffffffff, 0x7, 0x80000000, 0x6, r6}, 0x20) [ 1051.445992][T32339] tmpfs: Bad value for 'huge' 08:41:44 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:44 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:44 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) finit_module(r0, &(0x7f0000000080)=':\x95\x00', 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2000, 0x0) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:44 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[{0xffffffffffffffc9, 0x110, 0x5, "8b06679618557d8436f351282f"}], 0x20, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@hci={0x1f, 0x4, 0x2}, 0x80, 0x0}}], 0x2, 0x0) [ 1051.891459][T32362] tmpfs: Bad value for 'huge' 08:41:44 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000001001000001e1ff0400f65f96ad3bb600"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) 08:41:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b325", 0x79}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:46 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:46 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18002f001ca7d0a90000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) [ 1054.223533][T32397] tmpfs: Bad value for 'huge' 08:41:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09af", 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:46 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f00000000c0), &(0x7f0000000100)=0x4) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="147b"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:41:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:46 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x240, 0x0) write$P9_RSTATFS(r1, &(0x7f00000000c0)={0x43, 0x9, 0x2, {0x8, 0x8, 0x0, 0x4, 0x7ff, 0x100000001, 0x23, 0xe0000000, 0x9}}, 0x43) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:47 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:47 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) recvfrom(r1, &(0x7f00000001c0)=""/194, 0xc2, 0x80010062, 0x0, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00') sendmsg$NL80211_CMD_NEW_INTERFACE(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x14, r4, 0x405, 0x0, 0x0, {0x5f}}, 0x14}}, 0x0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r4, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x9c}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x840) [ 1054.695153][T32430] tmpfs: Bad value for 'huge' 08:41:47 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:47 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x1002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000001c0)='NLBL_CIPSOv4\x00') sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000040)={&(0x7f0000000140)={0x2dc, r2, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0xdc, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x25}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x54156461}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x267ea640}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x50}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x220c5d25}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x3f}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1656f9f4}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1b4c721f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2501ef5c}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x41790113}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfd}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x15b1ec1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1827131b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7797fffc}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xdbddab8}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xe847df9}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xa0}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbf}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xd07014d}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x462d66cd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x379bfd84}]}]}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_TAGLST={0x4}, @NLBL_CIPSOV4_A_MLSCATLST={0x90, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5986b8b7}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4ee487e1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3f12}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2c0aaccd}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f413168}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4c66}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2e7}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1dc6a7b6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51bd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed4d}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd278}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x48a531f4}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb2c8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xf7f791}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x64d1}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSCATLST={0xdc, 0xc, 0x0, 0x1, [{0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xb00}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x181594c4}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2acd10ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9887}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x31d0f37c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x42c7b785}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1f45}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x595a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5df3ce60}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6dea10d9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x29976184}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7900}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x71257e7c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ef96688}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6617}]}, {0x4}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9be3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x17b9}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x50edb7dd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x710c8bba}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xf0fb}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa87f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x52e286a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfd69}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2a6e30b}]}, {0x4}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x6c, 0x8, 0x0, 0x1, [{0x4}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xfa6003a}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xeb}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe9}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x65}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x559dd6d9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x97}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xc6}]}, {0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x324de344}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x73fe55dc}]}]}]}, 0x2dc}, 0x1, 0x0, 0x0, 0x48840}, 0x4000000) sendmsg$NLBL_CIPSOV4_C_LISTALL(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x148, r2, 0xb00, 0x70bd29, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x9c, 0x8, 0x0, 0x1, [{0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7b}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1abf2001}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x56007b88}]}, {0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f56824b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x88}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1d40c6}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x58}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5bb8071f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x42db8844}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xfb}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x4ce73db3}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xea}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x33046f37}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x17}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x94}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x17180e2b}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSLVLLST={0x78, 0x8, 0x0, 0x1, [{0x24, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7a66f3da}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3f24d842}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2826419b}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd1}]}, {0x44, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x526f2410}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3e86e46e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x27}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x31f81032}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x18148b59}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xeb96e4f}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x3d388c09}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x75580fd5}]}, {0xc, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x412472ba}]}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x3}]}, 0x148}, 0x1, 0x0, 0x0, 0x8000}, 0x1091) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0xffffffffffffff15, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000010010000010001002f00000000000000", @ANYRES64=r3], 0x55, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$inet_tcp_TLS_RX(r4, 0x6, 0x2, &(0x7f00000000c0)=@ccm_128={{0x304}, "2a5c009be9b0ebdb", "4dcfcd09384ebc3a583590a7f16ad8f7", "b3cc6d4f", "cc8d4a313c74e8e2"}, 0x28) 08:41:47 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1056.618196][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 08:41:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a0", 0xb6}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:49 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000080)=0x1000) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@isdn={0x22, 0x80, 0xc5, 0x9, 0x77}, 0x80, 0x0}}], 0x2, 0x0) 08:41:49 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eef", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:50 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=al7ays']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f00000000c0)='fscrypt-provisioning\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000019440)={0x0, 0x0, "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"}, 0x1008, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x2, &(0x7f0000000440)=""/102397, 0x0) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x80000) socket$inet6(0xa, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:41:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="180000000000000010010000010000002f00000000000000d22176dbdc24f7178e3d1821be256b5f939bc798673b2cec655442f960c87b0d660cc89b26e4fe15cef2ffb872a21340e449f4587f4317dcfa30168dca1ffe976b0be4e618f1f1440782477e7c67caba6fa6258502d79397a4d0"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x10000, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:50 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1057.585973][T32493] tmpfs: Bad value for 'huge' 08:41:50 executing program 1: r0 = socket(0x5, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @local}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21, @rand_addr=0x64010101}}, 0x80, 0x0}}], 0x2, 0x3) r1 = dup(0xffffffffffffffff) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f00000001c0)) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}]}) 08:41:50 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000040)={0x13, 0x10, 0xfa00, {&(0x7f0000001f00), r4}}, 0x18) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f00000004c0)={0x8, 0x120, 0xfa00, {0x0, {0x9, 0xff000000, "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", 0x20, 0x5, 0x0, 0x5, 0xdd, 0xc0, 0x9, 0x1}, r4}}, 0x128) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80000) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f0000000180)={0x1, @raw_data="543674493598036bde20c3422d3aa6d19a8e172abcb2f4e686acd2c95e7959c8c3dd63badecb03b837ce32a5107537b15fee933f22b0b410964a6aec37b355b11d406142f003c079ff0a6fb4ea3242e72c8fd6ceb1beb40c45d07ba53f501245aeb1264eef6496135ece78ceb7e1566c18d6400c785ae6849f784bbfce6e2a33a44942d8be5ee4c564b39bf4c925c1bebe528b6a98c04452a0188877ca26e8cae3e6fdf0a877766dd19b3362fabcf78334eb3604e63c8cad3b92277586b187ba0cd21e1b30e5d7f1"}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r5, &(0x7f0000000280)="64ccc40c9a3296ca86b20cece65d20eeb8084130969c1240c9b5f9d7080d4a6cebd033f3b4749521c8ce54d8c116abd017e96e5524ca396a08c44c200125f4c4759ca2b692c9f5f3d6434402d0965fe2028c4cc7edea7c7de5dec99a5b13440faa398869aaf70f02062e7a45500a2b467094468a89e6c5bd74464111e05e66df2d27d85ff96d8c9c309f3f07a366f9f0b090c98e91cdb6127110259d11344de53876681795de582601e51645ee01e4069104d20ce21a5c78a78059ee2d6e58ce39f25b963a18362d16b1ec5eb4083b08202f224672507968742635da49354ec26a9f37464ecc0a695f"}, 0x20) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000b5b7ea6574c5180000010000002f00000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:50 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="376436160000000010010000f19357b27943010000002f00"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) [ 1058.317625][T32493] tmpfs: Bad value for 'huge' [ 1058.498205][ T27] audit: type=1800 audit(1595839311.063:47): pid=32507 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="cgroup.controllers" dev="sda1" ino=15754 res=0 errno=0 08:41:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a0", 0xb6}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:52 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:52 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000001d00001000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback, 0xeff}}, 0x80, 0x0, 0xfffffd99}}], 0x2, 0x0) 08:41:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$nbd(r1, &(0x7f0000000080)={0x67446698, 0x1, 0x1, 0x0, 0x2, "31d6385454f70cff9a938bf99695ce428fb3e7c4478f57eafd6904ab86223c7ae530bb6a55df25b99fb684e91a18e53409c55490d9bac8e091766ac5e1a7bd4fa7"}, 0x51) 08:41:53 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00'], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f000001b000/0x2000)=nil, 0x2000, 0x100000e, 0x20010, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./bus\x00', 0x4c995315, 0x0, &(0x7f0000000100), 0x20, &(0x7f0000000300)={[{@stripe={'stripe', 0x3d, 0x7ff}}, {@errors_continue='errors=continue'}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7}}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, '&/'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@obj_type={'obj_type', 0x3d, '--%-!'}}]}) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000100)) 08:41:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eef", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:53 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:53 executing program 1: r0 = socket(0x2000000000000021, 0x4, 0x0) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80000, 0x0) setsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f00000000c0)=0x1, 0x4) 08:41:53 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x116, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0xfffffff8, @loopback}}, 0x80, 0x0}}], 0x2, 0x4008800) 08:41:53 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x4000000) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={r1}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf}}}, 0x78) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$netlink(r6, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$vim2m_VIDIOC_QBUF(r5, 0xc058560f, &(0x7f00000003c0)={0x9a, 0x2, 0x4, 0x120, 0x5, {0x77359400}, {0x5, 0x8, 0x1, 0x20, 0x0, 0x56, "2adb756b"}, 0x9, 0x4, @offset=0x1, 0xe45, 0x0, r6}) r8 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0xfffffffffffffffa, 0x1010c0) r9 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$unix(r0, &(0x7f0000000b00)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000240)="e2fecbd65a1b53b8002c0744dcd1172f5db4b53b0e6a725533648e4c502e7223b3c20a3fb87eccc71746b0fdd95b72a2aec30c34469f23c625e7118b1189c8c765bb4fb00c1459f7", 0x48}], 0x1, &(0x7f0000000a00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [r0, r3, r4, r2, r0, r7, r2, r2, r8]}}, @rights={{0x14, 0x1, 0x1, [r9]}}], 0xc8, 0x8000}, 0xc841) sendmsg$AUDIT_ADD_RULE(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f00000004c0)={0x430, 0x3f3, 0x730ddde29569363c, 0x70bd2c, 0x25dfdbfe, {0x10, 0x0, 0x26, [0x575e85ab, 0x40, 0x4ea0, 0x2, 0x2f7, 0x4, 0x0, 0x8, 0x5, 0xfaa, 0x40, 0x1, 0x5, 0x4, 0x5, 0x8, 0x6, 0x1, 0x3, 0x9, 0x101, 0xf4, 0x2, 0x4, 0x9, 0x7fff, 0x7, 0x1, 0x0, 0x41e, 0x8, 0x7, 0xb784, 0x8, 0x8, 0x1, 0x4, 0x1, 0x7ff, 0x81, 0x5a, 0x1, 0x8000, 0x1000, 0x3ff, 0x3a, 0x7, 0xfffffffd, 0x8, 0x3, 0x3, 0x4, 0x40, 0x7, 0x3, 0x1b, 0x4, 0x3, 0x0, 0x4, 0xfff, 0x800, 0x7, 0x6], [0x4, 0x69500000, 0x7ff, 0x200, 0x8, 0x0, 0x9, 0x9, 0x2, 0x0, 0x0, 0x42, 0x100, 0x8, 0x3, 0xfffffffd, 0x1, 0x80000000, 0x78c, 0x87, 0x4, 0x800, 0x2, 0x7, 0x9, 0xf8000000, 0x401, 0x8, 0xcf, 0x4a48, 0x9, 0x800, 0xff, 0x9, 0xffe0000, 0x5, 0x78ed, 0x771, 0x1ff, 0x8ae, 0x8, 0x6, 0x0, 0x400, 0x7fff, 0x7f, 0xf0, 0x8001, 0x6ee, 0x81, 0x60, 0x7, 0x63, 0x2b, 0xe4, 0x4, 0x0, 0x4, 0xfffffff7, 0x3, 0x4, 0x80, 0x6, 0x8001], [0xbfa, 0xcd, 0x0, 0x4, 0x7, 0x0, 0x0, 0x3, 0x4, 0x80000000, 0xb279, 0x0, 0x6, 0x0, 0x9, 0x2020000, 0x1, 0x8, 0x800, 0x4, 0x4ed0, 0xffffffff, 0x9, 0x7, 0x10001, 0x2, 0x7ff, 0xbe0, 0x400, 0x8000, 0x7ff, 0xae, 0x779, 0x289, 0x0, 0x363, 0x6, 0x10001, 0xe0000000, 0x3, 0xfffffffd, 0x0, 0xfff, 0x9, 0x100, 0x4, 0x0, 0x6, 0x7, 0x85ac, 0xff, 0x7, 0x8a1c, 0x1f35b866, 0x4, 0x3, 0x0, 0xffff0001, 0x1, 0x1, 0x6b, 0xbab, 0xfffff492, 0x5], [0xfffffffa, 0x1, 0x5, 0x3, 0x8, 0x6, 0x1, 0x8001, 0x8, 0x4, 0xa000, 0x5, 0x2, 0x1000, 0x28, 0x1627, 0x2, 0x0, 0xff, 0x222, 0x770, 0x6, 0x2, 0x1, 0x7, 0xfffff000, 0x6, 0x6, 0x1, 0x9, 0x59b, 0x1, 0x4, 0x8, 0x0, 0xd9dd, 0x5, 0x2, 0x1, 0xfff, 0x7, 0x40000000, 0x401, 0xfff, 0xffffffa2, 0x1, 0x7f, 0x80, 0x1, 0x9, 0x5, 0xdc2a, 0x800, 0x51b800, 0xd5, 0x7f, 0x2, 0x5, 0x1, 0x9d, 0x401, 0x94d, 0x0, 0x1], 0xf, ['$:*\x00', '-]$:}{!]]-\x00']}, ["", "", ""]}, 0x430}, 0x1, 0x0, 0x0, 0x80a0}, 0x4041) [ 1061.047480][T32576] tmpfs: Unknown parameter 'ext3' 08:41:55 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a0", 0xb6}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:55 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x7, @private0={0xfc, 0x0, [], 0x1}, 0x8}}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:55 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$HIDIOCGRAWINFO(r0, 0x80084803, &(0x7f0000000440)=""/4096) chdir(&(0x7f0000000040)='./bus\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:41:56 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$nbd(r1, &(0x7f00000004c0)={0x67446698, 0x1, 0x1, 0x1, 0x1, "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"}, 0x1010) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000010010000010000004700000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x33, 0x0}}], 0x2, 0x0) 08:41:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eef", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:56 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:56 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r3, &(0x7f00000000c0)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@delchain={0x3c, 0x65, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r5, {0x9, 0xb}, {0x3, 0x6}, {0xfff1, 0x9}}, [@TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_RATE={0x6, 0x5, {0x0, 0x30}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0xdd89fb4a857db646) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x8, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @multicast1}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:56 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = dup(0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x3, 0xcd) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000100)={0x8029, 0x1}) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000fd00000001000000b95f32524e464b0a1574b403020daad1840df55aa9d8be559586f7c25609f0018e36418b143ea7cb888f73177d922540d4c7054a39e1099826fcc3a6fd50a74acd9389805e935e0ec9f500736c72ed4e6497a36ba4a8d8d65596f1d64925de151cfd1b5a31c0de10eae392"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x301002, 0x0) getsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 08:41:56 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:56 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000010fe0000010000002f00000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:56 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x200) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:41:56 executing program 1: r0 = socket(0x25, 0xa, 0x0) connect$rxrpc(r0, &(0x7f00000003c0)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) ioctl$KVM_UNREGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae68, &(0x7f0000000400)={0x1d000, 0x100000}) 08:41:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157d", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:59 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, 0x0, 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:59 executing program 1: r0 = socket(0x3, 0x5, 0x1001) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0xffffffffffffffe1, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:59 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./bus\x00', 0x0, 0x8}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:41:59 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x107800, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r4, &(0x7f00000000c0)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x3c}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) bind$packet(r8, &(0x7f00000000c0)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r10}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb, 0x1, 'bridge\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_VLAN_DEFAULT_PVID={0x6}]}}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x6c, r2, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x34}}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_WIPHY={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0xffffffffffffffff}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc0c4}, 0xc041) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:59 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:41:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:41:59 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x4) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private1={0xfc, 0x1, [], 0x1}}}, 0x80, 0x0}}], 0x2, 0x0) 08:41:59 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) fanotify_mark(r0, 0x21, 0x100b, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1800002f000000002000000023525e66b297000000000000"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:42:00 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x48, r2, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8ac97bf}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x78e5, 0x6]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x5}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008880}, 0x40) msgctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000180)=""/237) 08:42:00 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157d", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:02 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000080)={0x0, 0x0, {0x6, 0x10000, 0x300b, 0x1, 0x9, 0x7, 0x1, 0x6}}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000000)) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$VIDIOC_STREAMON(r1, 0x40045612, &(0x7f0000000100)=0x2) r2 = socket(0x2000000000000021, 0xa, 0x10000000000002) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) 08:42:02 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1069.603086][ T324] QAT: Invalid ioctl [ 1069.610936][ T324] QAT: Invalid ioctl 08:42:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:02 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bind$bt_sco(r2, &(0x7f00000000c0)={0x1f, @none}, 0x8) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x58, r4, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_AF={0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x12}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4c}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x20004080) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x84, r4, 0x300, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffff87}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x488c1) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:02 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) getsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}], &(0x7f00000000c0)=0x18) 08:42:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:02 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:02 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x53, &(0x7f0000000100)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000180)=0x28) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="8000000000000000130100000100000083291d42a982cfd700003be3852f9c65eb9ce97be8c809f80615ce9abbf8d6874e9cfffac51b57d14cbdd94e665a3fe6c8af9c9901133aeca5bc9bbcf427b6ec37fabee1b58a8b1515648714d38a6b89c53c9e5a357c0bf84fd44b7433bfb0b6c965745b804559aa5fc3461226d2e5ef3e7500000000"], 0x80, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e24, @local}}, 0x80, 0x0}}], 0x2, 0x22000801) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r1, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x6c, &(0x7f000059aff8)={r2}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000400)={r2, @in6={{0xa, 0x4e24, 0x9, @empty, 0x7}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000380)={r3, 0x8}, &(0x7f00000003c0)=0x8) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r5 = dup(r0) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$sock_void(r5, 0x1, 0x48, 0x0, 0x0) r6 = dup(0xffffffffffffffff) getsockopt$netlink(r6, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r6, &(0x7f00000001c0)={0x2, 0x2}, 0x2) 08:42:02 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) chroot(&(0x7f0000000080)='./file0\x00') r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r1, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmsg$nfc_llcp(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x27, 0x0, 0x1, 0x1, 0x7f, 0x3, "6f295d2d115358674b4394e631a0a936c3475c28e72797450c7ae4cedf4028215c0953b519557ea4e503cf7e0f226aebc7630b4821f812e0863647a3b9db01", 0x16}, 0x60, &(0x7f00000002c0)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000100)}], 0x2, 0x0, 0x0, 0x4040081}, 0x81) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=""/161) sendmmsg(r1, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000dd1000c4c4832b42b78490424552f38c421f480010"], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:42:03 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:03 executing program 1: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) sendmmsg$inet_sctp(r0, &(0x7f0000000540)=[{&(0x7f0000000080)=@in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0xb}, 0x1}, 0x1c, &(0x7f00000004c0)=[{&(0x7f00000000c0)="f1f9054e2623471f25ec3d179c2117b0004cfdff8151834a33c1a3dceb9f669563c3447f35e2e06bf1e888f2959b", 0x2e}, {&(0x7f0000000180)="ce99e6544f25892a14786a2478084bddc26f1e480e1aa1c93deafe6a4ace6ef8fe1c2d9596930293b8eb9b3b9509e5ae23f84533ea600f21623586d7f7e706c0fbc6b9a6275c5a8807a725f2bf39569513cc471ae8b3165c2365e69b6e77f81f529a15d33c1b7b63bad08b9ef1aa79e4516a2b74f0fb2b73771caa245ffa1e4f61697dc5e775c7a6958be54e0efe810650b94ba1f41fa2a98f617b21ded7616c9d5ea51b8402c9f00ddac0b0edf7c6b9d634fe9d3c09212681c8000956d595477b61a6b2090a92ec0aab0ffc757ca6ef78d268ff58039c3050773117db9801b1939f50f65b", 0xe5}, {&(0x7f0000000280)="ec85adb67ba5a5c99b29f173eb920ee267f0aa6f134c623eedb626fb19e9eb3e1e46c24a2f4d2e01463934b177709e126dd44652bd03d0c6279fb3f839965f9a8f7d2b26da3ed3a954e759d8ec91778a441380b729f31909bc27c13c43238c910e4a7188e42592109c94e894d8aa43f852229a9f87dacf1ea574ad430e26f83c92fc64a80e791c411c04274f37c4c74ac342e3df3a70ba50934c923b95359a183dcad5140331d176a7cae8161b64bf341a57e9becaa165eac9be125c3e59114044b60a61d4a48a650ef5ef110208c41688ca4751e9e5d21361871ac73316e31be1fd874589f4693567", 0xe9}, {&(0x7f0000000100)="5c79a3ed22fe02a21b424e439ae629c6191266fd67a23274c17ca84a03ed19516bf30d5b7636bde4539dedd0a71eb9a819fc34bde4b7b462ada934ea94", 0x3d}, {&(0x7f0000000380)="ad8bf55d8242980e292ebefb209df70c95cdd0875ef4aee60bebf5cacb76c5d74058bb4cd7a7194c3d8b3f20a65469ab5c37c4392d21fe201ebe56dd4e3c5da31daf14751901df0c40d50a60aa82e837b962d55870bc4713a8d3b7918dc4bcbb5eb0f036269066ae767c711a5e4a99bde23a577f365f7e79e91f1fde49d8807c9ca556fd4dc3a2cdfb09f1cc3c60710f7275edc7db404aa9f8203778b711d9fb0f54b635a62b5178d9cdc4dc0023c82c2d7d6b7ee6136939fc62c9247d8cfb0bc25f8a5a378c22e640a844cb9fe4e937b323203978084d10a09c499ffd", 0xdd}], 0x5, 0x0, 0x0, 0x44840}], 0x1, 0x80) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=[{0x18, 0x110, 0x1, '/'}], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, &(0x7f0000000580)={0x3, 0xffffffff, 0xdd, 0x1000, 0xfffffffe, 0xb4}) eventfd(0x3) 08:42:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157d", 0xd4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:05 executing program 1: r0 = socket(0xc001d7307de631c6, 0x80000, 0x2) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10}, 0x24) shmget$private(0x0, 0x4000, 0xdb7812e02f887e20, &(0x7f0000ffa000/0x4000)=nil) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r3, 0x0, 0xaf}}}, 0x78) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x88243, 0x0) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000180)) sendmmsg(r0, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYRES32=r2], 0x18, 0x7000000}, 0xf401}, {{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 08:42:05 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1072.635423][ T398] Unknown ioctl -2147199699 [ 1072.643330][ T398] Unknown ioctl -2147199699 08:42:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:05 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x1004c, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:05 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1073.113577][ T426] tmpfs: Unknown parameter 'tmpfs' [ 1073.343070][ T426] tmpfs: Unknown parameter 'tmpfs' 08:42:06 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x82100, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$P9_RREADDIR(r2, &(0x7f0000000300)={0xf3, 0x29, 0x2, {0x401, [{{0x0, 0x3, 0x7}, 0x101, 0x5, 0x5, './bus'}, {{0x8, 0x3}, 0x7, 0x20, 0x5, './bus'}, {{0x20, 0x2, 0x2}, 0x3b, 0x8, 0x5, './bus'}, {{0x2, 0x2, 0x7}, 0xfffffffffffffff8, 0x3d, 0x5, './bus'}, {{0x8, 0x3, 0x3}, 0x3, 0x7, 0x5, './bus'}, {{0x10, 0x3, 0x3}, 0x22de50e3, 0xff, 0x5, './bus'}, {{0x8, 0x1, 0x4}, 0x1, 0x2d, 0x5, './bus'}, {{0x10, 0x3}, 0x0, 0x1, 0x5, './bus'}]}}, 0xf3) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:06 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:06 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:07 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36", 0xe3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:08 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:08 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="687567650e0b01e7453e0e26617b1c003c96e900000000206df63b00000000000000010000000000000000a881cdcf2a92dba7ee7562a4d4c219f001270fbb7957317d3874b4e279b01ecdbf6de92e3fc0492f62fbd82ee8b6aafe02d3caa7d4feee2ba59dd0b1ddf73a8cbb1f21b482b7235753cad8414822bd4178fd73d1be67bcadf05bb963985054e44b1d477a72cb9fb7e100fcf176bba004cd72b5d40d442fb0818398f492a42cb919570000e51bc926e5"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) syz_usb_ep_read(0xffffffffffffffff, 0x1, 0xd2, &(0x7f0000000300)=""/210) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000000)=@sha1={0x1, "7ce76ff351c643fd749666616f60beab76076977"}, 0x15, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f00000000c0)=0x4) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1076.208878][ T507] tmpfs: Unknown parameter 'huge çE>&a{' 08:42:09 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1077.034574][ T507] tmpfs: Unknown parameter 'huge çE>&a{' 08:42:09 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:10 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36", 0xe3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:11 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:12 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:13 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, "7734bc1a365942d3ea"}, 0xa, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:13 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x8b, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40083, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x5, 0x10, r1, 0x1e953000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) r3 = semget$private(0x0, 0x1, 0x0) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000440)=""/4096) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) syz_memcpy_off$IO_URING_METADATA_FLAGS(r4, 0x0, &(0x7f0000000380), 0x0, 0x4) r5 = syz_io_uring_complete(r4) ioctl$CAPI_INSTALLED(r5, 0x80024322) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:42:14 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:14 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$TIOCGISO7816(r3, 0x80285442, &(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="de5a73025709b68b2131995b205777cc597307004db887f96e40a702090024b00fa8b9784321d1fedaf8e3b5f1a9820bfcef30e1e9389aa3ebf404f291a5c58e024b8051c3eb060f7e4d08edb50f4cb5faae0534e158b2a3753c5f0650e687990bd519fbb1f5c908c5de266d97653a21a92f9f7598eeb13a5d2dc6ac024b3becd3a26c93528a5de260e482325ec9440c1e56788aa02590e6bd155b3428f40fec609f00ff62c70289231126673c04541025ba03d6db958f39936f6f576615a0a6f55d91305ee4551975fbbf7f15a9a09743e7dd053985335bc2f4f908ef335dae5324a2d894bb22f5eed65edff701410f6d3c3012dde5b590ce17b3ffd1dec747c1d341e09f57185f93113b2e1c2406784eec61641e704954fdb1fbef43958ae13a2b7fcb192890ac51b25c69eabb27fc8b4f"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:42:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36", 0xe3}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:14 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a5247", 0xfc}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f00000000c0)) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x38, 0x3, 0x3, 0x0, 0x0, 0x0, {0x2, 0x0, 0xa}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x1}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0x3, 0x3}}, @NFQA_VERDICT_HDR={0xc, 0x2, {0xffffffffffffffff, 0xbb}}]}, 0x38}}, 0x4000000) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = dup(r3) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x3) 08:42:15 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a52479567", 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:18 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, r1, 0x0, 0xaf}}}, 0x78) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r4, 0x0, 0xaf}}}, 0x78) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000000)='./bus\x00', 0x2000bd, 0x0, 0x0, 0x208022, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r6 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x80000) socket$inet6(0xa, 0x0, 0x0) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000280)='fuseblk\x00', 0xa00000, &(0x7f0000000300)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[], [{@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, '+'}}, {@obj_type={'obj_type'}}, {@seclabel='seclabel'}, {@hash='hash'}, {@audit='audit'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@euid_eq={'euid'}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}]}}) ioctl$KVM_INTERRUPT(r6, 0x4004ae86, &(0x7f0000000100)=0x5) r7 = dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f0000000400)=""/6, 0x0) pwrite64(r7, &(0x7f0000000280), 0x0, 0x3) 08:42:18 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:18 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000200)='./bus\x00', 0x7f, 0x3, &(0x7f0000001440)=[{&(0x7f0000000440)="358d869f43c8239a84e9fb4ce19f5c60277ee36847a8da11cbec44d40d0d151f6cd6160b610d318c2c0db9a5d182093ff304c0745c51791691518d756100ec22540105c2b07613974f7d685364a0455e2cb23c55937fdc72f25f0c0229360e9b5f0a8f728ada06ec2f183964bc1742642e2e5236f645860dd76fe4e7eef72cde2a6293890864e27ab91296583ed2ca3a706252ade82e74d79890d29bf4a9fb7c35695475c4059ec198127827675fab92c62e339611e2ea8c2e93489d01f33cc85daa78ea0df1fd05ffbfea18c6d11042368e939f8dd6af0b983df3fa4fc833e40c94b07e8cf65428e6780c74f5d981a541c825cb64f7e7df76ac0fd865718f7ae0e5808d68240abbc0962829a86105c52a4dbedd0d0d1043404e25b9be65ecf43b6f7c18218c2e7eea90bd2ce5d3f171bd06f039321ba87f1eb4c28c6c57b0d19d0ab023306fd1d3e42d2191c6a26fedaf22fd63ce232888f1a18dd5bb01b21fe3ff745eb1cbaeea378b43e4f04ebfab812b65ffe2499d37fda96803d406cf32be7d0cd766e77eaa9fb91e11c6391e1b80270e8b625a198a0005d8db020161ddd335e708c69d341b196744547f3eefc8d78faf2ad7a55b0711895a122125ddaf1c45b383e025dc522f6bf93fdded3c8589bf6e95bda2c7cba5a1506ee8d0c53c8dc5106a50f9d909ce38350171df871e4ed26f193c045959a2d00952d021046320a1c9656c0bd2dbcba80d519b6c327542bfb18132ffe4a4f431b33587337c2854973d70d5e1708ffc9caf93fda70d793af11508773f4854ccdd7c34debf4f9107bbb34711c31b0c747fa6a7cb6177a98793182a35aea9810ad1e8209f3e72a57a36c2412cf2bdad72ecee6f741762da9dc668bb078cdd79d67b6050f2056e2c829836c70d13d6c944b74e3a85de45c2367ff26828dffe0ffc2c2e7f12b35c731d85eabf0175f1680868583d7b47608d90108a7a87a210267a25696d8a8ed94fd367013a05de918b204aee172964890bdd6e7baac96733b4c11352e7360acc67e71c4876f99f1d81de3bf98e40b20a359fdf72f998c4d1729aa0d429aa6d5cbc87a248341edbc6f26c1bf770b17cb3cb925437da485797016e13460e45d834901fbaa9bf723004e363df4a7a079776b3b6e837cb4784ec08cdf097ff5c308c190eeb70a2ffcb672fccd852710d606590592d87173ff8a292b884580b185adc578f0720804e406a691733fb9081a5039cf23914cf4e3d35fdfb97a6acd4610b9d491ade8a48350ac70994a84523e4772b3273d169e2b692f47e0744ba9236b0e3cde6a222d7fab2e33d1dbdf52181a00c961ae9b8e22afee309963d133f2d67438c046e3c46368d48b2bd0a59bc4a395b7a3867e384a2168f34884ec31df8974789ea45e1914711d26de025192155254c8ff6a8abd1132a1d87b616fb8fa190de6b86e73896ccdfebd9def454689a36334c37cd1fd979e3d87bc72d19958f2ccf1145d818ff25a9c66d675323fc815dbd4f8d5067613afcaa85b44d324accd40378c65287c5208eba4102f108dee44edaeb7d04aca658240affd52a239212c386322293f32312d36e3bc6d5f3774bd01f164088538033e45e9bcb6883c4fdcd583430a9e9b0bfcc319aaa2ba354e2db468e5e2355c99189d6a585c8860573757fe7e6bae32cfec2077424ae0f1c09e03776e511d8d0817bbcb4253d5d3394261b43595c15aa9fd770d0f805b22aa1070509f5bf75c824af63c4120dfd5f2a77bbf3b00074f75a6c5a4682c3d3a162bbcdc77b536ec18f570dfe9c6037cc7dc942d17ab5a920c37b3385dff39243ef2f20eef5016fdba7f35a11434c7fe241e9099b4d72d2fe6b04032369de577e1f9b0a3e8defa17f32d96bdac04f892dc9e945da98044a067ebcdae57e428ee5550273e2ebbfeb4c9692295a152b9b763ba0d67d33b222886c4a9026f646dc9f45de55db6afddb4aba13428281d41bccabdbf0dac0fffb848417483de545701b3ab084406bfbf06d9dc79a2131a988d4e0fbe931ff00222131c056aff7f7d6e76a04cfac6efefadbcf907b8ccc30c76af9616f3f97665f183aeb93efb0b6be02363119545728aa53e09dd30776a4d913363e511fe87f08abd3ebb9f76c5831e1d655aa2fc519e22b8a4fea628b3d550a524688b3699e2b687372942bbc9182b96c8a5f5dbb3297d41ea685c9c2f333c0ab33bc245d3248a568efa5171b9c08c91b9c63420231f67514fa398c712dfb4f156724f4846f81e89004464cffd970df5315783c8244d55d319b4391fc7ad23075346dfaca2456b72c826c074f699336ac6fed0d4a538b9c6b45c6575310dc6bcb15ef9bb382fd00f48180aad5a4d19c29692a7e2a276135802e9cfc8b18903cef3e284b92f3c011fc57099c133a886c22bbe66736aca77a453cbf2cda1b89e9aaf136f24062210daf3ecb4162c0a8123b1878afc8ebe693fd99865e58337bbcd08e6649fe40d9692012377e331af9bbee7ccdb0423e499935aa913fc0f35da557553c90eaa846e0ee92c30f109a5a5fea89bc6ec4426eace42f27ba6919c417df88cdb8b9d0dd37ac8f777dce741ed4c8b13db1e4d3fb6c55ccb4b82519fc3241d7901442772851e26f41bb4f45ce5e0be22ea047f330103f9e03e2ac37a5eea895e7f2f12b6498d8642123858fbec25f962363fb3900feab8693af54cf4cd51fb60a3a7f1d51f7a16e683035aa8efb06d5547c8b54012fda5f5c40f95fd29a866f43c382742ee0f25b141b3f1afde63e6320140b7d3f57a425b21fc8aeb0c30df9381a19593414c5d662b672b6bacfc700cca0ef1baddc20f1c04d167d8c53ed2bf238afc36f6bab46d76ca4c84eb66c54cfd244efae7631ba346928bbefdab7d8aeccb1655f7a598b59893697dac8a92602ab8ee4841671691e9040d70553c05ac954d4245aa997771fd770281cfb48f8dc24e16424bed57f96ed22a888541219d02531ed7fce580fc4201056fbd288eb06552e24a2b3a0cdd1ccf9a54f20a49396973e725ba382d4c9bf742ff0127907f3a2258900833f5e2de416b84f6af51bbb819544df69ed519daf4c5d99677282f80d6c769366f1dafad95d31faa3622acad8eb0c3c923420ab5c1a6a3e25afffabc50757d15f7c35ec1096114a731aac5eeb3861356cd9102d02895be45d32fa06836da5f59f598c2eb6c64e2186e5b79b7f23ec1ca15da19b96f1e71ab6bd18a91c6011f9f09a4842628435053ef4959f62c50400abce3b5747a4b02712959e3fe47958e0a5b719b733a4c08085b9df18420daff133553cab8051e8e9416b380a913fbab858421ed5780aebe4ec8aaf42db65bbce44d00cfdc9081b6377d1e0ca13647a86b478e94e84146efb5227c57bf0fd7405904563dce26753043aaa61015adaac1f3fd3aa8e33d93846d09a46c0ac7303c1ac13b6dbfb59358c171b32cda05490b03535a109c3c84890da3f02973b8494c775d533964a1e2c8f058590cb12cb1b1d7c3038035893bf59e6bb97f19df16cf0aac49d59719f55d4aa0a3d0f5a24395fe0f26cc082d1d53104133c3586a1bf9c970dc1bc6460544a285c393426d4241cf601bae295f5c481a02500dc2b918ef1eb4cae64827d821b44a115a9aadf055ca5d0805a1ff65473350bcdb8583ead6da57c19d029ea5e9048858680075eba8b12251589c2fdde3cd76c5e71ba54ae25639e198a7a4159a25041598186ca143200ff04762585f7f51b4f7fac7b78c4f5e03fd272851bef36a579297009d5818b76fa63f41dba6da7c59573b5d57f3556b6b7f381ff5bf6338fc9766ba11198c1962ca9a4fea3e1899f31ec58fe8dd45f0844f9c21a1ac31b18c54658c56027486742a70090ef6e4c34991b28098427bfa050faf7778883d1d2eeae3a1727f1f02f08f1817029efbfc9c6c5bea49e04a24d32901b0ddf6a3da4860b4aa1fc34268d72089b1a955bf7ac532612203310b65017ad16fc0033ea319fd1c6e48362ee6d2138bffa93c7f635f00000e20c157135b6fd83e47bdbb2a62f115126fd334dc732aacf96780be575ff2106a3f47b5ce9b4c1ac7ba91894f9ef167bd1cb4e9fbface17c0faf479796e6e1bb478bcbbf003b564b1ad6ac098bb98e6425d4596aacfaf70516459c75f085916c7db9c7b5e0b3a6e44505a3ae13fd9f04f490378d98d48c6b8ceb3fe3be3f0b52d05ddfdd91a32973ac1907585b7ffbffbd791488d8f2937ed788161642dd4037553a65b88dcb1f8968e3f4a8f7959b7602b6a467924adf2dd1b0cf536b19ae5bad1be89e03e5e4eddba5b607dafc936513354e39d8ef3b53e45670447ca61d46ce36c4aafbc10852b94625607d3d1e38de3c508de7881b06a9bb591aa5c9916eb750730db30b7aaa5f5067720073005a251b6cf664a2767f54b9acdfc5e36598f2e69acb5a89ee0f30ebc33441af3447dac810725da49657a1402bb8bafacb410c60bd39eb6e1063f991ca8c39ac8f8b9b4de7708f819675426f4ae2155871e7a3d341ffe6c6ca21ef75d5e4fa760599ca3845d9daf63d68e224417b1b716f5959a3b69b2cb25f06ace58d902417c0911ce58fdfdc96194ff9a40f22a7db2c7778816ef5c8aa64189ac7bfbb8f6c4e4a0dd7c5dcb2f0c03c43d58bb93d6b4b71f5370c5b1e85cbde89c7e45e1ce284506c46dc7fcaad8ae291bc2f5538c65492f3e795577ed2b2566da8718809c3fee3a7f57e2beda3c19942279359fa986627bd05fbf0dee280938e2d8d2c095403a996a941a215a58dead44e0f3138c531a4f82abeba28f5bd845fbef65166d02d0694260c283d632408a58ce3708768c1547bea7f608a0aba9357d52a5c588bc0afc46f4f2b5b242e0bf7c188ff7c39ac7298b0bf1c268d047af11d21f01226aa98e5d62009319196619afb5a4be41b7ca98d45942f8d9ca2b912fab83a6a31ec4125a74375480d2f6eb5f47c237705d3081de8a4901b33e23426a6ae9adb363f524bd1eb1bf0bfb07b5d373caf4021d9cb03d48ca58f59d50642e7849eb7dd6f3f012dc5a530abf157c9c9aba29d283455ad4c236e22f42137fb98158ad434c6110b07706d4911508ade84beb4664afa541d0cae0bf70c2d297c37d08aef950f68dd626d8e3abd0f52445d81f845b7afb1c47e474588f992688f8a56ea2dcb2b45da466396a96449a1dacf0373f78417fc3c58d108e946b6dd4fcaed60ada5a19f90cb7866e9a510644fb1f0cf26e9fa7700387c0336d5ce8d5b5f3388727d93d28e04a623bf9d0d59339efce6d477be9c7e7fa27b9220a0c74d5d309cfa196356719eb7f2d324f343f93db273353573f9a1e2e12ee4587128007f80b5d006916e5504593312b1a924a37088c3f34d1de2258dd1d1e2bae0a0f1331c362546bba30449ad679cccc1b72a8362a00f2636c9e3b7c9f1578fb29e3c5659cfba5eb9513a3d2cff043c431adb0bbbbd6501ab3f9379fd3817ae29eb519e3f4e21b494072be2e860fcb74970ff08f00ef53a0605a0eabd8c14069b981a29bc9edaca081cf7a0fe11f212db2425bee08eb1825e1e2d6f9de2685cbab6494b580d36f667bef1ba84beababdff805e224e7f913cd5ea58cbb56486a399f92dcddf9242992902141db91a8c4c0a2dc6b906c4ea4218bfc4cbece187c226c182aef62b7017d53c38aa7dfdeb629455330cdb704bb6dde41f0fe41fd8eb74a19239a0afff5e43868f10d3c53126368ea887ffdef7d79291f142180c1172c9a41c5619aea9de502b945960263781c7a9c4c7e0152a2ef49", 0x1000, 0x9}, {&(0x7f0000000300)="d4b1e3becdd1fc675b70262d11fe87fd6792b97ad0d58d66d639dfcd4732e7716ac18aa597f3a553f6117e95edf8c82a87228d4d7f70fa8098dbb88878bad1bd8b5884a6a8eb657a0733658fed37055d6461c5cb5ac60f1fb6681a0f21051449d7bc3b49b5c3789469269ddde7f3b8e6993b0800be57314b84cb9fc57bcbd8d55c2fd56d13", 0x85, 0x6}, {&(0x7f0000000280)="f61358bc7efc13d423b0d3da570f6886638b3b2c502d3255be38", 0x1a}], 0x11000, &(0x7f00000003c0)=ANY=[@ANYBLOB="666c00997bfad0fc826461746100000023a62a7914c063"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x10}, 0x0, 0xffffffffffffffff, r1, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) stat(&(0x7f0000001580)='./bus\x00', &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000001500)='./bus\x00', &(0x7f0000001540)='9p\x00', 0x40000, &(0x7f0000001640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_L='version=9p2000.L'}, {@nodevmap='nodevmap'}, {@version_L='version=9p2000.L'}, {@access_user='access=user'}, {@dfltgid={'dfltgid'}}], [{@subj_role={'subj_role', 0x3d, ',$[!&'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x66, 0x36, 0x64, 0x5683a16d7db1d6be, 0x37, 0x1, 0x39], 0x2d, [0x38, 0x38, 0x37, 0x63], 0x2d, [0x36, 0x61, 0x66, 0x10761306ac5efebe], 0x2d, [0x64, 0x35, 0x32, 0x30], 0x2d, [0x62, 0x62, 0x66, 0x30, 0x64, 0x33, 0x61, 0x31]}}}, {@uid_lt={'uid<'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@hash='hash'}, {@smackfsroot={'smackfsroot', 0x3d, 'btrfs\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}, {@dont_appraise='dont_appraise'}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/vcsu\x00'}}]}}) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f00006f4000/0x3000)=nil, 0x3000, 0x4000002, 0x10010, r0, 0x2007d000) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x880, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r3, 0x4004f50d, &(0x7f0000000100)=0x1) socket$inet6(0xa, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) openat(0xffffffffffffff9c, &(0x7f00000014c0)='./bus\x00', 0x58842, 0x101) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:42:18 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:19 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xd9c1}}, 0x0, 0xffffffffffffffef, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:19 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:19 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) accept4$netrom(r1, 0x0, &(0x7f0000000100), 0x80800) socket$inet6(0xa, 0xa, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) r3 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0xb0e, 0x101000) pwrite64(r3, &(0x7f0000000140)="a2f425478497ee9b024520f0199737250cc47b3d1dba030ab25ce460e37e8f7030", 0x21, 0x20) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x800, 0x0) 08:42:19 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:20 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:21 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:21 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="687567653d2d53917d0c69051f911e"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfff7fffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, r1, 0x0, 0xaf}}}, 0x78) ioprio_set$uid(0x0, r0, 0x2000) chdir(&(0x7f0000000040)='./bus\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000820000/0x2000)=nil, 0x2000, 0x2, 0x28011, r2, 0x80000) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$rfkill(r3, &(0x7f0000000100)={0x2, 0x1, 0x2, 0x1}, 0x8) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x400040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r5, 0xc02c5341, &(0x7f0000000300)) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:42:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xfe}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1088.716193][ T859] tmpfs: Bad value for 'huge' 08:42:21 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:21 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:22 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x10, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) [ 1089.472420][ T859] tmpfs: Bad value for 'huge' 08:42:22 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x40002, 0x2) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = dup(r3) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:42:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69", 0xeb}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:23 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) move_mount(r0, &(0x7f00000000c0)='./bus\x00', r1, &(0x7f0000000100)='./bus\x00', 0x44) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) recvmmsg(0xffffffffffffffff, &(0x7f0000004d80), 0x0, 0x1200a, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES16, @ANYBLOB="03070006000800fdff001900000004000180"], 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbfb}, 0x14}}, 0x8000) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f00000001c0)={0x4, 0x352, 0x5}) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) [ 1091.255236][ T933] tmpfs: Bad value for 'huge' 08:42:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:24 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:24 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = dup(0xffffffffffffffff) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$netlink(r2, 0x10e, 0x1, &(0x7f0000000100)=""/31, 0x0) fanotify_mark(r1, 0x2, 0x2039, r0, &(0x7f00000000c0)='./bus/file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvfrom$l2tp(0xffffffffffffffff, &(0x7f0000000300)=""/229, 0xe5, 0x40, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = dup(r3) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:42:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a5247956759", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:24 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:26 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3e", 0xef}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:26 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="a8fcac"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) [ 1094.226013][ T1016] tmpfs: Unknown parameter '¨ü¬' [ 1094.476617][ T1016] tmpfs: Unknown parameter '¨ü¬' 08:42:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3e", 0xef}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:27 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:27 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000140)={0xa10000, 0x1, 0x8000, r1, 0x0, &(0x7f0000000100)={0xa00904, 0x6, [], @p_u32=&(0x7f00000000c0)=0x5}}) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000200)={0x2, r4}) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:27 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:28 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:28 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:29 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000300)=""/44) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000001f80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000340)="ca7599073cc7a54dd895fb706cb54567ad3c66e22aba2c2192de18bef289b7cf38997a509707dac783d3ae3229b9b1d8d6839365255ad385b87ef4f53174e1c6f884f6845ac8064f649701ed7f800ecdd7eb035988359f1fc0c974d2dc6e5a0ff8e0d79d4728ee128cd6d9f2d3c81460a7eeff2dc2d8df64cd1ddb774cf7dd0ca7b8253fd860b85aca8479ecb66be5acc3fc7ec25686f76e2db4c07cb632c4586c09263c92f8f3666bae3975fdaf6562d39e2dbc5a010a", 0xb7}, {&(0x7f0000000440)="f609a1d4b7d9c9661ec11d5ee1b733ef52c467695c79f941507d7ac150071a5a3df951f3f3aa77f1a9458af7fb779ed50d0c86d779c57094818e743f92a2988da2334ad7690ee77dae8f67b08547bcd310d54b627f7ecda0e9c17b8d871588d8e1d9371eaba754a2da1113905f19e6d2e36803e87ce15b5e1472a299fdd93072a0723abc28382d6cbbb4495e7fd7228388a0b472712db91e4d534a503ee389b4cc561c040dccae7f6675320dc7435caff0214be16545d1a9a04c6e9305e496ac6a538d37ab867f5f5d", 0xc9}, {&(0x7f0000000540)="c9cdd1b21723676f531eeb4eade07dd914889bfe593ce59300603d14d3fb2e35a2d49f42df59cc824fedb39e3a0e069247d984dae1e64c480ccb1719e47243e15bc6dea1900a795b853e2a9d6271326e73c879d96558247fd6cd50f8c9f92832a543e32ba3fac94854c8beb34c8a2cd11ea4e3cb3b4da95442ebe33486af674b10cb4e46e9e14e7fe4760eea6519d494c85b96ddafefce68b4a21408bfc9cf937370c616d8ad282788aaebeb6b54f3939c245459b189618d52f0843e4257c36dec89f99f3fdefebe8e34bf52613d84bf12024c46d472253f2a3ba35226891aef9e17798524", 0xe5}, {&(0x7f0000000640)="6cba09156291305e2f5921756ee2aa02b19edf4bfa3753485a89b745de930d3f0f820912c5834c906b814cc5a8489849354ba3e2d207a88428781f9decd9bcf360d74b406d5b31cd54639e1314bcc8269147ce8a3c8137f5a5d3af5dcdb4ae60a9", 0x61}, {&(0x7f00000006c0)="46a64a234529e3b919dd0256672cf74fdc3bd1eac83d", 0x16}, {&(0x7f0000000700)="1bc4092b9acacfba1f7f20a1d3f8a4a8592c8da0c0d1e4f0de821f3789521d4038fc0eb7158911f1e1b0725f8495454f8ab50558aedc2cac8378b64bfb4be8a117592be2ade364863a8b209b8ecb04102aa11cd2009c9431f64cef0b3bfa61653761db52c38406cdb697560f85169bd289b568cd76b26de1c8ed0906cfd65d1b1fd5a5bdf7dc8d14a217a10526ef5b5e5c57b709c05de32676219078162c05dd72cb27e30cfcf3be9cd051228bfb58b8185035773ceec5c70ee1cb678d04d4665cbb0977ee6a", 0xc6}], 0x6, &(0x7f0000000880)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x7ff}}], 0x30}}, {{&(0x7f00000008c0)=@pptp={0x18, 0x2, {0x3, @empty}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000940)="62f16ed7ab153dd93b7f1ab15aeb5ae728131708038b14f017dcfbdc814c5575537ba4305a15e572643ca62fabafc46a69ae9dcbe95522f44015d7fe75db7c7a535f0bf3f771caf8bc6334038c8009d9ce2f6d8334c20c383d262650c9e53a44834b3f9ddef1eb7ec5d5b041", 0x6c}, {&(0x7f00000009c0)="f933a5ad5eae6d30647fba6efed972f5e490b3e81e5dc76b93ee0735ae0e8ca3c636f70bb53401a8225ecb007c21089a", 0x30}], 0x2, &(0x7f0000000a40)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x100000000}}], 0x78}}, {{&(0x7f0000000ac0)=@in6={0xa, 0x4e22, 0xaea, @mcast1}, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000b40)="3a37b6d7de6a368e4f034bcdf3ceb3d4d9478b9ce5451a41917b500cf6fee2375124ff694985c924b942", 0x2a}, {&(0x7f0000000b80)="5232268172e0624fcc4baeeba62bf46fc691815eaebe99fbdcf13bd99a5593f7953ddc844474ca81a119354eacd9de3d5e9201287fec9e109bb5a91cf9fcb7a98593542a93c69c6dc448de9b8c2bec169da81a31e8b2ed29bd93e47614cd5708361cf63f0352204d673bd3277b6fc9ba28cbb99bcc05cfc2cac30260cdddcf0f035c2362c82b6613b5b575a4c7a17cfff4e60b476dab1c43b9", 0x99}, {&(0x7f0000000c40)="ec66a7602cb7a31b8b31276148bb090d9a006da8b2b0864e9ca6156a372a3786d6e104d119ddd04df2aaa356e1fd88debf850914f9ae2dd415f01a51e19b6e18f5e3d81842f1b7fdc4ed1ea5541ca47018f054d4c2a410f0f81c305add21a7553492f2121dee3d96ad7cb6720ae2ad4a30647775af7e3804f33d07465bc83f6c87777c16fbc2ea3977fef31137cbb702e77b20fa859a1143e1ff7e416f0c0a6b6b04c147f08b7ef5305db65f1ff36760bb63f5c85a98228a8a32f409d0b5b6b546a268c6521dc3cb8bd40cd552d1aaed79a0e2481f1218d3c14fa895a1e3df038290553c1e6571e8", 0xe8}, {&(0x7f0000000d40)="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", 0x1000}, {&(0x7f0000001d40)="a7b3f1c0554b3f7c28", 0x9}, {&(0x7f0000001d80)="7712c51e9065c54816446e3437e677dce4dd038244e8fcb9c25761888ab475492f361a1c66892505d5254c6cd03df539b11cce01340677bdb7acdce9c84f440a8c957592879ffdd32f96265aa178996825ea80f3f3fb1a3b473a9afda404f5d029673ecc6838b6b4bfbcc99a4755718b242803e26843536d1787ba64fb50613462c4e21a9d51b0e69f79dfe600215589d59f0d37bf98e327894c4e30407d1b3ad408170bf5420574f1858c824465d85d15bccfecfc9f7f5366e38d58ec8df25de0a9364f467ae3ef0dc87466380567c9d9cc3c30f78e81", 0xd7}], 0x6, &(0x7f0000001f00)=[@timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x10000}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x48}}], 0x3, 0x4000) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x64, r4, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @remote}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1={0xff, 0x0}}, @L2TP_ATTR_UDP_SPORT={0x6}]}, 0x64}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x4, 0x0, 0x25dfdbfe, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x4}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xff}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4014}, 0x805) 08:42:29 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:29 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3e", 0xef}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0xff}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:31 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:32 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000280)=0x2) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_SB_PORT_POOL_SET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x54, r2, 0x400, 0x70bd28, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x2}, {0x6, 0x11, 0x9}, {0x8, 0x15, 0x6}}]}, 0x54}, 0x1, 0x0, 0x0, 0x81}, 0x2000094) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) 08:42:32 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(r1, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:33 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:34 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x3) 08:42:34 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0700000000000084"]) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0xc0100, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000300)={0x0, @bt={0x4, 0x4, 0x1, 0x3, 0x9, 0x6f3d, 0x7, 0x3, 0x0, 0x9, 0xffffffff, 0xaba, 0x3ff, 0xb79d, 0xc, 0x0, {0x2000, 0x4f}, 0x1, 0x7}}) chdir(&(0x7f0000000040)='./bus\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) listen(r2, 0x7) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000440)="5ecd2ac742a04ec5bbc1fcf983c36c983045d0107cecbd79587d68af1144448b4fff3696eb4d3cd86043e517896c00e46827e19cc874f274da4421de816bb69edc2b2323b579a8320e5e981b25a0ae7e57d1414e245ca772cb88112473aba42b264b9bf0fcea08f65d7a44ca4580f9dbba7ef6648b99a8ca52c7cf4d4070af432f5ef329576d146da7f30c", 0x8b, 0x1) getxattr(&(0x7f0000000100)='./bus\x00', &(0x7f0000000140)=@known='trusted.overlay.nlink\x00', &(0x7f0000000200)=""/27, 0x1b) 08:42:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1101.772768][ T1223] tmpfs: Unknown parameter '' 08:42:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1101.850835][ T1223] Unknown ioctl -1065068969 08:42:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:34 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3) [ 1102.104735][ T1223] tmpfs: Unknown parameter '' 08:42:34 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="68030040000005000000000000001e9a7003e3d1d6dc81000000b33318b6477174ce5e6f6d13acc7caaf30edbd5f3bb02a4b386b2c37ab425dac385e3290fc49fa01ed7a828d20dbf5212e0aab854d5c939456fdc4333f5ef1a55bdad40a8ad3a1b68d93d129a386f9341f51abd96934b68faac593823b95a166d8df215d400d7491b2ea2c00d133d655c4b8c941b61d19e2df784c7a5fefc6fd60476e374a99200328a203192a644831b64ac964da1f4e72d3444e28b6c9"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) [ 1102.348053][ T1260] tmpfs: Unknown parameter 'h' [ 1102.588365][ T1260] tmpfs: Unknown parameter 'h' 08:42:35 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000300)={'filter\x00', 0x0, 0x4, 0x2c, [], 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/44}, &(0x7f0000000200)=0x78) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:42:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:36 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3) 08:42:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:36 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = accept4$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0x80000) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) 08:42:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:37 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x3) 08:42:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:38 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x3) 08:42:38 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x3) 08:42:39 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x3) 08:42:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:39 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec4848", 0x14, 0x3) 08:42:39 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)={'syz1', "791ce77bf1906bf6117127ab09f6844101fc07ca4ee9d10483e0"}, 0x1e) 08:42:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:40 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0x9f0000, 0xfffffd54, 0x76, r2, 0x0, &(0x7f0000000100)={0x98091b, 0x80, [], @string=&(0x7f00000000c0)}}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280)='ethtool\x00') sendmsg$ETHTOOL_MSG_COALESCE_SET(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x5c, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x1641}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES_IRQ={0x8, 0x5, 0xfffffffd}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x7fff}, @ETHTOOL_A_COALESCE_RX_MAX_FRAMES_HIGH={0x8, 0x14, 0xd9e}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_LOW={0x8, 0x11, 0x3}, @ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x9}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_RX={0x5}, @ETHTOOL_A_COALESCE_USE_ADAPTIVE_RX={0x5, 0xb, 0x1}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES_HIGH={0x8, 0x16, 0x6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0xc0) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r5, &(0x7f0000000280), 0x0, 0x3) 08:42:42 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec4848", 0x14, 0x3) 08:42:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:43 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:43 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="687535c562872fde67653d730000000000"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) [ 1111.077634][ T1470] tmpfs: Unknown parameter 'hu5Åb‡/Þge' 08:42:43 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec4848", 0x14, 0x3) 08:42:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1111.269103][ T1470] tmpfs: Unknown parameter 'hu5Åb‡/Þge' 08:42:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:44 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000000c0)=0x2, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:42:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:42:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:42:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:42:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:46 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a", 0x1e, 0x3) 08:42:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:46 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f00000014c0)={0x1, 0x70, 0x0, 0x0, 0x88, 0x0, 0x0, 0x41c1, 0x2140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8004, 0xc17}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_virtio(&(0x7f0000000140)='syz\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000280)='9p\x00', 0x4880, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d7669727469040000000000000010e82c736d61636b6673666c6f6f723ded3665762f76637375002c66736d616769633d3078303030303030303030303030303030342c6d6561737572652c7569643d", @ANYRESDEC=0xee01, @ANYBLOB="2c64756e633d46494c455f434845434b2c7375626a5f747993653d6b2b0000000000000000"]) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00ea"], 0x2, 0x2) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(0xffffffffffffffff, 0x40206417, &(0x7f00000003c0)={0x2, 0x200, 0x5, 0x0, 0xd, 0x7}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = add_key$keyring(&(0x7f0000001440)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r3, r2, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000001480)={r3, 0x16, 0x1000}, 0x0, &(0x7f0000000100)="0b0f998492e6389cd7f25193f7670a371c5851166979", &(0x7f0000000440)=""/4096) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:42:46 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:46 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a", 0x1e, 0x3) 08:42:46 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1114.242745][ T1586] ptrace attach of "/root/syz-executor.1"[1585] was attempted by "/root/syz-executor.1"[1586] 08:42:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:48 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000100)=@sha1={0x1, "0d39f862c07abefbbd88569b38e065cb277e6869"}, 0x15, 0x1) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r3, 0x0, 0xaf}}}, 0x78) r4 = getgid() mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x2288c24, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x3a9cc7b1}}, {@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0x600}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}, {@obj_user={'obj_user', 0x3d, 'cgroup.controllers\x00'}}]}}) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r5, &(0x7f0000000280), 0x0, 0x3) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x70000, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', r6}, 0x10) 08:42:48 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1116.258278][ T1606] ptrace attach of "/root/syz-executor.1"[1605] was attempted by "/root/syz-executor.1"[1606] 08:42:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:49 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a", 0x1e, 0x3) 08:42:49 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1116.906469][ T1619] ptrace attach of "/root/syz-executor.1"[1618] was attempted by "/root/syz-executor.1"[1619] 08:42:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:49 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:49 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246d", 0x23, 0x3) 08:42:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:51 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="ff77"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:52 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246d", 0x23, 0x3) 08:42:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:52 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:52 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$IPSET_CMD_RENAME(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x5, 0x6, 0x101, 0x0, 0x0, {0xa, 0x0, 0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x40) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:42:52 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:53 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246d", 0x23, 0x3) 08:42:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:54 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328", 0x25, 0x3) 08:42:55 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x200010, &(0x7f00000000c0)=ANY=[@ANYRESOCT]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = socket$isdn(0x22, 0x3, 0x0) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f0000000100)='wg1\x00', 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = dup(r3) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) socket(0x8, 0xc, 0x1000) [ 1122.605026][ T1789] tmpfs: Unknown parameter '01777777777777777777777' [ 1122.771841][ T1789] tmpfs: Unknown parameter '01777777777777777777777' 08:42:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:55 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328", 0x25, 0x3) 08:42:55 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x102, 0x110) ioctl$NBD_SET_TIMEOUT(r2, 0xab09, 0x3) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:42:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:55 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:56 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328", 0x25, 0x3) 08:42:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:59 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="685567653d616c25917916"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="b909"], 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./bus\x00', 0x6, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:42:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:59 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd32816", 0x26, 0x3) 08:42:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1126.625725][ T1867] tmpfs: Unknown parameter 'hUge' 08:42:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:42:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1127.003210][ T1867] tmpfs: Unknown parameter 'hUge' 08:43:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:01 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="6861052b32a51d0261268cc1797368bbea5065321b213d176e59015961d4e3f32c65c12aaca397fd3eba1c07c7fe4db7459be060e15cfbd7db48b8374863f6db8405ebe1d20a8e5d6e16a1c76d64d4051006be2f1deeb1a7cfe8b4647cc14cd6c6cfbbcb86f47268c0022a07769912e15af5846a4a509dcf4ab5277384870fb298ddfad8f5788706227ee040b55d3ce79f721e7a80119e35148f214fd943e5623e74219cfbb8d5e9ea2accbac400a6b0693382c6844f201cc7d7c214622221bd301d7c961f6046c312089a80648cb9e11b1fed344e5397f3c2"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x62279e8f, 0x9}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0433"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getpeername$l2tp6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000280)=0x20) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) r3 = dup(0xffffffffffffffff) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r4, 0xc0104320, &(0x7f0000000140)={0x9, &(0x7f0000000300)="48aa6a8a37aace55f0313d16c7c374a7f6a5f2d6bb99292102640625046008beba9fd06de6debb61887c9ac5a63503c35e789d708b7e62ec01f42538627e2fd613fda470f166bdfd4de07ae3e9e3d12b0809b44ee658ad737b919a6218d2314dcac1b2ce5a53593928528de829d593a7324b3a264b0630d1b31018ca9e597e764449e21fc84ec78a537db8d175c947606a660fd98d0151cf2d6005d8886a12a2a0780293b81a6d20b41377fded7ed3"}) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f0000000000)=""/21, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000000c0)) 08:43:01 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd32816", 0x26, 0x3) [ 1128.661895][ T1912] tmpfs: Unknown parameter 'ha+2¥a&ŒÁysh»êPe2!' [ 1128.766038][ T1912] tmpfs: Unknown parameter 'ha+2¥a&ŒÁysh»êPe2!' 08:43:01 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="68757d068503000000684ce8af6b5033e40c0e42a7e497c77d000000000000000000"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="4564fe9a3c6ae2e339a6994bdd0000000000000c00000000000000004b0a3310c60469bbd64341e8d80063944fdbf77bac6823c64c4fa6e4f894f12c6c797ec3c5e08f0bb4801e4b51004e9f5f4c8709e3d84fd8812c9aa08a859da979f48f8123904b67b18ef67bc28ff1b8d078b52da6c5a8ff4fce14da4ced92fc373174347ee33f"], 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000300)={0x7e, "d38c074a2bf8d8377c9a3eb08d9104a2dfe99f1919edcd1ab549c60d6192bc3f82a1314345c4c21ffd6090312c9bf7eaaa80e8e53ef169a338a6d731bc1e4d2fc1322cb2524e09d0a0095cac1b8050157d1881144359df6a8f585aed386017fc34886811904c114a8867c2cf2c693b4da2908624e30a1a9f1c073637b7f4"}) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x10, &(0x7f00005c6000)=""/6, 0x0) pidfd_getfd(r2, r1, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) [ 1128.958370][ T1931] tmpfs: Unknown parameter 'hu}…' 08:43:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:02 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x129000, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000100)={0x0, 0x4}) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:02 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd32816", 0x26, 0x3) 08:43:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:02 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x0) 08:43:03 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x0) 08:43:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:04 executing program 2: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280)="5f77344224c28cdfa48313205e94f83bdaec48480ce48e6a2d356c32a32a72539f246dd328166f", 0x27, 0x0) 08:43:04 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f00000000c0)={0xffffffffffffffff, 0x3, 0xe2d4, 0x3, 0x9}) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:04 executing program 2: r0 = memfd_create(&(0x7f00000002c0)='7q\x00\x00\x00\x00\x00N\x00\x00\x00\x00\x03\x00'/23, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r5 = socket(0x10, 0x80002, 0x0) r6 = dup3(r4, r5, 0x0) setsockopt(0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000300), 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8983, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0x2}) r7 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x4240a543) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r3, 0x0, 0x810ee0f, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x519000, 0x0, 0x2012, r0, 0x0) 08:43:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1132.557712][ T2030] splice write not supported for file /net/tun (pid: 2030 comm: syz-executor.2) 08:43:05 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, r2, 0x0, 0xaf}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r4, 0x0, 0xaf}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, r6, 0x0, 0xaf}}}, 0x78) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='fuseblk\x00', 0x20000, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x8}}, {@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0xf9e}}], [{@dont_appraise='dont_appraise'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@fowner_gt={'fowner>', r5}}]}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02090000000000000035d664d014fcb716ed6d14368d59a883882000d3f372d4000372fa83d4ad268452dd935733586a9296347235f4c691bc187d1c261e933a53dc001f3d7653e97aff517391cac68bb21f96412b155fe411090000000143686f9d630e7919dfc05f7b1d0e6335aef52e130c0aaa6ebfcb61f694bb6703ba7340755e2e68bef5bc70bbe7907524aea6b5b4535bf06a74d96b94994f12eded7b"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r7 = dup(0xffffffffffffffff) getsockopt$netlink(r7, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r7, &(0x7f0000000280), 0x0, 0x3) 08:43:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:43:06 executing program 2: 08:43:06 executing program 2: 08:43:06 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6875020000006c77617953"]) chdir(&(0x7f00000000c0)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(0xffffffffffffffff, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="b03d4c4268330ab7e33dabb9ca00000000000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x6c, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={r4, @in={{0x2, 0x4e24, @remote}}, 0x8001, 0x4}, &(0x7f0000000200)=0x90) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:06 executing program 2: [ 1133.912220][ T2070] tmpfs: Unknown parameter 'hu' [ 1134.096322][ T2070] tmpfs: Unknown parameter 'hu' 08:43:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:07 executing program 2: 08:43:07 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(0xffffffffffffffff, 0xc01064c7, &(0x7f0000001400)={0x5, 0x0, &(0x7f00000013c0)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xf1a}, 0x2c) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000001440)={&(0x7f0000001380)=[0x1, 0x800, 0x20, 0x6, 0x2, 0x908, 0x400, 0x401, 0x0], 0x9, 0x0, r3, r4}) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x7ff], 0x1, 0x80000, r3, r5}) 08:43:07 executing program 2: 08:43:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:08 executing program 2: 08:43:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:08 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000100)) 08:43:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:43:08 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b700000001000000bfa30000000000000703000020feffff720af0fff8ffffff71a4f0ff000000003f040000000000004e400500000000004704000001ed00007b130000000000001d440000000000007a0a00fe00ffffffdb03000000000000b5000000000000009500000000000000023bc065b7a379d17cf9333379fc9e94af69912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c5181554a090f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5e69048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03fb8a63e089679216da18ec0ae564162a27afea62d84f3a10746443d64364f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d710b651f898ba749e40bc6980fe78683ac5c0c31030699ddd71063be9261b2e1aab1675b34a220488c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe0e669e51731b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed82641687f3b3a70bfe9b4a9c5a90ff59d54d1f92ecb3e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24c87afce829ba0f85da6d888f18ea40ab959f6074ab2a4009b9e5f07ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0cbe02b6e4114f244a9bf93f04beb72f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188881bd2a3b1832371fe5bc621426d1ed0a4a9b702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b728fe26e37037f27feeb744ddcc536cbae315c7d951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3adbfd03aac93df8866fb010aec0e92bed19d15e1bf9d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91114a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293986e02c8e0a6dda1eca493f1479531dd8826fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a8784d0899ed888141e2fae6691d1aee1da02ba516467df3e7d1daac19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9f912dac77cdbced138d2ae29e77c7c64affa54fec01a8aa7749f3187e9efbd2ebf5f81f3313502b4e43cb5cfe637d5daa1cc7210aeb5d"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:08 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$tun(r0, &(0x7f0000001980)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a5c268", 0x129a, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x19, "e5fb000005005357cd99e33bca98e246dc9027eb3334ea443e7fdc4049b892d54090878bee496aa11e07fb0f1db1a0ebe2f95347b0317613063381165c01f08fea1048ea59a6f2273e02707fdd7defc02bde3192360593169594710bddd04aead6c89c87778555de42d23236534ba1a799a63eb4532003a703b249e4628e4706bccc7a264ee85014d99a7fd4565d3c416c835a741eb4e97140e834013724d23450072f0087ac65295ca0d7c601c30de0161560e2d20c5b1052e9b208e25470e9fa884ecd2082ec38b3cb19c083"}, {0x0, 0x1b, "14a142ef59c04e8e7b4db5309006bd98ec79847a52ed68124e8a24d3079fc53b81c039a7d59f992dcb481043f510a0ce1ebb98c07a624ff8c8cc0b4fd3b8e700196d1f5696e184393de669ffaebfbd494a9d6a5fedac0738ffc3dcb3c1b96e48fd063786ae5701f6aa5022621e665607848e20f162630df96d0a773993e97ae6b847e51883d73d66bb30b4375229cfd0c9c41f511bfbf2bca94caa7ce76be257173a4eae2b484117ac32acf6ea1a32def26c919c93055c2f9a640b2d847d527357902538828abd66b3d1a9b85034066154f0b2ec054f6a8712ec98e5"}, {0x0, 0x1f, "8cf0833ae2772f05d302c778833be4f2b9c43c83284b82e71ca1ee382af46513079a2f52da08c93afdfc1a18e4b677b307a1c7df90787cbd143b129bc8dbc39104eb21674d26fd4ced8626df256869e168d42f4d160ad1442cae2bd8fda0fc44a08759d245bfe8eba42ec7967c1e953256a057369159333bca73b498a882fb5e840d429804169a6446c1d1b013144ae0ee276a463ef69ea4c4636751083041811c9b549256c6a3a71e451f8fd4de25629b3de61cba78315412fa14e350bb03feaf63909bd7320561df80bc77f36d4561a5efcc324450355ed398d9e46e798e23e2a4a2c787728b9c549a1894c53dcdfe834c7785fb3c4331"}, {0x0, 0x3, "6598975984c98199c07565e33783bc472344c2fc4e6a32"}, {0x0, 0x1f8, "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"}, {0x0, 0x1, "c3dc73ee7617643a"}]}}}}}, 0x12cc) 08:43:09 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$tun(r0, &(0x7f0000001980)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a5c268", 0x129a, 0x3a, 0xff, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x19, 0x19, "e5fb000005005357cd99e33bca98e246dc9027eb3334ea443e7fdc4049b892d54090878bee496aa11e07fb0f1db1a0ebe2f95347b0317613063381165c01f08fea1048ea59a6f2273e02707fdd7defc02bde3192360593169594710bddd04aead6c89c87778555de42d23236534ba1a799a63eb4532003a703b249e4628e4706bccc7a264ee85014d99a7fd4565d3c416c835a741eb4e97140e834013724d23450072f0087ac65295ca0d7c601c30de0161560e2d20c5b1052e9b208e25470e9fa884ecd2082ec38b3cb19c083"}, {0x0, 0x1b, "14a142ef59c04e8e7b4db5309006bd98ec79847a52ed68124e8a24d3079fc53b81c039a7d59f992dcb481043f510a0ce1ebb98c07a624ff8c8cc0b4fd3b8e700196d1f5696e184393de669ffaebfbd494a9d6a5fedac0738ffc3dcb3c1b96e48fd063786ae5701f6aa5022621e665607848e20f162630df96d0a773993e97ae6b847e51883d73d66bb30b4375229cfd0c9c41f511bfbf2bca94caa7ce76be257173a4eae2b484117ac32acf6ea1a32def26c919c93055c2f9a640b2d847d527357902538828abd66b3d1a9b85034066154f0b2ec054f6a8712ec98e5"}, {0x0, 0x1f, "8cf0833ae2772f05d302c778833be4f2b9c43c83284b82e71ca1ee382af46513079a2f52da08c93afdfc1a18e4b677b307a1c7df90787cbd143b129bc8dbc39104eb21674d26fd4ced8626df256869e168d42f4d160ad1442cae2bd8fda0fc44a08759d245bfe8eba42ec7967c1e953256a057369159333bca73b498a882fb5e840d429804169a6446c1d1b013144ae0ee276a463ef69ea4c4636751083041811c9b549256c6a3a71e451f8fd4de25629b3de61cba78315412fa14e350bb03feaf63909bd7320561df80bc77f36d4561a5efcc324450355ed398d9e46e798e23e2a4a2c787728b9c549a1894c53dcdfe834c7785fb3c4331"}, {0x0, 0x3, "6598975984c98199c07565e33783bc472344c2fc4e6a32"}, {0x0, 0x1f8, "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"}, {0x0, 0x1, "c3dc73ee7617643a"}]}}}}}, 0x12cc) 08:43:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:10 executing program 2: readv(0xffffffffffffffff, &(0x7f00000021c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001fc, 0x59, 0x0) 08:43:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:10 executing program 2: clone(0x13122001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:43:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) dup3(r2, r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0xfffffffb, 0x0, 0x0, 0x0, "dba7bbdd471e380609c672ebf7f17091e7a3f0"}) write$P9_RATTACH(r0, &(0x7f00000001c0)={0xd}, 0xffffffde) 08:43:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:11 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x200000b, 0x80010, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000200)={&(0x7f00000000c0)="a83d58dc3d1d60", &(0x7f0000000100)=""/63, &(0x7f0000000140)="bd6d2c", &(0x7f0000000300)="7a7f2888083ce93ff35b5c7abe2a2f4fbc11ee9f278f9d1ecb2c4709c48eabda68895896b4a1e2d1d28942571146f78b232a68d7b9a11ad1e2b0148c88dc3681ba029a5199f357201df0f93939b4", 0xbf9, r1}, 0x38) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:43:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:12 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) r1 = socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r1, 0x8008f513, &(0x7f00000000c0)) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)) 08:43:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCGETS(r1, 0x5405, 0x0) 08:43:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:14 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000100)=@ng={0x4, 0x5, "b4f0e5499825df9d16481a1ea5"}, 0xf, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, &(0x7f00000000c0)) 08:43:14 executing program 2: sendmsg$NLBL_CIPSOV4_C_ADD(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) futex(&(0x7f0000000140), 0x5, 0x0, 0x0, &(0x7f0000000040), 0xfffffffe) syz_open_procfs(0xffffffffffffffff, 0x0) 08:43:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:43:14 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x8, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) [ 1142.202297][ T2270] futex_wake_op: syz-executor.2 tries to shift op by -1; fix this program [ 1142.234176][ T2271] futex_wake_op: syz-executor.2 tries to shift op by -1; fix this program 08:43:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) ioctl$TCGETS(r1, 0x5415, 0x0) 08:43:15 executing program 2: pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) creat(0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(r0, &(0x7f0000000240)={0x63, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7, 'vxcan1\x00', 0x7, 'vxcan1\x00', 0x0, '', 0x6, '@:@%@$'}, 0x7, 'vxcan1\x00'}}, 0x63) 08:43:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:15 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x7}) 08:43:15 executing program 2: pipe2$9p(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000000080)=0xf0, 0x4) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[], 0xff70) write$P9_RSTATu(r0, &(0x7f0000000240)={0x63, 0x7d, 0x0, {{0x0, 0x47, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x7, 'vxcan1\x00', 0x7, 'vxcan1\x00', 0x0, '', 0x6, '@:@%@$'}, 0x7, 'vxcan1\x00'}}, 0x63) r3 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = open(&(0x7f0000001840)='./bus\x00', 0x84002, 0x0) sendfile(r3, r4, 0x0, 0x8400f7fffff8) [ 1142.995365][ T27] audit: type=1800 audit(1595839395.562:48): pid=2302 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=16334 res=0 errno=0 08:43:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/dev_snmp6\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000002) dup3(r2, r0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0xfffffffb, 0x0, 0x0, 0x0, "dba7bbdd471e380609c672ebf7f17091e7a3f0"}) write$P9_RATTACH(r0, &(0x7f00000001c0)={0x14, 0x69, 0x0, {0x0, 0x0, 0xa00}}, 0xffffffde) 08:43:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:17 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="687567653d616c77807973"]) chdir(&(0x7f0000000040)='./bus\x00') clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f00000004c0)={{r0, r1/1000+10000}, {0x77359400}}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) recvmsg$can_j1939(r3, &(0x7f0000000280)={&(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/5, 0x5}, {&(0x7f0000000300)=""/238, 0xee}], 0x2}, 0x2022) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x80000) socket$inet6(0xa, 0x0, 0x0) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) r5 = dup(0xffffffffffffffff) getsockopt$netlink(r5, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) syz_kvm_setup_cpu$x86(r2, r5, &(0x7f0000187000/0x18000)=nil, &(0x7f0000000580)=[@text16={0x10, &(0x7f0000000500)="66b9fe03000066b86d00000066ba000000000f30ba4100ec2e67f30f53a7a87a95dd3ef20f7de72e36660f32650fc7aa6e9366b9f002000066b80050000066ba000000000f30ea00209100baf80c66b8dc68ee8966efbafc0ced0f06", 0x5c}], 0x1, 0x41, &(0x7f00000005c0)=[@efer={0x2, 0x8000}], 0x1) 08:43:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:43:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1145.301916][ T2327] tmpfs: Bad value for 'huge' 08:43:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1145.525057][ T2327] tmpfs: Bad value for 'huge' 08:43:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:18 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="687567653d616c77617973af21c8922fd8ffa64404b8ba01287d6b583a"]) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x300, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000140)=0x4, 0x4) chdir(&(0x7f0000000040)='./bus\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) ioctl$SNDCTL_DSP_GETCAPS(r2, 0x8004500f, &(0x7f00000000c0)) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) 08:43:18 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400f7fffff8) [ 1145.785185][ T2361] tmpfs: Bad value for 'huge' [ 1145.831972][ T27] audit: type=1804 audit(1595839398.403:49): pid=2366 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir003754430/syzkaller.YFwHam/603/bus" dev="sda1" ino=16180 res=1 errno=0 [ 1145.926346][ T27] audit: type=1804 audit(1595839398.443:50): pid=2368 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir003754430/syzkaller.YFwHam/603/bus" dev="sda1" ino=16180 res=1 errno=0 [ 1146.001740][ T2361] tmpfs: Bad value for 'huge' 08:43:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:20 executing program 2: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/155, 0x9b) 08:43:20 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999c3", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:43:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f00000000c0)='\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_usb_connect(0x0, 0x24, &(0x7f0000000200)={{0x12, 0x1, 0x201, 0x76, 0x12, 0x66, 0x40, 0x547, 0x80, 0xe256, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4, 0x59, 0x8c}}]}}]}}, &(0x7f0000000900)={0x0, 0x0, 0x89, &(0x7f00000006c0)={0x5, 0xf, 0x89, 0x1, [@generic={0x84, 0x10, 0xa, "e07df3b71643874e62dc6bffef06cfe3297554f069cef8ce9b7855e8df9ae33d12bb88a960941c0260375356bae7cae704a7437758d12d14852e67cbcd29fe9d90e5cdb98c0af9b18d4d28dc65410990337fa4b0a8efc65ebbbaf1787caa55d66f82f5501fc26688c1359a5f682bc9f48bb3660a7f2669c0c8c341c94575050bb5"}]}}) 08:43:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1148.618252][T29835] usb 3-1: new high-speed USB device number 5 using dummy_hcd 08:43:21 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r3, 0x0, 0xaf}}}, 0x78) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x1002, &(0x7f0000000300)={[{@index_on='index=on'}], [{@fowner_lt={'fowner<', r2}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}) 08:43:21 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x4000010, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) [ 1149.217452][T29835] usb 3-1: New USB device found, idVendor=0547, idProduct=0080, bcdDevice=e2.56 [ 1149.226513][T29835] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1149.244012][T29835] usb 3-1: Product: syz [ 1149.249512][T29835] usb 3-1: Manufacturer: syz [ 1149.254266][T29835] usb 3-1: SerialNumber: syz [ 1149.268033][T29835] usb 3-1: config 0 descriptor?? 08:43:21 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff434, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x1, 0x0, 0x3, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) [ 1149.510387][T11095] usb 3-1: USB disconnect, device number 5 08:43:22 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4902465c51260675b1a7008f21ec758b9793cb8651f32db1e8f13a83f8116105b1bf006c7bd501f643a1bcd3ce9a5f9c5f4b9120e7a9b789facafba43d8be8860ede440ce26b7baff719cdd2bf2eddfb030000e330827c00001a7125e939a646b60d26172aead6af6050fceaf50c92c389e6caaae5d59fdb32a8646670915a25a0962ccd45d57ed6217c6d7eac4d"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4024c, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x84, 0x0, 0x0, 0x8, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) prctl$PR_SVE_SET_VL(0x32, 0x286f0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:22 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541e, 0x0) [ 1150.025376][ T2485] tmpfs: Unknown parameter 'IF\Q&u±§' [ 1150.226714][ T2485] tmpfs: Unknown parameter 'IF\Q&u±§' 08:43:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0xfffffff7}) 08:43:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:43:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x9, &(0x7f00005c6000)=""/6, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x10000, 0x9, 0xffffffff, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x9a, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, @perf_bp={0x0}, 0x40000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f00000000c0)={0x5, 0x20, [0xfffe0, 0x4, 0x1, 0xfffffffe, 0x2f1d, 0x9, 0xfffffffc, 0x9]}) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) lstat(&(0x7f0000000280)='./bus\x00', &(0x7f0000000300)) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) 08:43:23 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5424, 0x0) 08:43:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:24 executing program 2: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4207, r0) [ 1151.527894][ T2537] ptrace attach of "/root/syz-executor.2"[2536] was attempted by "/root/syz-executor.2"[2537] 08:43:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080), 0x4) add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x8, 0x0) getsockopt$packet_int(r0, 0x107, 0x12, 0x0, &(0x7f0000000000)) 08:43:24 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5417, 0x0) 08:43:24 executing program 2: keyctl$chown(0x6, 0x0, 0x0, 0x0) 08:43:24 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') socket$pptp(0x18, 0x1, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$PNPIPE_ENCAP(r1, 0x113, 0x1, &(0x7f00000000c0)=0x1, 0x4) r2 = dup(0xffffffffffffffff) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000018c0)=""/21, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f0000000280)={0x4, 0x7fff, 0x0, 0x3ff}) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000001840)=ANY=[@ANYBLOB="0277876ac8f6adb83ebcc45015b46e3c68f0a9f7f0a74ea7b31ca6344b173381b052a4a5d457e287225848907c6f7aad027834b860"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f0000000140)='./bus\x00', 0x5, 0x8, &(0x7f0000001780)=[{&(0x7f0000000300)="2f4792c4716f1d39ccfc5bf21d7d545b70dc6c496ee4393f69197f17dcb22eb10712a0f020fcb6cfa89faddb184c1b934acd00ba3c03b9d7291a45522f789eba841496e8f20c041e3e28a8968d89f72205916d8a2a0b01ebe60ce9603635e1992dab3f144d02e7a6758fb87edcdfa782f3ccc3d6cb677e003e74edf4e6c8c4dc9063b9afd311aa6366fac0e7bb1dfb582b09dc37f367a1b23916daa34bc8988b8021b9877cae793dd49966b79af54b75f7a57b07f22e68ff4214fa402c79332296fb47f0c99877e50607785cc02a385a63250aac5531c2fd19bddc486be1d7", 0xdf, 0x807}, {&(0x7f0000000200)='1t', 0x2}, {&(0x7f0000000440)="276e88af9b95522cc9b4230ee473ebc147bcf27c7cb408355cebdd98e5a472b8a6657154966d7ec2252632cec90852dd19e1e5d6588b4d138f35706ba86650e3ff109a1cc8d940c12a2faa68", 0x4c, 0xd778fe6}, {&(0x7f00000004c0)="c39731ababfa56dabaf050ced464d76685a4de9405bf7681982936890c122ed8c8486491937878f9f071f3d1956479f450a69a9057131f1a6d44057c2479287240ca04f1c2addc0e849fffaff0f7ebb1212aebd6cda9f0216187114d22474bea4ca8b69db007d6a7b35f41cda2b2e9e460afe7470e3b76a71e4c937bec6c86327797059f676cc03529dc5fb1bc2e915737882d0ac0f4ad454787", 0x9a, 0xfff}, {&(0x7f0000000580)="9b1c7987d4c5d6f5faf9e093aa2690eae7c22251f0e302bc97429f225b6c3d7811761bd4844723c00d6f55d7f99ad020abc7ca91569ba79c3dc65114ee96a6e5ddd64fbe10531321fae26599b2256c62578cf487102e4d97451b8db10c4769df381cddc37934773c985c1d0cd2af4d49ae1f8b2a9e6d7e61bfeb0e31", 0x7c, 0x6}, {&(0x7f0000000600)="3053eee2971ac34b7c4757df2517c0457f8a9ae092f088640c18a22cbfe6abeb5eed1b27810936fca243b793f97d8f7c32f1a46d910cb30f351359b8b774cdf0af818febb21d4f0d2d57d3addeeb7f493581e6c8ad43b44927799cde8bc7ee912e", 0x61, 0x5}, {&(0x7f0000000680)="abfa1f6b7ece6444fc23eed9b0715c20948c171f444a051820b6217f7ae369eaf3c5933fb64534a7faa98d4c53a47437b42d10de2ae033371af76beaf4ea0042e13755ac69f14599b2d0cc38ed5985545bdf72f6904be4222eb66148fcce00c36bd2cbde11c7b45fc14666503f306b6268cb27db2b86d0cdb0d4389cd646e0b0e0ddd5fc8ded1d8fc884c0f06ab9141025412e9b2ae294c3fee344d2efb656588df3f9e7ab9026f0b30e6dd0c86e734e998fd68d5091bf26956389aa7bafb861a5ce43d2d727456c462305971a4623f09765dae83ea577e657ece1f43b66708a75bbb8384cbd33447248abc575", 0xed, 0x728b}, {&(0x7f0000000780)="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", 0x1000, 0x7}], 0x204, &(0x7f0000001900)=ANY=[@ANYBLOB="6e6f646f74732c6e6f646f74732c646f74732c6e6f646f74732c646f74732c756d6177fb736b3d30533030303030303030303030303030303030303030322c646f74732c6e04000000732c646f74732c617070726169736599aa"]) [ 1152.483774][ T2563] FAT-fs (loop3): Unrecognized mount option "umawûsk=0S000000000000000000002" or missing value 08:43:26 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:43:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d374", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:27 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, "02"}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x3) 08:43:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:27 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:29 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x101}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:43:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d374", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:30 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./bus\x00', &(0x7f0000000300), 0x6000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bind$qrtr(r1, &(0x7f00000000c0)={0x2a, 0xffffffff, 0x1}, 0xc) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:30 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d374", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:33 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000000c0)={0xa8, @private=0xa010100, 0x4e21, 0x80000000, 'lblc\x00', 0x8, 0x7, 0xc}, 0x2c) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[], 0x41) read(r0, &(0x7f0000000200)=""/231, 0x1000006ce) 08:43:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x8011, r2, 0x0) syz_open_procfs(0x0, &(0x7f0000272000)) 08:43:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, 0x0) 08:43:33 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:33 executing program 0: syz_usb_control_io(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x84, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x20, 0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/if_inet6\x00') sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x14, 0x0, 0x24a0189630bedf9d, 0x0, 0x0, {0xb}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x2c000000) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0xb8832ae65917d0e3, 0x0, 0x25dfdbfc, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) r1 = syz_usb_connect$printer(0x0, 0x36, &(0x7f0000000f40)=ANY=[@ANYBLOB="12010000090040082505a8a40700000000010902240401010000000904000012070103000905010200ffe00000090582021a"], 0x0) syz_usb_control_io(r1, 0x0, &(0x7f0000000740)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) syz_usb_disconnect(r1) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)=ANY=[], 0x0) [ 1161.695824][T29835] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 1161.935636][T29835] usb 1-1: Using ep0 maxpacket: 8 [ 1162.055823][T29835] usb 1-1: config index 0 descriptor too short (expected 1060, got 36) [ 1162.064254][T29835] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1792, setting to 1024 [ 1162.076346][T29835] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1162.086461][T29835] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 26 [ 1162.096523][T29835] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1162.109704][T29835] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.07 [ 1162.118993][T29835] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1162.157245][ T2750] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1162.164224][ T2750] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1162.179882][T29835] hub 1-1:1.0: bad descriptor, ignoring hub [ 1162.186105][T29835] hub: probe of 1-1:1.0 failed with error -5 [ 1162.379963][ T2750] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1162.387455][ T2750] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1162.632669][T29835] usblp 1-1:1.0: usblp0: USB Bidirectional printer dev 5 if 0 alt 0 proto 3 vid 0x0525 pid 0xA4A8 [ 1162.686702][T29835] usb 1-1: USB disconnect, device number 5 [ 1162.702800][T29835] usblp0: removed [ 1163.205573][T29835] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1163.459641][T29835] usb 1-1: Using ep0 maxpacket: 8 [ 1163.595730][T29835] usb 1-1: config index 0 descriptor too short (expected 1060, got 36) [ 1163.604300][T29835] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid maxpacket 1792, setting to 1024 [ 1163.615770][T29835] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 1024 [ 1163.625852][T29835] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 26 [ 1163.635865][T29835] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1163.649023][T29835] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.07 [ 1163.658244][T29835] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1163.686066][ T2750] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1163.693038][ T2750] raw-gadget gadget: fail, usb_ep_enable returned -22 08:43:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c744", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:36 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:36 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) close(r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, r4, r3, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000300)="28e233728f35d77a2956a645b3ec94d0a4d9913d8f4542d03544e70ca48922ab361de0cd6eef0a2cdd80834ea0d6e5fa067fbb5f9c2d9c6197b341cd0427b9639f05a004294d4676175c40d718395efec797114eb499d4318184fc596dce08940c906a3e6f7e8851083234db73b35ccc6d333568fefbc671e0d04ef44af623c529120fba2fcb18c7734d72472308591763f918009d04e0ea537242878a8fbabb1e69f2a46662e91bebe066bdd4643d9e8ffa941eafe68a87f89ee348d4d507215186b52d9b057676ed9344fb42be742c48d508f2919449d9d9c4e9d47c55106d3006f853f8daa415104583416d9f", 0xee, r4) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1163.726291][T29835] hub 1-1:1.0: bad descriptor, ignoring hub [ 1163.732307][T29835] hub: probe of 1-1:1.0 failed with error -5 08:43:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:36 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) [ 1163.945614][T29835] usblp: can't set desired altsetting 0 on interface 0 [ 1164.022458][T29835] usb 1-1: USB disconnect, device number 6 08:43:36 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:36 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:37 executing program 2: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:37 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) [ 1164.725534][T11053] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1164.965562][T11053] usb 1-1: Using ep0 maxpacket: 8 08:43:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1165.065564][T11053] usb 1-1: device descriptor read/all, error -71 [ 1165.190635][ T2790] tmpfs: Bad value for 'huge' 08:43:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c744", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:39 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c, 0x80800) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) getitimer(0x1, &(0x7f00000000c0)) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:43:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:43:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c744", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:43:42 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="687567653d61b89c5eceda"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-ni\x00'}, 0x58) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0277b752352f07d23e9f62853e6dad7895b607c3365705205d1a4f4859c0217a27c17ad2f51b38d5d5f39f000a2d1bf100bc4bf7bc830c2f29975bf1442b99056f5fc14d165513271cd1182a9d304b12b400221ab8d7042890617bd335d1db25c35c118f21cb4580bf8fe66abfb6f4ebe3aaf5278f4a1b0000ced967b9897df664cde80d9d6b9d0021f0210f3ae9"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000240)='bbr\x00', 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x6, 0x2, 0x2, 0xa, 0x2, 0xb46b}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) [ 1169.902244][ T2906] tmpfs: Bad value for 'huge' 08:43:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1170.189067][ T2906] tmpfs: Bad value for 'huge' 08:43:42 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:42 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus/../file0\x00', 0x10080, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x200000, 0x0) setsockopt$ax25_int(r2, 0x101, 0xa, &(0x7f00000005c0)=0x3, 0x4) 08:43:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 08:43:43 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:45 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 08:43:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:45 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/59, 0x3b}], 0x1, 0x2f, 0x0) 08:43:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, 0x0, 0x0, 0x2f, 0x0) 08:43:46 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0277cef050f52769fe4e2940528e91b704f337f5d4e5ff4b7257d80cf265caa82074701f66809aa02840afedfdf79f2709629630917fe8f6a2cd0df0f5963a50ce876616ae0133e9296eef14872ab78c93d8743d2fa05d943dae90d23803c939fced2933a9e2b242cf31ea524c666e6c6e438dbd600f07d9d2115cb7442d5129"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x90180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f000001d080)=""/102400, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, 0x0, 0x0, 0x2f, 0x0) 08:43:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, 0x0, 0x0, 0x2f, 0x0) 08:43:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) 08:43:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0), 0x0, 0x2f, 0x0) 08:43:48 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r3, 0x4008af14, &(0x7f00000000c0)={0x1, 0x7fffffff}) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r4, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r5}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r1, 0x0, 0x1, &(0x7f0000000140)='\x00', r5}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000100)='cgroup.controllers\x00', r6}, 0x30) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:48 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0), 0x0, 0x2f, 0x0) 08:43:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:43:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0), 0x0, 0x2f, 0x0) 08:43:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$packet(0x11, 0x3, 0x300) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x2f, 0x0) 08:43:49 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = fcntl$dupfd(r1, 0x406, r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000002000)={0x194, r4, 0x409, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_PEERS={0x4}, @WGDEVICE_A_PEERS={0x168, 0x8, 0x0, 0x1, [{0xb4, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ALLOWEDIPS={0x54, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g='\x97\\\x9d\x81\xc9\x83\xc8 \x9e\xe7\x81%K\x89\x9f\x8e\xd9%\xae\x9f\t#\xc20xffffffffffffffff}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0xffffffe1, @rand_addr=' \x01\x00', 0x5}], 0x2c) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:43:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:43:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:55 executing program 2: 08:43:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:43:55 executing program 2: 08:43:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:43:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:55 executing program 2: 08:43:55 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(0xffffffffffffffff, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in={0x2, 0x4e20, @empty}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x6c, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x922, 0x8002, 0xfffffffc, 0x2, r3}, 0x10) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r4, &(0x7f0000000280), 0x0, 0x3) 08:43:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbea", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:43:57 executing program 2: 08:43:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:43:57 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:43:57 executing program 2: 08:43:58 executing program 2: 08:43:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:43:58 executing program 2: 08:43:58 executing program 2: 08:43:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:43:58 executing program 2: 08:43:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_TIMEOUT={0x8}]}, 0x24}}, 0x0) 08:44:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbea", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:00 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) dup(0xffffffffffffffff) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 08:44:00 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) getsockopt$ax25_int(r1, 0x101, 0x9, &(0x7f00000000c0), &(0x7f0000000100)=0x4) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:44:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621f12a524795675999", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:44:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:44:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:01 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="39000000130009006900000000000000ab008000200000004600010707000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000180)="390000001000090468fe07002b0000fe0100ee0020000000450001070307001404001800120003000e0400"/57, 0x39}], 0x1) [ 1189.824231][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 1189.867906][ T3309] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1189.891768][ T3309] : renamed from bridge_slave_1 [ 1189.974886][ T3309] A link change request failed with some changes committed already. Interface  may have been left with an inconsistent configuration, please check. [ 1190.028750][T11095] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1190.045058][T11095] bridge0: port 2() entered blocking state [ 1190.051202][T11095] bridge0: port 2() entered forwarding state 08:44:02 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=alway{']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) move_mount(r1, &(0x7f00000000c0)='./bus\x00', r2, &(0x7f0000000100)='./bus\x00', 0x24) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) geteuid() syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000200)='./bus\x00', 0x1, 0x9, &(0x7f0000000980)=[{&(0x7f0000000280)="a3954035bc9beb", 0x7, 0x6}, {&(0x7f00000003c0)="5f616cd808efcacd13", 0x9, 0x8000}, {&(0x7f00000004c0)="bde3a6086f0b979e4b863956eff5aa03581a32e7072507a3f339fb82fb6224091c04e4eb068d56fb5f58705b6ab431a0a59fe1b6efddd46bd716c188757d3f052a3d298bb7026c3156b2eaca1cea65d5001bc4e760e0385578015ce39cbc74c0c0643e8a232112f426b06e6d6b6966e31b5bc7bf4a306712785631582ef26ef559aaeb094fc2b1c23662aae98d9af85a1a84dfc90a8e0fc9061bea8fd0f6bb36dc139b4688ee42a8551c775dae805f2848624ba88fec37d6886f334261b28881f1e3e7258ac1f9bd31c8fe3f9050e3f7badb684df4291d54bbd82e9806ff7b96154c91ab72b6ce4a0b2a344b4d7333cd7250", 0xf2, 0x2}, {&(0x7f00000005c0)="5b0234f097beba621b05f6e4691288e8742aaa1bb1836279e62532d6395eafcb0cb2f944932d14a07fd2beb124ae33a213de88b7606173d079035194880c66d846b5d9dd6d17d18a89045c620362562668c7fe6d88fb006dc646af81d3d75363482ddf733f3d426e29d2", 0x6a, 0x1}, {&(0x7f0000000640)="23639f396dd382f0148efd98ff810283022ad4ca96bea778b79b1b593576ab73932564435873ba11507b99d58514e618e03dd78c6bc330d8265ac0c4d04b0d6af1d9b9a985f50c238b43d571c6a4eae29fc073d6cc6a29a265b2047ce2e46ce868f09180573042cc2e982b75880f6c0958a1c958fecbc13c06c4c5b23e6182a4fd03ec8c7e423f8a03a05ee3e1bce0d913f11778ba017392a5ca44e20bf8a10bdde52d285b3002d24cc99ed08f00fd084ecf58f5d0932880ceab08129017e523b8d7d87957997ecfbe8d03534d592486415a67040810aec0ed80eeadb48d2fcde23dce84aa9278cf29757a48d3d30050e5f17bb8e414ceb5bb187123d9", 0xfd, 0x800}, {&(0x7f0000000740)="11da5e64a5fd8aa9cf755f476cbc3e51bf897d6b8a5df16fdc6c3733ca796a777597568c06f370f6fe21f0d32b8f8081fe7113bcadef8770de03024512d7a72fab91b85fb039c52d2faa27659a7a0dc37f2f449e38fc213411554b06a38e31932973d3cdc47dd3143c9bdad7e6ea2b433a918fdf5b62d733f8faa450fce3dcdd94ccca168dccce28f1529ab93ac89f1a89c7784648b3ff59198f5a721a60da05", 0xa0, 0x3}, {&(0x7f0000000800)="3e3b02bd66671e0b42568d944686d0998e3f8e5932c612d139e01daaecffc3eabeafec22336eeec6e844f0858cd70f7e82a572f97528da559c039da9448c5809b6c11f65a0f731a0b0895d383cfe63bdfd", 0x51, 0x7}, {&(0x7f0000000880), 0x0, 0x400}, {&(0x7f00000008c0)="97e3af0332e4162f5ec2ff0d974711693286d6c0bb3c3542a254118ad263a3a648bada4f0555026ed3d79ab8e32d5b38f46caaecd49855c7317f45eb101038b4505242408880017a680793c2b05e863f2a520ec69f074e8fb494be4137377d23b8138020d0394cd80ce10fef27f9f37f87cfc03f1a3f5de5558b0c28b5e176be4cd8377bdc67a70db5bb268b", 0x8c, 0x10001}], 0x1c00, &(0x7f0000000b40)={[{@dots='dots'}], [{@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x62, 0x61, 0x37, 0x37, 0x34, 0x38, 0x34], 0x2d, [0x31, 0x30, 0x34, 0x32], 0x2d, [0x36, 0x62, 0x30, 0xb9817b7b40b4d9f2], 0x2d, [0x36, 0x39, 0x38, 0x63], 0x2d, [0x65, 0x66, 0x31, 0x62, 0x38, 0x61, 0x38, 0x66]}}}, {@subj_role={'subj_role', 0x3d, 'tmpfs\x00'}}, {@audit='audit'}, {@smackfshat={'smackfshat', 0x3d, '/--*.'}}, {@subj_type={'subj_type', 0x3d, '%$'}}, {@pcr={'pcr', 0x3d, 0x1b}}, {@subj_type={'subj_type'}}, {@uid_gt={'uid>', 0xee01}}]}) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) recvfrom(r2, &(0x7f0000000300)=""/142, 0x8e, 0x100, &(0x7f0000000440)=@pppoe={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, 'ipvlan1\x00'}}, 0x80) 08:44:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1190.295457][ T3324] tmpfs: Bad value for 'huge' [ 1190.393675][ T3308] bridge0: port 2() entered disabled state [ 1190.422373][ T3309] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.458111][ T3309] bridge0: port 2() entered blocking state [ 1190.464320][ T3309] bridge0: port 2() entered forwarding state [ 1190.527070][ T3309] A link change request failed with some changes committed already. Interface  may have been left with an inconsistent configuration, please check. 08:44:03 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="39000000130009006900000000000000ab008000200000004600010707000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000180)="390000001000090468fe07002b0000fe0100ee0020000000450001070307001404001800120003000e0400"/57, 0x39}], 0x1) [ 1190.670700][ T3324] tmpfs: Bad value for 'huge' 08:44:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="39000000130009006900000000000000ab008000200000004600010707000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000180)="390000001000090468fe07002b0000fe0100ee0020000000450001070307001404001800120003000e0400"/57, 0x39}], 0x1) 08:44:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:04 executing program 3: r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x58, r1, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_AF={0x6}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x12}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4c}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x20004080) sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)={0x98, r1, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private2={0xfc, 0x2, [], 0x1}}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x46d4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3f}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x21, 0x10}}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1d}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@private1={0xfc, 0x1, [], 0x1}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x80000) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) [ 1191.613535][ T3362] bridge0: port 2() entered disabled state [ 1191.882133][ T3373] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. 08:44:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) [ 1191.921888][ T3373] A link change request failed with some changes committed already. Interface  may have been left with an inconsistent configuration, please check. [ 1191.976938][T29835] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1191.999073][T29835] bridge0: port 2() entered blocking state [ 1192.005267][T29835] bridge0: port 2() entered forwarding state 08:44:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x5) 08:44:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:04 executing program 2: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000140)="39000000130009006900000000000000ab008000200000004600010707000014190001001000000800005068000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000180)="390000001000090468fe07002b0000fe0100ee0020000000450001070307001404001800120003000e0400"/57, 0x39}], 0x1) [ 1192.723106][ T3393] bridge0: port 2() entered disabled state [ 1192.773721][ T3401] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1192.800917][ T3401] A link change request failed with some changes committed already. Interface  may have been left with an inconsistent configuration, please check. [ 1192.884347][T11053] IPv6: ADDRCONF(NETDEV_CHANGE): : link becomes ready [ 1192.899742][T11053] bridge0: port 2() entered blocking state [ 1192.905892][T11053] bridge0: port 2() entered forwarding state 08:44:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") r1 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4}) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000300)=0x3, 0xfffffed4) r3 = epoll_create(0x2000000000000006) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000200)={0x4}) getsockopt$sock_int(r2, 0x1, 0x21, &(0x7f00000001c0), &(0x7f00000007c0)=0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000340)=0xffffffffffffff2e, 0x0) getsockopt$sock_int(r4, 0x1, 0x2d, &(0x7f0000000180), &(0x7f00000006c0)=0x4) mq_timedsend(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000005c0)="3440792164e3b31be80c2f5094ac7a2951b0244e746a053d411f9adb4f5c273e65367b9b89f4d34796661cd7635a857e1aaa3f1c174ff3528fe3a20ae6eb095aceb259f797959bc9aa878cb271b4edefc1419c87f1f0f35f93744d16846d8c213e3810da0c40f9187510433502e2ab5fa3d5bd9433c5f1662dfb871d25c64c7e30f38a3a96a5259ffd57830695a04dd2d5e7a9efb19633dcbb8a5fe6f699a5291a0f7ccdfa994246b67ae021523da1b545f61e5c67c7a8f2b0d484286de6822f35f1c02a15f197e7be1fd816e2968bc6c6", 0xd1, 0x5, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00', &(0x7f0000000140)='eth\x00\x00Z\xb9\xb0G\xc7\x8c\xd7\x1e\x95@\x95\xd0\xff\xb9=%\x80*\xf1\x8b\xcb\xdf\x01\x00UA\x8a\x01', 0x21, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x179e91c5) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000380)) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000700)={0x9}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x71, 0x0, 0x0, 0x9885, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef1, 0x2, @perf_config_ext={0xf9, 0x14}, 0x20000, 0xfffffffffffffffc, 0xffffffff, 0x0, 0xc84, 0xbfc, 0x400}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 08:44:05 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="687567653d616c77617973070042313afef390bbf3a75e93fb86ceb1a13d03001cc34bc3e77699a16eab8165228dc68b47dc7f2cc3b0ca044a72f0e8a482c1d629da5682a28e7a98ea8088e5299725799967a776b49b762a732371a07213a2d2f2589551d5de6376ed6b25d4db62718982df9549420ffdeed53a4e4eefc876b501da41682e1de8cf85e645d7021f64da2b5b5782b910b79ee52e810022bf0e945448993b9c813ec75f1469ccf789ee2447c3b1b8ffe751a7b2fcfc71a94336f8587057ef9bb4484f0d00"/212]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:44:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1193.189202][ T3417] tmpfs: Bad value for 'huge' 08:44:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1193.422185][ T3417] tmpfs: Bad value for 'huge' 08:44:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") r1 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, &(0x7f0000000000)={0x0, 0x6, 0x4}) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x17, &(0x7f0000000300)=0x3, 0xfffffed4) r3 = epoll_create(0x2000000000000006) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000200)={0x4}) getsockopt$sock_int(r2, 0x1, 0x21, &(0x7f00000001c0), &(0x7f00000007c0)=0x4) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000340)=0xffffffffffffff2e, 0x0) getsockopt$sock_int(r4, 0x1, 0x2d, &(0x7f0000000180), &(0x7f00000006c0)=0x4) mq_timedsend(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) mq_timedsend(r1, &(0x7f00000005c0)="3440792164e3b31be80c2f5094ac7a2951b0244e746a053d411f9adb4f5c273e65367b9b89f4d34796661cd7635a857e1aaa3f1c174ff3528fe3a20ae6eb095aceb259f797959bc9aa878cb271b4edefc1419c87f1f0f35f93744d16846d8c213e3810da0c40f9187510433502e2ab5fa3d5bd9433c5f1662dfb871d25c64c7e30f38a3a96a5259ffd57830695a04dd2d5e7a9efb19633dcbb8a5fe6f699a5291a0f7ccdfa994246b67ae021523da1b545f61e5c67c7a8f2b0d484286de6822f35f1c02a15f197e7be1fd816e2968bc6c6", 0xd1, 0x5, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000080)=@known='user.syz\x00', &(0x7f0000000140)='eth\x00\x00Z\xb9\xb0G\xc7\x8c\xd7\x1e\x95@\x95\xd0\xff\xb9=%\x80*\xf1\x8b\xcb\xdf\x01\x00UA\x8a\x01', 0x21, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x179e91c5) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000380)) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000700)={0x9}) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x71, 0x0, 0x0, 0x9885, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef1, 0x2, @perf_config_ext={0xf9, 0x14}, 0x20000, 0xfffffffffffffffc, 0xffffffff, 0x0, 0xc84, 0xbfc, 0x400}, 0x0, 0xb, 0xffffffffffffffff, 0x0) 08:44:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:44:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:44:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:08 executing program 2: migrate_pages(0x0, 0x6, &(0x7f0000000040)=0x3, &(0x7f00000000c0)=0x1) 08:44:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}]}, 0x1c}}, 0x0) 08:44:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}]}, 0x1c}}, 0x0) 08:44:08 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}]}, 0x1c}}, 0x0) 08:44:08 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:08 executing program 2: getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000180)=@can, 0x80) pipe2(&(0x7f0000000040), 0x8c800) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 08:44:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:44:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:44:10 executing program 0: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) r0 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000040)={0x0, ""/53}, 0x3d, 0x3, 0x1000) 08:44:10 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r3, 0x0, 0xaf}}}, 0x78) r4 = dup(0xffffffffffffffff) getsockopt$netlink(r4, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) statx(r4, &(0x7f00000003c0)='./bus\x00', 0x6000, 0x800, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000c80)=@broute={'broute\x00', 0x20, 0x4, 0x708, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000540], 0x0, &(0x7f0000000140), &(0x7f0000000540)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{0x9, 0x20, 0x10, 'veth0_to_team\x00', 'ipvlan0\x00', 'bond0\x00', 'ip6tnl0\x00', @local, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], @broadcast, [0x0, 0x0, 0x0, 0xff, 0xff, 0xff], 0x11e, 0x196, 0x2c6, [@owner={{'owner\x00', 0x0, 0x18}, {{0xee00, r1, r3, r5, 0x0, 0x3}}}, @rateest={{'rateest\x00', 0x0, 0x48}, {{'dummy0\x00', 'xfrm0\x00', 0x2, 0x3, 0x205, 0x9, 0xf3f, 0x0, {0x7f}}}}], [@common=@nflog={'nflog\x00', 0x50, {{0x7, 0x7, 0x3ff, 0x0, 0x0, "ab431637d37721455920187194239e708e2e0e6d8edbfb7a98503c708d073fbca961278a36b9876a30b818f433e5aa8cf6bd9f0e2f0361094645544303cd76b2"}}}], @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x8, 'system_u:object_r:audisp_remote_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{0x9, 0x3, 0x6007, 'erspan0\x00', 'netdevsim0\x00', 'team0\x00', 'lo\x00', @random="294d2daaeb70", [0x0, 0xff, 0x0, 0xff, 0xff], @remote, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x1c6, 0x1c6, 0x1f6, [@state={{'state\x00', 0x0, 0x8}, {{0x555f654c}}}, @comment={{'comment\x00', 0x0, 0x100}}], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x1}}}}, {0x9, 0x98, 0x8808, 'veth0_vlan\x00', 'netpci0\x00', 'team0\x00', 'veth1_vlan\x00', @random="e90f6921dfda", [0x0, 0xff, 0xff, 0xff, 0x0, 0xff], @local, [0x0, 0xff, 0xff, 0x0, 0xff], 0x9e, 0x9e, 0xd6, [@state={{'state\x00', 0x0, 0x8}, {{0x9}}}], [], @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff}, {0x0, '\x00', 0x3, 0xfffffffffffffffc, 0x1, [{0x9, 0x0, 0x60, 'veth0_vlan\x00', 'veth1_virt_wifi\x00', 'vlan0\x00', 'veth1_to_bridge\x00', @empty, [0xff, 0xff, 0x0, 0xff, 0xff], @dev={[], 0xd}, [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x6e, 0x6e, 0xb6, [], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x40, 0x6, {0x5}}}}}]}]}, 0x780) syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0700a400000000007f0073dfe806a9a40a5fc2fecee5ec4b55d36e3144783577bf46ac3495436b6765c18fab4f2273bd2a7b5ac175cb807398ddcd47846e6bfd187c"]) uselib(&(0x7f0000000000)='./bus\x00') chdir(&(0x7f0000000040)='./bus\x00') r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x4}, 0x1050d}, r0, 0x2, 0xffffffffffffffff, 0x1) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="9ae8228d54053ebd2502000277"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92380, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x80000) socket$inet6(0xa, 0x0, 0x0) r7 = dup(0xffffffffffffffff) getsockopt$netlink(r7, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r7, &(0x7f0000000280), 0x0, 0x3) 08:44:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c8", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1198.344519][ T3515] tmpfs: Unknown parameter '' 08:44:10 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) mlockall(0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_GET(0xffffffffffffffff, 0x0, 0x0) gettid() kexec_load(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 08:44:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1198.586800][ T3515] tmpfs: Unknown parameter '' 08:44:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:11 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:11 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ed3b9ca6bda30c270b2f2b7785574525f2617973"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = dup(0xffffffffffffffff) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r4, 0xc0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r5}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r5}, 0xc) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) [ 1199.037548][ T3552] tmpfs: Unknown parameter 'í;œ¦½£ ' /+w…WE%òays' [ 1199.355192][ T3552] tmpfs: Unknown parameter 'í;œ¦½£ ' /+w…WE%òays' [ 1199.963782][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 08:44:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x100}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:44:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x5) 08:44:13 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000040), &(0x7f0000000140)=0x80) 08:44:13 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x200040) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f00000000c0)='cgroup.controllers\x00', &(0x7f0000000100)='cgroup.controllers\x00', 0x0) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:44:13 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:13 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) dup3(r1, r0, 0x0) socket(0x0, 0x0, 0x0) dup(0xffffffffffffffff) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0x0, 0x0) 08:44:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c8", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) 08:44:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xa4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 08:44:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) openat$vcsu(0xffffff9c, &(0x7f0000000340)='/dev/vcsu\x00', 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)='\f', 0x1, 0x0, 0x0, 0x0) 08:44:14 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, 0x0) write$P9_RSTAT(r1, 0x0, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendto$packet(r1, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)={0x11, 0xf6, r3}, 0x14) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000140)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, &(0x7f00000012c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf74", 0x49, 0x11, 0x0, 0x0) 08:44:14 executing program 2: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, 0x0) poll(&(0x7f0000000000)=[{r0, 0x9000}], 0x1, 0x0) 08:44:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @loopback}}) write$tun(r0, &(0x7f0000000680)={@void, @val, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "a5c268", 0x2d8, 0x2c, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x19, "e5fb000005005357cd99e33bca98e246dc9027eb3334ea443e7fdc4049b892d54090878bee496aa11e07fb0f1db1a0ebe2f95347b0317613063381165c01f08fea1048ea59a6f2273e02707fdd7defc02bde3192360593169594710bddd04aead6c89c87778555de42d23236534ba1a799a63eb4532003a703b249e4628e4706bccc7a264ee85014d99a7fd4565d3c416c835a741eb4e97140e834013724d23450072f0087ac65295ca0d7c601c30de0161560e2d20c5b1052e9b208e25470e9fa884ecd2082ec38b3cb19c083"}, {0x0, 0x1b, "14a142ef59c04e8e7b4db5309006bd98ec79847a52ed68124e8a24d3079fc53b81c039a7d59f992dcb481043f510a0ce1ebb98c07a624ff8c8cc0b4fd3b8e700196d1f5696e184393de669ffaebfbd494a9d6a5fedac0738ffc3dcb3c1b96e48fd063786ae5701f6aa5022621e665607848e20f162630df96d0a773993e97ae6b847e51883d73d66bb30b4375229cfd0c9c41f511bfbf2bca94caa7ce76be257173a4eae2b484117ac32acf6ea1a32def26c919c93055c2f9a640b2d847d527357902538828abd66b3d1a9b85034066154f0b2ec054f6a8712ec98e5"}, {0x0, 0x1f, "8cf0833ae2772f05d302c778833be4f2b9c43c83284b82e71ca1ee382af46513079a2f52da08c93afdfc1a18e4b677b307a1c7df90787cbd143b129bc8dbc39104eb21674d26fd4ced8626df256869e168d42f4d160ad1442cae2bd8fda0fc44a08759d245bfe8eba42ec7967c1e953256a057369159333bca73b498a882fb5e840d429804169a6446c1d1b013144ae0ee276a463ef69ea4c4636751083041811c9b549256c6a3a71e451f8fd4de25629b3de61cba78315412fa14e350bb03feaf63909bd7320561df80bc77f36d4561a5efcc324450355ed398d9e46e798e23e2a4a2c787728b9c549a1894c53dcdfe834c7785fb3c4331"}, {0x0, 0x3, "6598975984c98199c07565e33783bc472344c2fc4e6a32"}, {0x0, 0x1, "c3dc73ee76fa"}]}}}}}, 0x30a) 08:44:17 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:44:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x7, 0x4, 0x8, 0xa7, 0x0, 0xffffffffffffffff, 0x0, [0x16]}, 0x2c) 08:44:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:17 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0295"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:44:17 executing program 2: 08:44:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c8", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:17 executing program 2: 08:44:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x8100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x3c1, 0x3, 0x340, 0x180, 0x150, 0x150, 0xc403, 0x0, 0x270, 0x238, 0x238, 0x270, 0x238, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, 0x158, 0x180, 0x0, {}, [@common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'dummy0\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x10001, 0x7}}}, @common=@inet=@hashlimit1={{0x58, 'hashlimit\x00'}, {'rose0\x00'}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00'}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0xbd) 08:44:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6000008, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8, 0x1b}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 08:44:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x2000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000b, 0x8031, 0xffffffffffffffff, 0x0) getrandom(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) dup3(r3, r2, 0x0) sendmmsg(r3, &(0x7f00000025c0)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000180)="2f1b4176d95ae1dbdfd6006428cce04e4f28d07412d521009623558c2192c998d0b0e4390eaee85e7d28b796f87a3b1884b68e81f2e4c17d3f51e9405fd20f1e8d0e2787506c852d0b3c4c7bcd2548531f2a07b2341851748effc4a3ce6b0735bd7cd5fe07fb5c5a7029e6d6ede5a84b82a666e2a3927211a75e681012008df92bd0abb8422b8c19fe9bc3df2e69afd18706e731f8c8d83935", 0x99}, {&(0x7f0000000240)="ed860355674bc4394140abe6040a59c40d905f30dfa7c4241ba5b6eace22e0ac118e404719a9fd2ba4b1e2a504b9fdedd6b3e24fb771b404de2bfce26c0a42f8b8ac4b3ab84d15a566497d8c70c9b43439a129c83438ef6f3f4c726667b6e7da281fd93dca70cfdc29d8b76d4e921f46344ea18bd3311f2429b33fced42e0eb73faaa21e759b9a3cb09a9f489c756d255f98b42aea1bc0f49947533aef3e9bc1be81b269", 0xa4}, {&(0x7f0000000040)="700aff8884d4b70d52b2fbfd944ab66203235c9219e7ebb6163874865444113fd976310d3b326fb26d73c3454d414302fd8dc4350bb4e02f28627def6c", 0x3d}, {&(0x7f0000000080)="6e63df7419c9127afb4ed833f72a0058643144eb5812c24a7db8f8dcb09abecace8436d6701997ad1bf6dd70784219c367", 0x31}, {&(0x7f0000000380)="7d686e550c4a1025a64c2340adf2f19534a75ba8ae326af005a4dc38539dccdbf26a9a94846583d1b68af924fb1f12ddc8fd19f4a3358afae00b33f6aa9298d1a167c33350af484cc0803f97bad887386fadf2ba3f013ab7cb677c3c0bee5f328c212cd8ad8df06fd9b15e7d12228baa819217b98d5d40b97824700790f51a69e891ffb92b7e8994a23c33eeffd80a7eb03a243b042cb6cbbbcbe82acaa75b7755e32ce7cb441e952db08b2d3b5e053872efe850dfe218c2d67c148651", 0xbd}, {&(0x7f0000000300)="a35f88fcd3003d5c16fd257d11ac7523b3346b7627a39e96732291082353245cb46bb253dace5df6c1055188a8d0b771f6", 0x31}, {&(0x7f0000000440)="17a3014cfcdaa171fee7d6aa6470dd3b7b86fd122ef51717cb6373c62da64f4443f1f25ca74db306e34064023c92106bbbaebf631cd54f947b7e29e6d9", 0x3d}], 0x7, &(0x7f0000000500)=ANY=[@ANYBLOB="6000000000000000110100000100008013bd63bde22a39df622bcf6c38ea3e7ed5acc18741e00f782b684564b35f8e7206918e9ecccd4182d07565a7e1bdd10536451f1aae606f3f264a66625b3e1f6e168cd40f7139a87a71c63a00000000001010000000000000cf01000000000100ff632405f3952c9bc454a25ec9c6e802721b1ae5a9685ecfb056ef9dd30ca0fd9f8f8984373771165137ec4ee0ce19ccae5b6cb4674731be19175800af13f1d02d35a95607c3b060021222dba9306b780505d6cbf240776854ab0563d059e24b75758b2955900e1a7ae730f411ddd4234baf3fcc4a5372f715a490987f7b0ed578a7c1e05e5f2f7e2269c3b57ecb4f0d0bb994e2b78d1d2eb3c6bf6a82f99bd8aa32bbcbc5ef178640af539a6964ab6a7eb3bf9bb2217bee3683a4a8bbe74401cdd15105b6c54fa8f356a4f4c319623a3dd136be4726adaeb844ad98c36fd0daa480323226c9206f62826e1be76b2f817845fc348885a4bde4a806ab150e9de696e33b1868d10872e67cb584b91ed82161009edcd15b1168a6b3b3d5eaebf3c0afff0c8abe5bc6dbe1d3e2991e65245a8bfccf43fd5ba779a74751563672cdd2f82ce50156a47b1fbdf121d7b0ea382cd55aeb7411d3acdb2aa96e9a308c5d524449236bf8a2cba4a3b2b03dd6c041322a578e4e00d2a5956c297f61987066d0f74bec9ce24878ef09c119b34bb4e785fd1b45575481f037a2758e1f69e97da2e7d9178aa4bddea5d7847e31611758d9ef4e3407c79f9089852786fdffda42e6e604b1d2c9a73992ba99f76bd662378845bec4aead0378558c33bba631552acdf5ec9199da1d764229376e9472509c4a9d9295878be23b4c8c277ab92ea5ceed63a27edc96b45511f5cfe68581c1cf252777f3b444d0166d25450b278b4bad76ed2e4220ac47c0b9496384b80b300b0e6e106f4bb109c2283720f251b0aa3a34cbc4a54ab4c395bde782baf830e9b901c5c4d336ca31d01f4d093c91bd180c3790f95fde093e6e712fcd073861188ed06e5f2ecdd357727bfb9350844a77bee0c1b4dcc58672e9f6cc5877602fb23d142c630054e31307920762c1c9c73d8514baa6714d1b05e1f24ac5503850d56283a8bda50acb1b253351dce74e8b4362ce4f7b778998d6b90b70b51c97dbd3fd8d9525d0fc253b9f4e374b3277e6e437af30069f220ddd829abf4fe939728162368789cf4826f74b2a08e8a1f08d0e28477d585d5b77a3697bfbdfc2e41ed9104ca1233d31fe11a28c949a77a26dc5c29cf6797ca979937909c4c93ace41ed85ea4824ec8a465af579fef7fb4728dc0aaf8ea1429614d17824aba63bdabcdf2bb27ac8f92ecf59817a65ed2ecf06cecf4fe501dd3b08d2a4b79b028ef6b096396d382ed5313a1ba61424e3a2f22455d83ed07ae9ed299933544ede2c6eea6fd149dd91f7da212eeb913e1dafaed2fd853540116457f95e33c584283972b4ff6a5a6ea51a8320c7e00c9cb96081c4ae28a7cccc289ead96c0c9e6011abd0ecc768d26ddca785b3d6b2634f017b40841a4f4d982c1b2449e2ba81051fe7e2bcd6a35cb765df4a4fe1424104e6f5323f0244a109e147305059c23ae861a0307e6e81895b16025fb072ceea382ddc1bf61c0f65152f607d837a45d258c064d04a44e075bba272aadf2e9053d7f706c246bba7bd6d9bdc7a7bc9c1eb16c8b6e98c527a7412429cd78501d044c25606a7f8bcd8f55f8a490e2256a76494c73b090d6f3f6c6d8b5220c1f3fc9fda72919415d0d279c7b4f8278fbd4f077a89bae222f63474f3fc59af6ebc26b74402fdc1924a39c0e82dbab9eb7ebd213f816e0978cfe4afa14482e89ca7d80cec1baf78ac037fa54ce8424c18e3810daa3f2c19a537e9606fb99fcf51f12bc5c36866534c4ad374103a350ea44343876ab5147664655d158dad6a5c64c31320ad11ac5bbb0e224dc3dc379f986f05fea6086c0288573cc08b5a8df8f2b39edff96d5a5466ab537940d3bf9fcb5129da4bf1ab995bcee551c214e1c427886dba85803ec323c547f0efadd35072f8da95527b9e3ed87a14105a521e4bef3e6a407535d197cc10ca5009f7fa070e2cb19e40e0a7e448fd86eb3922aa2a285b1ff11c1efe0755372ea7043812eb68529039338766a06c747554c880596dc6e74d2e773f0c48b2cdef1e991d5da6c6e106d11af1aecbc45d71d6407b1ab051f3151c041c71dae66dbe34cd84f51012d8119835db76a8dc42e6f292a00bf3f68a35df37c95161772924e11efe8c2962973619a88a570d406168bc839ddc47fd6d572552d592444eb7b96e3bc31cf03f911b55b4443cec5250b50caf7c0e440da928d194ae24b6e512c4098315356764ff41fef1a53e472bcf8db155e86973768db468dbc7322fa3ab1c8d7ddd493ba6d20962ca7d62fb99c7220f66cef82331c549df7c57adcd311d2b1e0191827e95a16952b2256650064d9a25761c57aa89dd16e9bc2cfc9e0048629c1a99a02da46e2d78b170ef485c45bcea5986e2f219f8b678303a49bd6c1431d2e094fad53798d253e73e18889b3d42016125f4e2b89735c93721a9a778ad52d16099793d070967a9d34f158f3a15da2bb01fa5b7040f67fc1ac76f9c79aeccaeb79ad79ba13581b068f2bb8457abae18ed78adeae5995e7a2ca65bf9578a2240ea3e57b7b6ba9e96b6c0df0b0433676aa2bebba99817ae076153bce8ffc205f1f4f1b827379ea6c300b0c7c9fede8323b322d4975880c5056757f88b120f43adeb8ae71dc6ba059f2de03d969500b09a2ae829adfeca02b68476d91e09cc14e5dbae5e808247c3efe7e85a36147ddda6789f9a8522248162b01c79cd0b69c6db0935bc12fba3a752eb57b6586cf5aa24a10c5dc7a61228b2f8e044130da4469c983cd765eae48e08e3de69222780348c350ed0ea13a1e94789c8d5e499659d5c095b2d030f6a3576a9ef15f2a4ff988c040ac3918816fa73b8c1567ab668ccde63d30b1e0994489b737177dc10fef3852f10f8ae72ee6408ef653b7e4246ca37264b2f64dbec7a797bdb622046d95072cbf4fea9aadbc6a2a3289bc578c26824efa7dece81b9bfd3d2e80c893bd6b4a8a1f0e5bea17d7dee9c62123ef313bf92223f4c473e9eaa6d9fbe6548ec7abbc73bc7d2e48b2def5874c0248c5e4e7eec6d47e8694f0a1fb6fac1632b7ebec8c451e9e26c29bb19588e0caf4f48e87760bbadf6ff8464237317fe53959c892b1cb372a922a0a01c831a1d8759f379731801ea4804a9bf74f3205bdbedea3fa3ad5b8050093b24b40a60919baa3f429e362db77d769b8cf49b6cf018ec32339b037850f5a6d02653f193a67d163b078ba315a438780fb58fabf4a809b2c06343165556c51506c00c88d5cd2ed3e042d1e42a29e6203745425b4707fdd6ab94482b6d1b3dd80c01a5a19b2572eacd99aac11c4521f5a30275a9e1c8a7d5eb42fe2844955ed2dde9a5daab32747627f8757c33798c86f4332dd6e157f669daa12cad1ac02a21d08d18c713ebb7ccc31ebb9605937f999f19b4962953cb38bfb5a911ab18e18080ed01811aa7aa62ed74b0bdb61a012a0ad08e2a0945c69e1dcc0c2a8390455f8049798adb00896594d0370697aa806fdca64f4a6357b41c6ab413ae003b9846ceac65f969f979d5aa0f158f4bba00e250ff149bf2bac7b0181cf916d5b84cafab1cffa4b7e6bd1445f91ea4392473f15a77793f495a0eea0be52c3cbf736bee8a2878889c38cb1757070fdb432cbcbff994c8e0574eef566414cf06e30b0409c2109cdc141cfc973c38e051769a2e4d4231885f90a11817ea5625aedbdfe6ba1c9d863e6b48336e3ea811620b4fa368772685194c130e95752b8da48d2c180f75584c1d3c1cc648a0a4e852f83a24f61e4af68492761bfe961391878af43d2a6565cc67ceb52943fb17ea98b979e7733a40c0d4691720d639a21d52beabc8b29778bf2a9c1b84c9a1cd6e2e69dfd773ee2ab70949405975d050a762de7a9f0b8dcbfec40a97d4026ad99070e5e894d740ee6350badd24f89462c377693e163a9d6a479298920a10989f8da4c4cca7c113ce9007a30b8c59ad6105d216e24714a176fa935cd0b402538efd3e26f778059e0f1b98d47816a5470aa45b6b9335f7e4bdaf3981e2e92ea8f25aecce60719f86c6bc09cc2cf93ecac74c58b27c30fe63a6232c060dc7532f66093b430457e67fac498ae674fb03c181ce76b8c064ba2873af6ae67af6eed8470fa7de735c4f54c7a3832529e371dcf8c0457e261220f7b3fc91ba0550d99830e4adccbcf9e03ceb0fae20768b0486e9302f2e185cb55ce01b6c16ed9d58debf1e50dc4b22bcf5b54f907282855f6ade7a78fe8401a800f6e1caf4f10d1c849be6bcf64e043e2542521827d5d083c813fb4b99d76925c4526f7df86530027d552089917a58111b2b9450e86f2017dca4ba11350a1c280a8d596b182c612129d477ad8ca74223caf0b16deb00fd1eb6772cfd69bf3e46b1f40885925e5dc0a46c89f0056c8586e6f95991f449a3014b921920950b002cbc767b63f089414f27e96b758d367d9b75ecd57c7604f7c3385ba2b8beaef2d21ee824e5c3a19c520ac16d019375805e4ef163f6a9c5c15b03a74de2b2e27d2e5ff1a3c79021c12faacd4a46df9c63546280138d42c22d4b2fbdefb08da377068db3197af663d4c9bca84b3b6ec170c3dbe209678f157302845c639b7ce44aa80531c28bbd48cb35f4432162a3238a1ff3078b743100ff9330262371b133686993e1aa20dd4119cbaba2aca4b5714aa3769536c885294b69a49aa7ef255a2cef99da46206c6d28c1e53ad323e11c8dfa42b19692ab61924171d14746181bb2dfefc9b4cc05cf1357f846e812e5fe968f252554c352c746e23377e3f32e2ba712f12e9be223fe5a3b90c946ddfd4ccc13eb4c7e1e6f7cd2eea03dbb8267c44b1f027070324d2a074b423589c9b026b480e13a81095dea56d35cbf2cc8a4d96d651bfe2ae5e992e47a5d5e840c432471f3e51bfb6ff499508be6f725fcc3109ad6fa85ac299b0a254ca138f922c4d599e6b2c74e0fffe177a64b7b1f040bc37b99378b4cefd286045b498404320ed933af7fb8b4f7b5a0baa82ec488af88c54481d3ef99358991ea87d414d3e02eab139544a39fda97685590b4ebc1cabd0236a78382014db622821a28c2eb842a581712a4d97ac8b2f1cc83905fa3c1a7f2c48ef1247c9b93a87e26ed588e4d842c49d81241e1ec91d642db6be39271ea4f246ae184934d3882c9b43753f1756d764cb23e957f7451440636d05ada8bd80964c6a144b7963ad09e0cb317eb4829a9e8061fc3de6b434a48bdc27f32e388fe7d7684f9b02357abab0b4fe6af32352a60445e65801f3f8c94200c768f291753413e6a507febf935d88875527ca32340ac00b3d002222e82dd5da853e1a7d1b7b7a8cee7ad01b18c337267a87ca2798c21ca9aab71e6a5a3e117f29776b7148bf793911370551976c06565791b583bfc19b701f77cec07b6dd0a45c3d5519395b1a1586e1e864e6c220238f017309c3dd602999cf98063392506768c6e686874f02c54676528018e27c0c6c1c256e53212b7967ca8bd9c834bae4d00da3f70fc85edc9cc62bf2dbba1ee8e189847f334e29af0285d287673fc7e4eef4326df8a65e68c84c5ebe18a15eb61a37ecb986603b78847d752f7cd220fedfa6e0363dc79d7dfc49fe42a56924104aa8218e22f7d929bd9bd02eaae9dde8333d9dd6ddc4d5172ea57b40d89c824f953447c65d3673c7ae86eef68dc1488c630d4d4777e5fbe7134125f5c35de2f83221da1de963898d34fe10aec086f90319471218be6f14dc8b5816b799a1e4e7676a3b9eb967fecaf9c8364fe6a02b75c9b65de78c6c3144cbe1107f62d038e433ee69900000000000000012010000040000006026d7d5804230417d70d9dd67ccc1677847e8a8abe7d319c147fd5096f1ad8cc2646955f614b1c39b3e6a73fa2325f771b2fc320f108ea9491da8169970a17734c56ca5fe3555a29ec762d0176135af89e15312a637d7ee6ad0abff74d78ddbe1da64b157526be6cf504ec04d37b0b75f40f686c47e22fbdb49c1000000000088000000000000000901000003000000c7c68069a6f173f26e595a452c53274b93743aa9e8be6f26eb90813b0a87fc3df2c85daaa1871227ea9bff6e8d7a0a178fe7e5f846f825f9f5599a4f3909ec605a6904c1ccd82837348a69713af86e0c6b64bec3b4fa358d4c0e81dca2ab4f5afbb0d3cc4ea3d1f887caad6e27809d93e99100000000000048000000000000008400000002000000aabe234e6c841fec64b5c15a82f8aab387a15fa0a7dbf25e261b90fcd227ff78f7705f131d2f9293fb583556e7881a9319bbfa0b7ad47300500000000000000015010000ff7f000088284aeac35fa48afffe56639858556e1807f83203c76031681d94c7fff0491af82dbe27f02f172252f4f06f57ee4780d7c5a58c1148b7184b0000000000000070000000000000000c01000000010000b8e588c60dedd6c6bb016bcef1fa15aa19a8774679d698222a1b4759b88c1a9811b00bcee50331dff225bfe8f77829982225058857676d206c6d20eb4dcdaf82754341233c9ac3be6083b10dee7d61ddeb8974f965de73475900000000000000e00000000000000007010000ff0f000025ab032b37df972059e74693fc2abfee158cf5fb8a8deada6177ed348bb069e3c8558e30dcdffd6b56e8a97a99b3d209437fa4b6a1e971b8654a073ab273a7b46bc9e45f5fda9bb1d696905df4206ca5ce294509e27257f20740a5a2d63ff1c01d6fccac49fda22b9a22b10be90b6be67ab78a702dd5b1494975a3dca4c8fe2a850c0fe798f501cb47806eee80ad13ff81b3d4c0433d95898940cb7cbbb23c711f71976e762014b965d70902ce7ff86785229c3360ffa1249498dc0de9bfd87b285f7a763cc27e31a7f7ea44112400005800000000000000050100003f00000079e6e2723c380fc6ae17f3319f0e48a8f844105e5440e46de3a0aaf679d46fe607cf5f7be353c024a09a81b9c9801df211534a098a404f61b58b2775d15f7d0388cea624145bee00d0000000000000000600000002000000e55a85a5c37d178e971d3d3a666f17b481a2d0e85c73b5b99c25ad54d67628ff016f40c0b635486c8fafb9d54c85a2e4342eeca836523d50c5a6765ce9e454b815e6c443ea6c55198acf9769274a878666cd438e63912d3f2ccfcd7d8d3ca79cbe6da19a2529fd047f47ac12305eda7bc623d6949c1914cc90bb4eb869fce74b295efd6dda04e887a6a7fe485ea42936ae8ccd7d4fcb1d7bf1a27907995797603d3e52dc6c432850c49035ef3d58972701666319d3cb18d253c47b42b6e10000"], 0x1498}}, {{&(0x7f00000019c0)=@in6={0xa, 0x4e24, 0x4, @local, 0x5}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001a40)="aa29e50c78e873e91affaf47a5f4b9ebe24ebbe2db7156", 0x17}, {&(0x7f0000001a80)="c15e18", 0x3}, {&(0x7f0000001ac0)="2f53da4a106c4a881526aed32e7c7bc90fef8790f1f0ea8143d002277ec140863b7812492b2cb7c74d023ef69c36c7d0ba0f28d130909dff0a03e1a1200ee5613973a36f46da2e33cb36e15eeedbbec34838db539051bd61d18944c550a70b40fb86f66acd03c010f301201a9f4dd1e235", 0x71}, {&(0x7f0000001b40)="4186e3d743e24f32145506ef0d5d635ae25ee9c7ef", 0x15}, {&(0x7f0000001b80)="907b63c55e1daf021340bfaaa289226950bd8a4ad195d0a34a2ae380553420b9f7b4f706568da9c753c2500ffa7305053d7c62795210e8b9920137bdc786a8af7a639b86a0d916915904cbf7ac6b4be33b9fb9aeb6ef80df30d7520503a42f5cc43ff164b3dd8ae5ad9d7c0cc627e86e1f211d1866598b7e610c194e85fb15e64174ae737e73f7575b65499202fc092110678b427727e3b82fff39937987e0607bbea6ae6adc2209c2ff9c9dcf1d62b9d9eff6eb705490e19bb0ae8f105d4eeb2c605d4616c49b1941a65732bc9add06734ac941dcb83e7e7162121820b7e3c96b142523cf92a3", 0xe7}, {&(0x7f0000001c80)="73d7c475a4f102fbc0869cd1098e6917fc0cd644528ff2ca8b4e5b9d0d1d2f2fe38bac23665c90c7cea01624c4265ffc241463b7", 0x34}, {&(0x7f0000001cc0)="3a2ae0635b65680d71746a07bc0163485b452546825d7744e0fef8acb9e0a6a063a55f7dd25795ccc26011398ea97e44167cb0523094644ac301b243d6c9485016a4a1355c977f288e7b7c3cb131fdda130a0fdfa57f04ec47f4136d04663a4b8c6545682ae9c16e9e65b076876178001440c745d23773991246382233fb37bb4d850d4c374301a55df9dbf45753b8cdbdd550d850e99bf136e9b69c7e6407ae92dbd93a2c376c53f24b6493", 0xac}, {&(0x7f0000001d80)="d9bad28d99f10fab858b2f6d586b6e0b82ef13d83163482f6e5be355e822de618bac9b609be2dcce605cfcc0da036c4128cacb7a95c5a33a1e0616070fb8e5729dd82bc5c2ff0c54f75e62afc28d8255374e8a16d8f17854781d5ef69da77cc18fb87b25665ac6", 0x67}], 0x8, &(0x7f0000001e80)=[{0x38, 0x16, 0x3, "b841dbfbecf5fca652b3bde12c3af3b58a4f49a9753afaa7dcdbce0233a7a5096da33c653f1a06"}], 0x38}}, {{&(0x7f0000001ec0)=@ethernet={0x1, @local}, 0x80, &(0x7f0000002200)=[{&(0x7f0000001f40)="28b1d11a619d896dd3c73d57ef877209a3b6ad06b85551e47bc2a55c2c361e37dcdb9b9ae1a05c6391786509f2a46d1636d775fc3cfdcd1673d8f862fc8023b418f7be21892e623597386d43afde85ed8429ccab4132c6aa98796c40d15fa8b8fcdc882d500091486a10cf", 0x6b}, {&(0x7f0000001fc0)="618c7f730e318aff141c772fa8ef5dddc9835a20315a053cbeeb9ecefdfacbdd3cbd45301fb53ccf26a63febcd9627645ea412d3fb1e42895d184efa4f901f49a094f69f019067ce1670e9b78a357ead8171e8d5b4dc4ab8098e6b66dea547de1019da9c71a0db4d13", 0x69}, {&(0x7f0000002040)="fa338f862d8adfbf88f5ad51cbfe5c69d7413673af060601c847f200922892a3ca1dd05aad4dec5430bbc4d19b6e0e541d75168eb3c0b384f7f760e3fa00b1b4c63603a96818a9065c0d848aade6b03e23b696bae09c7bf3584bec1134c0ad5479174cc96eb6674c7c173198944c3e0254759faeb2208f2c02ce012fae6722de2c81b0b344bf38118f12146c1c871937de1db659c121b9111d4f73223805e27d57084065649948ccf91b7ec24215c1d52883e3b53081", 0xb6}, {&(0x7f0000002100)="8232562659ddd5b7b3974942446bd80cf8f0690692fa31363229f920c57dcca588b83499099eda2abde98ab7ab16e6b2dac1cb1645de459be01da08ce2fc947014782c94d7efc7629f7f4a4a5141a468ec36a0f04ed408cc0143486ca028b7eb4db7ac5e1ff5bacc8604c4f6053d548bde1fe478e7a0b002c1bb78d76fdca4cf55221e97cedadcd686e13e655471cdc27201877b99fed96d0711fe955d15505810cb65b6e8da66c972003f301a9722cf3419ef45db66b7c11d54b20888bc43acf24d379977f54a112626fb19dbd26146636b8b9d812e60351c0922bde776e51747676550984abe930b54d5909efc54abfeefcf86c97d", 0xf6}], 0x4, &(0x7f0000002240)=[{0x100, 0x1, 0xb6a, "ba382504076a49780f3980b0958bbd914b1867911c36c66e38844e2bb6149e0b66720891d1b21da106faf6894a7c031a6ef85c264b17361f24183ddad6e78e748634f8bde624e7032eef7651361833a6ecc12d7dbc079082605aa5bb5d473039a19ef466a1ec7e7323d52dd714c5ac1a454becd0a459eca43fe4f2ad3554619e2be5806f3ce9c04490801a0e2bad0234b8821d64f2583ff0e36d9ebf153c7c4ff80cfd8e3e89741c9d45066196631351b2a7ffe6af45361b6069c134ac17d77f31d5927701fff4dcedff70c3e9a6a8cb13bf28b4d9bccc5fca58a746668c4e35f49639c5713a67eed2f39bd2154c"}, {0xb0, 0x3a, 0xfff, "970f2490341df75fd3121a64e3e7edd4facead9817b8432fd7d3b727f9757add3baf5efcae9bbeccc81ad6dc6fd8fd4a98ba483e2dd5ea84296253f26b2ebe556e19c14f5f81717638c18be45f03184096ff1deca9639d0a17aeee6774fff9b021cc778ff5095da05877bf0072698e594a0ec1ef41616fd3c8ed87676a4b18ac8e61701d638644023576874f6fd35719a6bdc47b33a6390b0321fb1ee654b5a4"}, {0x58, 0x100, 0x4b, "9ae359cfa43eb06310851cfa5045fbdfb12c07eafcb3bfb559cd1e38abc4ddb5838aa73f88a5ad93b88781f2900b4f71db98ac43218f5bb78084a199a167192d2e99223c"}, {0x48, 0x10b, 0x3, "5bce50b746e3be0189fd27689fe07569f64f092e6089ba8754fff7ebdf14b3851ba2212693df223267248e61ca6956d3ec92fa5bbbde48c7"}, {0x58, 0x0, 0x7f7b, "b2fd0be088eb69f5d9fef3f1efc0d9bc453e9f8acda607bb22e63d26551ccc4d58e2d8d3db649bc20f1e1937e083397961b65834214021c43275ae866eabeddc85012260fb"}, {0x58, 0x101, 0x0, "0f35d8de7437d17ea029808dbe6f94eb94f37ca552f0badb32c8e945e32214432cf62f5fd7a9888bc4d5be6e40c6fa3dfe8b0185e09cb2241060f1327952d50135c111786ccf"}, {0x80, 0x101, 0x8, "99ecbefa0e31e46d0261ccf50fb56b19c7514d3c5eec3906befe94bf581e1107c0fc6e6c3e508335a08ae6c1d0ebedfd4d4454659c4fd90f9fc725af2c6b699722be669e2c7f29c0728cb5840f7f0e2604a30cd810efa121f31d308fb8f1c4b36325af539b161fa40ba147253fab26"}], 0x380}}], 0x3, 0x81) ioctl$KIOCSOUND(r1, 0x4b2f, 0x1) r4 = memfd_create(&(0x7f0000000340)='\x00', 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fsync(r0) clone(0x2182001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r5, &(0x7f00000000c0)='\x00', &(0x7f0000000240), 0x0, 0x1000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 1204.723980][ T3668] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 08:44:17 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6000008, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8, 0x1b}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) [ 1205.019481][ T27] audit: type=1804 audit(1595839457.598:51): pid=3711 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir454656806/syzkaller.wySlBy/567/bus" dev="sda1" ino=16316 res=1 errno=0 [ 1205.153332][ T3714] netlink: 'syz-executor.2': attribute type 27 has an invalid length. [ 1205.198452][ T27] audit: type=1804 audit(1595839457.598:52): pid=3711 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir454656806/syzkaller.wySlBy/567/bus" dev="sda1" ino=16316 res=1 errno=0 08:44:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1205.488823][ T27] audit: type=1804 audit(1595839457.628:53): pid=3711 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir454656806/syzkaller.wySlBy/567/bus" dev="sda1" ino=16316 res=1 errno=0 08:44:20 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:44:20 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2100, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(r1, 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) 08:44:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:20 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="02776b58ed6945b54ce16ef40dd5f24a47d2a376cf8f331ac650912941426262bf1cbe16ad62b140a2230ef5208bd2900c3ca86f07a3"], 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="c0a200bd534148405b149225019909b5dd4f09bae1478e3cf7f894b815ab60bb35aea8a1d56b56415eb142a074e3e2ddd665b8d4491b2374", 0x38) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x200000, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240), 0x13f, 0x4}}, 0x20) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000140)=0x1, 0x4) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) 08:44:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f6", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:20 executing program 2: 08:44:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:20 executing program 2: 08:44:20 executing program 2: 08:44:21 executing program 5: 08:44:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:21 executing program 2: 08:44:23 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f5", 0xf2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 08:44:23 executing program 2: 08:44:23 executing program 5: 08:44:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f6", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:23 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:44:23 executing program 2: 08:44:23 executing program 5: 08:44:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:23 executing program 2: 08:44:23 executing program 5: 08:44:23 executing program 5: 08:44:26 executing program 2: 08:44:26 executing program 5: 08:44:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:26 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0xa, 0x0, 0x8, 0x2400000, 'syz0\x00', 0x5}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:44:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f6", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:26 executing program 4: 08:44:26 executing program 2: 08:44:26 executing program 5: 08:44:26 executing program 5: 08:44:26 executing program 4: 08:44:26 executing program 2: 08:44:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:26 executing program 4: 08:44:26 executing program 5: 08:44:26 executing program 2: 08:44:27 executing program 5: 08:44:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:29 executing program 4: 08:44:29 executing program 2: 08:44:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(0xffffffffffffffff, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:29 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') getgroups(0x6, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, r2, 0x0, 0xaf}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000080)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, r4, 0x0, 0xaf}}}, 0x78) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$exfat(&(0x7f00000000c0)='exfat\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x6, &(0x7f00000006c0)=[{&(0x7f0000000300)="dc8369762e3f9249bbd89a15b31842c1757e14582e582c64308270fb8aaa04943b1a83dd29952aa9cf835ee42faae1d788eabe8e87859f765fc6009955baf0b1b04d6c434f443f68e1e5899e5314a009bb62bf78b2b7daec86f907293992bb92a57446edfa56c0b8778c59f4f63cb2464a368388e377fb7f66a7f55058f73a2d17a680efb5f8ca0350e6fcd3c307a4bea50300fff53e3a5003b17948775ee4629730f56a56744e6208b08a18d73b3cba165a364183c61902c6223ef3efa53dc58cdb", 0xc2, 0x2}, {&(0x7f0000000440)="60d74e8f19dd858f190838f0297b984adbfd5e49ef0b9d21edfc9bf351219a30ec0add55893c308b5675ba4a553ebdb102cebcc221ae4e52f10e621dff9f05f12bbe082f772c80f1716578c9ddcd19eaf94e5c5e9114eb8b033c037dda81756b8dae8a7603434d2396a74cc06ba4f440", 0x70, 0x4}, {&(0x7f00000004c0)="a124ba071281c7b53e604f902e1294164ece4d8d760c49a7224a5c5767ae3a509124aadad6d53900cf1ca09b169d04c77b510931df6ff4b7d12deb8d3555d1d79466eea9f558af12ed6366059263ae629f21cc2fddb8b74f5f86621cf06d272e1ca8b4d2acc1d6596aafc23d165b92a1337b1a5aceaf8e", 0x77, 0x3}, {&(0x7f0000000540)="7890c6479d5b1b422ca02d42108f1bead98f41183fbdf24ec7f4c3a6a3309c749ed0e0468fbfd034e7be1d197ea3392e686b44bea04e3dcc1ff36dbeea2c5c9c21cc1631a46cc76c", 0x48, 0x1}, {&(0x7f0000000140)="e8b2ddd14b6653e35504ddbff1347548cb8eecb9d7b433579018040e", 0x1c, 0xcb}, {&(0x7f00000005c0)="6562bbfffc33671248094461489a727d8ca48993002adf46c709c6ce8121f5a07ef3ecbeb28e39e098c15c20d5709ab8447bcc09560480bd5f1070aa6fafcfa57cd932033a69823f182b451a3240e1ff2e33c70a19c33b30111b38162d59c152f5762e94cf0ed8edfcbcc083155eaf0b651c731c209935e925b5319176e391dc20678987ad5c5271d9fccfd1ee38157a6915b08f6805823ad4cb99938ec2c64acf81d216c19248239268875518f135c208f4b6bd5218dbc07a6637403244d3e14684fe", 0xc3}], 0x2108882, &(0x7f0000000780)={[{@umask={'umask', 0x3d, 0x9}}, {@gid={'gid', 0x3d, r0}}, {@gid={'gid', 0x3d, r2}}, {@namecase='namecase=1'}, {@utf8='utf8'}, {@allow_utime={'allow_utime', 0x3d, 0x7}}, {@gid={'gid', 0x3d, r4}}, {@errors_remount='errors=remount-ro'}, {@dmask={'dmask', 0x3d, 0x9}}], [{@smackfsroot={'smackfsroot'}}, {@context={'context', 0x3d, 'staff_u'}}, {@uid_eq={'uid', 0x3d, r5}}]}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r7 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r6, 0x80000) fsconfig$FSCONFIG_CMD_CREATE(r7, 0x6, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) r8 = dup(0xffffffffffffffff) getsockopt$netlink(r8, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r8, &(0x7f0000000280), 0x0, 0x3) 08:44:29 executing program 5: 08:44:29 executing program 5: 08:44:29 executing program 4: 08:44:29 executing program 2: 08:44:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) syz_open_pts(r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f0000000880)=""/4096, &(0x7f0000000080)=0x1000) 08:44:29 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x0, 0x4}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x28, 0x3a, 0x0, @private0, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @dev, @empty}}}}}, 0x5a) 08:44:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x121, &(0x7f0000000380)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4bf38a9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0594ce1487e311e84395a80adbe3e7f3622703c353de8e6928bfd5a5f2cc05e4b942d6ed155b67a555f4b2e2b0cd0e93e41c330f70401c1d96f546e65fab4fae51bb32a6f3ca61632d15b0c1cec89839cd7fe16d03af16efd5295d2eea42f3e25765b72b9727176c1966620ada4a27b28739a2eed558cee393ecaa3df004548e6f43be3f968529e96628cebee42b6fa46cb0b55a45cadf1f354a424830def8e07e2a29b11068c63cd93ad448a65b646"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:32 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$tun(r0, &(0x7f00000000c0)={@void, @val={0x0, 0x4, 0x0, 0x3}, @mpls={[], @ipv6=@icmpv6={0x0, 0x6, "9eef7b", 0x28, 0x3a, 0x0, @private0, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, [], @dev, @empty}}}}}, 0x5a) 08:44:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) syz_open_pts(r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x148, &(0x7f0000000380)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:32 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:44:32 executing program 4: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, 0x0}, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') 08:44:32 executing program 2: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001400)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r1, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x83) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000300)=0xbd1, 0x4) ftruncate(r2, 0x80006) sendfile(r1, r2, 0x0, 0x8000fffffffe) 08:44:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f00000001c0)) 08:44:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) syz_open_pts(r0, 0x0) readv(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:33 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sendmsg$NFNL_MSG_COMPAT_GET(0xffffffffffffffff, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000001140)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/igmp\x00') r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS3\x00', 0x802, 0x0) sendfile(r4, r3, 0x0, 0x20000000000000d8) 08:44:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @ipv4={[], [], @loopback}, 0x3ff}, 0x1c) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000300)={{0x2, 0x0, @broadcast}, {0x0, @remote}, 0x4, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'vlan1\x00'}) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r2, 0x8983, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0xffc1}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000000)={{0x0, 0x0, @reserved="61a41e3a4786c412c2aaa2916e9e3d692aa4158a7110d14f04d2a72e735ed6ec"}}) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x1024) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x112) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0xa) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={@empty, @ipv4={[0x0, 0x0, 0x8], [], @multicast1}, @initdev={0xfe, 0x88, [0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24c20082, r5}) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) [ 1220.955082][ T4006] splice write not supported for file /ttyS3 (pid: 4006 comm: syz-executor.2) 08:44:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000300)=@known='system.posix_acl_access\x00') 08:44:35 executing program 4: r0 = socket$inet(0x2, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) 08:44:35 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000300)=""/250) 08:44:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) accept4(r1, 0x0, 0x0, 0x0) 08:44:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x7e, &(0x7f0000000380)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4bf38a9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0594ce1487e311e84395a80ad"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:35 executing program 4: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1008008, &(0x7f0000000000)=ANY=[]) 08:44:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x8a, &(0x7f0000000380)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4bf38a9aad9c9ba4c998db2f7155d302a7be122bb1609f8b0164eb12c07af20200169c864e1d5f8179cba2e431126de0594ce1487e311e84395a80adbe3e7f3622703c353de8e692"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) pipe(&(0x7f0000000080)) socket(0x10, 0x800000000080002, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 08:44:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:38 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, 0x0, 0x7, 0x801, 0x0, 0x0, {0xc, 0x0, 0xa}, [@NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x84}, 0x4000) chdir(&(0x7f0000000040)='./bus\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:44:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$sock(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001480)="4d19be16b52fe1fb60ae91b8d1f4a6a2b952c2c93cbcf7ae94165b44771b11e33f65490fbc4228b50f5f38706578bea101a063d8c9b605877016087a5f6a2cd59d04ee9c1435f612b8b118aed17d4f3d9f017e5de8e8c2aaabcf15fc8fb0a0fdf06526a011c9d6c54d5b3bd1289f208e155c3bef1625da330b7f26eb8649f31334d31786070e5595bd632ab6b562f08058216c8d18ed821fc508c36f8419d029c078411a42338972191b936aec8114731bc32cb73052ee2a5757b5dbc836b0ede3ebafb7c4e25692cb", 0xc9}], 0x1}, 0x0) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313af026ca16", 0x6e}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd87586553407860397d48842400126f8703ddc55ba4e", 0xec}, {}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1", 0x74}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a49f4b8971cf78556f3c6ca383a03d95fc318a9aeaccfa469ba8a16aa00a2bd34222049e1c038f769d461fd8e623ef4860aee8c34c32e6b311045684f83aae6d36aeb6430fcb2939da257013f355311245f449afac154a6576a3d7f5", 0x96}, {&(0x7f0000001940)="cd96bdb578810f35", 0x8}, {&(0x7f00000019c0)="b65836c3d98df987e963b3f2c6cd9a", 0xf}], 0x7}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f093e579a0ad13bbfa6dfcf5f92e9137fcecd3422187adb2613d1cb2a10ac11024822cad9f16a8b47c13f163ae0a1beeec0926acde449fbfe0e5541045b2c313750354dae2754d463", 0x49}], 0x1}}, {{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f00000021c0)}], 0x1}}], 0x3, 0x0) 08:44:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0), 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x137, &(0x7f0000000380)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x400000000}, 0x20) syz_open_procfs(0x0, 0x0) 08:44:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{0x0}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:39 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000040)) 08:44:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x1c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x42, &(0x7f00000003c0)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{0x0}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendmsg$sock(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r0, &(0x7f00000075c0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000300)="f685a288c84ec47e44864a1ae8659eb07e2f26d6c91f25104caa92162d00eba54e68088986aa066431445c5412f138db82e75760578858a6259283c4958956ef0217ed787072bbfb32de603a48f306d3e6346b7c9328b5b8f805a4dc61538e3bc88cdc349dabf717313af026ca16b9669abd0f8323058da774c0f518d781a7a8672c", 0x82}, {&(0x7f0000001780)="cfd063443cdc8585517304d96a713e7fb6273277543dd8cc3f1f2506e70e28180a2d2cf93495d7ef3a25d4b8a05b98a627ae8e98ed6f0fa2c78dd9ce1b9ef81f7c9274c78b728e5032c69cf8ebe9d42dd43d2f19d09e91a71f81c3b192d96cc627241b95ec8fbb6c71f603e0d07fcb5a6e07585208dd2ac721d2fdab2c29411f66ec7cca1e1760a2d6ca8af4ec79cae5c78430ea32a266856c8260e4de581475abdd2153aa8fea34789320ee7714903088dfd546a136d40646857b851b65a7a918c58881d275d5d71239c7698d7bdb3f879f49436bbbd87586553407860397d48842400126f8703ddc55ba4e", 0xec}, {&(0x7f0000000000)="40c11437fb00d6eab04b0c06251f8168813a461ace70236fa0348db1d319fe147c2390db325b8f9969aec8c50d", 0x2d}, {&(0x7f0000001600)="46a43e3f510e3eac779206060abfc1e723fc59d595e9948e6d03be0d6c89d8702d5f2332fe4e991d8ce010dd173f3035a16bc1ae729800e6c53d5b3b7deacf114c931c707559610cd1366220890b11cd862202abfbcd24a76a2f0f7044964480ebd12d0bca901ac0e4e3188cb74f2b45bc4f37e1694a1e15a039e34cf59a4c86cb1dc5210f4be91e84888a860ab5286ba2a15f0b04b178198d663c", 0x9b}, {&(0x7f0000001880)="bdcc25945d5320762605855bdd5022bce4d5ecd21753f95ce22bbec3d78b5644a4f358945013c7228ccdf35e86770ac02760d99e9206acc59036a4", 0x3b}], 0x5}}, {{0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001e00)="8f093e579a0ad13bbfa6dfcf5f92e9137fcecd3422187adb2613d1cb2a10ac11024822cad9f16a8b47c13f163ae0a1beeec0926acde449fbfe0e5541045b2c313750354dae2754d463", 0x49}], 0x1}}, {{0x0, 0x0, &(0x7f0000002380)=[{&(0x7f00000021c0)="d38874b7ef7ea6f303c4b44feba7174b2e17c595325b7a57e4197434591c1601", 0x20}], 0x1}}], 0x3, 0x0) 08:44:39 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001400)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000002c0)="b706f618e2da2557a9d2291d84b5ccc2d7c94186325df4fb335b", 0x1a}, {&(0x7f0000000300)="e3637c0300dbe572aba0e54f45d1", 0xe}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 08:44:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{0x0}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:41 executing program 5: pipe(&(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) pipe(&(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0xb, 0x0) 08:44:41 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="687567653d616c776179731415b727433093dc16ace38752eedddd8642fb73edd2840edd0bccd47c49c089b8f5e8a9fd1c296e2315d4d1146b0e50219534946013496fac7e04535c5856cb0d095434da50f9a7b6cc40c2f59bc181cc220d6c24c4cff29f81485aea18ed6b2d78a98ccc19"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = gettid() ptrace$setopts(0xffffffffffffffff, r1, 0x4b6, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x2e, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x2208, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="827734efc80c292f27c44cc385e3d973eadbf3b5581aa700b2cfbee85ce53efb2e210f9305c28e23d8de371e6734ef11460da2ea240ef96b6563d0dc98fe405827fb044cee18354c8b006a23017d22250452a06cdbdb6f95bef4db0b7f1400f0d45ee3614a21d3a404dcda25845f6495e1398e819cb45c590b"], 0x2, 0x2) r2 = dup(0xffffffffffffffff) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pread64(r2, &(0x7f0000000200)=""/181, 0xb5, 0x7) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r3, &(0x7f0000000280), 0x0, 0x3) [ 1229.426356][ T4162] tmpfs: Bad value for 'huge' 08:44:42 executing program 2: syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8000, &(0x7f0000000140)) 08:44:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) [ 1229.638480][ T4162] tmpfs: Bad value for 'huge' 08:44:42 executing program 2: r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff000}], 0x1}, 0x0) 08:44:42 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='huge=always']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x100, 0x0) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000100)={0x9b, 0xb, &(0x7f0000000440)="5a220f50b1f844e71a443a41d96907363ff16c0b98e64235d7c08ab81d2ab69d505e057b05386eac63c0365969506d9ad2c7b446c1597f0f00907031de028e22d76dcd9e9e4b6b2a9fa4ceaab3745f77388d7aacb72cbd75ae2db9f12a3379e505b98bf723a863481bfce339f8decda8f8c72db815b2105dcc586f7e61dd242ca8c5ef81b7ac84da7d790cfb367165348b3893e2a6cc6b8e7123653c05a772761fa4c65658cd37a131e80bfc87ff321376d2656ed091321b365fe3233c8602ca988e992f1424089443a0a23bdd7805a34ebd07229dcca9aae527003c697c5f322b255e9543474426530a9957f47008433e5c6c5f7e9bb0753206a0e3c4cbf91358fff66068e49f3635d61c7da2f1a8ef0189fb2218da11b762e0f2aece7b319e64632125ac9e4acb73d49b4e955a39e4f9d1c60893ab763f3f8e64a7f9fc891418cf7a93892fbf1e13212af3eb0519c2962e17b658122d8ac41af57a1be1c1b37803b0067ccb4059032be8f2a2afda1341b6dd679f6ce332bce27221bbd838ae0a600b37a2319d29a26956947d20a5a6c700b51310dbe18ade3267b2065160ccd6c4683d94f6e0bb87534729cabe2394c938742099f6d6527f8bd60ae3bc6af9fb7d882d70b958b67afd02cfa3509cbaf2dbbf2d0b2ad1eb1b958f7f1863ba00173b908c317ad7767f6170c0c5227247dc29418804665d19f76876a7a716063dd79e70b6cf2a19b4c88f5ff6afd1d44e48334ff0c8255c46ed0217df733eb32abc23966747dca90456e4284d98e7699ccbdc0cadf2c51aed88448d7fe491a3ba75c8933f13746006b37d39d9a212b909091d46fa17a20d3cbf27ac00e3665774e5a57fc9af9df948cffe5ccfe3231700a4e50e48edbf0017198ee4061c594c2a724632e3a00d1947f2f23bdc7229720a75bea6cc9121419eba129a34970c427c13949f545f7c06812faddd1b2666c9995951711f69516c8ee84045715d43a4284e552f97c8fc3ff24e63c4cee9b16463c129359ddf8016240fea7b64acc77c4580e15d76d990054e652890c5f17e984639ab1d37589c09499ae49e7568389892eca27f99553b078e010364fda6da2a7c0f3c0c404801465014acb39b7db29c6ddde1636414d0b99fe68f3ef45778e201e8c3463434f1868f2b572091caf71995c12a724ff536eb6ef7219c82efedd5e217e22811dbc3e9930d5461fea49c261208007dafdeb6d94312dca54ef28b5659fde0c897a3c0545c28c2ac2a4a14c27c63c50abbe7378a74ecb4dc7960563d46fb394fc58e164d59d6579a35d8fc3e8adaf05130fc504054bfe406863ab0cfd8ab2b4bf8668d06ca9c2427f9fce819419d0957edeaaaaa6fbad133e7213757e5df2bbdce04ac2ffbd4c18480a7215f6ec4cc61d7cf7ca9b88d657ef984526e434535f56e52bb1ae481cdda9717524a6e"}) pwrite64(r1, &(0x7f0000000280), 0x0, 0x3) 08:44:42 executing program 4: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) 08:44:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f19", 0x22) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000100), 0x4) 08:44:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/5, 0x5}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x1c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x50, &(0x7f00000003c0)="f7f249b9740c9e02007f00000000000032a5b60a00008024c30e478947d190ac00000000000000000000000097ba4ecb40a2ee2e32a3b88aaf3c06f4970e85a63c9a4b0d8b9aad9c9ba4c998db2f7155"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:45 executing program 5: 08:44:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:45 executing program 2: 08:44:45 executing program 3: syz_mount_image$tmpfs(&(0x7f00000002c0)='tmpfs\x00', &(0x7f0000000400)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6367e1eed7ee000000"]) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x94, 0x0, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xbafc}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8, 0x1, r0}]}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r0}, {0x8}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xffffffffffff9a81}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x94}, 0x1, 0x0, 0x0, 0x8810}, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./bus\x00', 0x0, &(0x7f0000000240)=@v1={0x2, 'w'}, 0x2, 0x2) r1 = dup(0xffffffffffffffff) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x92180, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x80000) socket$inet6(0xa, 0x0, 0x0) r2 = dup(0xffffffffffffffff) r3 = dup(0xffffffffffffffff) getsockopt$netlink(r3, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) ioctl$LOOP_SET_CAPACITY(r3, 0x4c07) getsockopt$netlink(r2, 0x10e, 0x0, &(0x7f00005c6000)=""/6, 0x0) pwrite64(r2, &(0x7f0000000280), 0x0, 0x3) 08:44:45 executing program 2: [ 1232.483774][ T4232] tmpfs: Unknown parameter 'cgáî×î' 08:44:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) getpid() perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:45 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, &(0x7f00000009c0)=""/179, 0x0, 0x14, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x0, 0x0, 0x1, 0x7f}, 0x10}, 0x78) r0 = socket$kcm(0xa, 0x2, 0x11) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001cc0)={0x0, 0x0, 0x0}, 0x400000c3) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000080)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @empty}}}], 0x40}, 0xbb8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000a80)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000800)=""/111, 0x6f}, {0x0}], 0x2, &(0x7f0000001d00)=""/4120, 0x1018}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x14, [], 0x0, 0x15, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000bc0)={0x0, 0x0, 0x1}, 0x10}, 0x78) openat$cgroup_ro(r1, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='memory.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0xc00000000000, 0x10002, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x96, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x599b5968a33876a5, 0x0, 0x0, 0x0, 0x0, 0xf3, 0x8a4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x44, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1232.782444][ T4232] tmpfs: Unknown parameter 'cgáî×î' 08:44:45 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='oom_score_adj\x00') readv(r0, &(0x7f00000014c0)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) 08:44:45 executing program 3: 08:44:45 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) getpid() perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:45 executing program 4: 08:44:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:48 executing program 3: 08:44:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:48 executing program 4: 08:44:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) getpid() perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:48 executing program 2: 08:44:48 executing program 4: 08:44:48 executing program 3: 08:44:48 executing program 2: 08:44:48 executing program 4: 08:44:48 executing program 3: 08:44:48 executing program 2: 08:44:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:51 executing program 4: 08:44:51 executing program 3: 08:44:51 executing program 2: 08:44:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) getpid() perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:51 executing program 2: 08:44:51 executing program 4: 08:44:51 executing program 3: 08:44:51 executing program 2: 08:44:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:51 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x114c3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x25) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=0x169, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a00500003000ffff0000000000000000000000008c050100480001000800010069666500200002801c000100000000000000000001000000000000001f00000000000000040006000c00070000000000000000000c0008000000000000000000400502"], 0x5a0}}, 0x0) 08:44:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_BEGIN_FF_ERASE(r0, 0x4004556e, &(0x7f0000000200)) 08:44:51 executing program 2: unshare(0x20000400) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') fcntl$setstatus(r0, 0x4, 0x4000) 08:44:51 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ac5e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) [ 1239.139386][ T4319] netlink: 1340 bytes leftover after parsing attributes in process `syz-executor.4'. 08:44:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6d, &(0x7f0000000200)="c4fe910c6786cec96ddb5322ad863ae8cb9b9d6c5b2821049d69d60a34ad866a422525ee105042f88d45e7886c0f2a93cd82682ce184dbd0f5ecb8a2ca2a6b7c896ce29e8f72ae59edff025c1dd027f9851190fc934ff0f1bb960b5e00b57f5afc611bd7160647f44ddf30923e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 08:44:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) getpid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x114c3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x25) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=0x169, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a00500003000ffff0000000000000000000000008c050100480001000800010069666500200002801c000100000000000000000001000000000000001f00000000000000040006000c00070000000000000000000c0008000000000000000000400502"], 0x5a0}}, 0x0) 08:44:52 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ac5e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) [ 1239.624368][ T4344] netlink: 1340 bytes leftover after parsing attributes in process `syz-executor.4'. 08:44:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x114c3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x25) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)=0x169, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYBLOB="a00500003000ffff0000000000000000000000008c050100480001000800010069666500200002801c000100000000000000000001000000000000001f00000000000000040006000c00070000000000000000000c0008000000000000000000400502"], 0x5a0}}, 0x0) 08:44:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xe43) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) [ 1239.846416][ T4352] netlink: 1340 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1240.924295][ T0] NOHZ tick-stop error: Non-RCU local softirq work is pending, handler #08!!! 08:44:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_SET_PHYS(r0, 0x406855c9, &(0x7f00000000c0)='syz0\x00') 08:44:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_SET_PHYS(r0, 0xc00c55ca, &(0x7f00000000c0)='syz0\x00') 08:44:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:54 executing program 2: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000640)=ANY=[]) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000440)) 08:44:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_DEV_SETUP(r0, 0x40045568, 0x0) 08:44:54 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_DEV_SETUP(r0, 0x8000552c, 0x0) 08:44:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@newtaction={0x48, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0x34, 0x1, [@m_ctinfo={0x30, 0x1, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x48}}, 0x0) 08:44:55 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af60, &(0x7f0000000440)={0x0, 0x2}) 08:44:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:55 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000003c0)="895b74e2ed7a32ea79b717bc42c33a565d019abadd5a3d871dbb918bcc1518839ca88193da410d75165f0b7b52661c355c44fe7c9b54d75cec5971fba94f4d35647a799be05a9b5a2b1882bac98dd9b45cdafcfbbe1e3d7c2974d348d2e528d360381c5353709d09745856c834a2f893454d9f4f0000266300481bfb1ce8366858835bb1ebed3764d54bcffae0832fe47198a7a0", 0x94}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 08:44:55 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="ac020000170001000000000000000001e0000001000000000000000000000000000000000000000000000000000000000000ffffac14142dabbac900000000000000000000000000fe8000000000000000000000000000aa00"/104, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000e000000100000000000000000000000000000000000000000200000000000000", @ANYBLOB="364cf9ebc838c863851d1a20592ae7f1f06aba2bd3e94f878df339279f07c7dee803727b795c028ffec01b7f843c36f4acb0d029ef84b8b1d9eede775862e1884e47eefbf982cfc5937df5444a14e761d463cd3d6bc87ba5cbb6ba48350b0a3d7cc0570742a7bff521e4de039f"], 0x2ac}}, 0x0) 08:44:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:55 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/seq\x00', 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick=0x6, {}, {}, @connect}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x12}) 08:44:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) [ 1242.944654][ T4413] netlink: 388 bytes leftover after parsing attributes in process `syz-executor.4'. 08:44:55 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x114c3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) get_robust_list(0x0, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x25) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x3, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200187ec, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x5801}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYRESOCT, @ANYBLOB="74c69cac97946398f3874c7eae4a6696fffa552ee128cecdff03d1a3e689b32898fa3f71c8d36a907fcb840cac6276e95201e7468a2f6e578faaf6fd5e0f930db3ccfe3078e07cd854cceda168bbf14730467ce265ba9aa768341790d1a1da70d2019053c5072a60a6a388f57f8790e17af0066dcef68cd8b56c711b116eade82f444ef2a24b23fa7fd53a0d", @ANYBLOB="103fe8e166090500633d0c744bfa86b974ad74f601f83a5831d2e199ed2ea6a60d6c666a8e4f3375ee260acc9d92ddd07395feca20bedf15c15389a2", @ANYRESHEX, @ANYRES64, @ANYRESHEX, @ANYRESOCT], 0x1000001bd) 08:44:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:55 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_DEV_SETUP(r0, 0x10, 0x0) 08:44:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs\x00') lseek(r0, 0x4, 0x0) 08:44:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff036}]}, 0x10) 08:44:58 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4207, r0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:44:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:58 executing program 4: r0 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x20, 0x2e, 0x707}, 0x20}}, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 08:44:58 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) lseek(r0, 0x3fff80000000, 0x1) 08:44:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:44:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:44:58 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000080)={@local, @local, @val={@void}, {@ipv4={0x8864, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x0, 0x0, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) 08:44:58 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_DEV_SETUP(r0, 0x40045564, 0x0) 08:44:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x6000000, &(0x7f0000000200)={&(0x7f0000000040)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_ACTIVE_SLAVE={0x8, 0x1b, r3}, @IFLA_BOND_MODE={0x5, 0x1, 0x5}]}}}]}, 0x44}}, 0x0) 08:44:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:44:59 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) unshare(0x20000400) ioctl$UI_BEGIN_FF_ERASE(r0, 0x40045568, &(0x7f0000000200)) [ 1246.626307][ T4477] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1246.669324][ T4477] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: invalid value (5) [ 1246.737780][ T4484] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 1246.778179][ T4484] (unnamed net_device) (uninitialized): option tlb_dynamic_lb: invalid value (5) 08:44:59 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x5411, 0x0) 08:45:01 executing program 3: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x141242, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') r3 = openat(r2, &(0x7f0000000080)='./file0\x00', 0x145042, 0x0) r4 = memfd_create(&(0x7f00000000c0)='\xe58\xb9C;`\xb6p\x98\xcf\x1dT\b$$+\x10\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) sendfile(r3, r4, 0x0, 0x200000f) ftruncate(r3, 0x100) sendfile(r1, r1, 0x0, 0x7fffffff) 08:45:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 08:45:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a3daf2f73451c0e17a606fe530cb7d7f933eda023ee7cf43548ee858e07dfbdfd43307c529a4ce6be614c2c794f72ebf5fe3178966170201000000000000008258f8dbe82e16cf8db95f5b068a9e0000000000000000000000000000c97822a4986765f09a920000000000000000c9a08be60000f2000018287ba7d8807c0ee93ea1bb7f00a15deb269d0a91985602763e4d70db04da006a3d6eef8fb7fcdd82eb1e4841a6e5f6c736ca55eca29effe5084e2a8c3a32798a47420748e3607235f93c5fc0eea40f013e18ab940ae4724d98f521cbe75bb22444e03a4f3fd39da854ec5ee5d610884b75c8ac79338717293d65dd15fb587a0000000000000000000000000000000000000000cdc4450a11fdcbddcdf8853154ee2bcafbea3973bf0ab8d7d161b27c0ae496f410938e8201dfb9250fe64ac5f2f09a92cedc5e44c9a8c440f7ab3fd537af95742b37132e5adc8ac8ddb6aa8e18b1c37ea61a4c2b863e4ee473448a2cc0233560a11b1a7de7637f9d94ec7c6ff8b723e32ee4358603e9ed3be8399d045dc4e0d49bb6453374a705529ffa95b8fa67643123802fe7523a089520ed533fb035808319350a68ce6c06ada74f74f2f39fa952fb8d5f09a0865bd16caf203fe8b14ad029f2cc027d711ecc8b364d834912e04aebcbd4d185509c4409afadab456a32e146c62486244c2fbe431c4e37d64f1d7f675992ad556706d40da2e9f2f9c6ef3a4e9a856cac23bd95c600569c7ebd481de8a63e3f7e4186c0bb88e704958cc3b9a68450f3da7f9a83000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={r0, 0x8001a0, 0x1c, 0x5ac484bb51fa106a, &(0x7f0000000380)="4d50b441e692763513ef874588a80000000100000000122e25d30806", 0x0, 0x403, 0xe00, 0x22d}, 0x28) 08:45:01 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@updpolicy={0xc4, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@mark={0xc}]}, 0xc4}}, 0x0) 08:45:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/4077, 0xfed}], 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x20) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[], 0xffffff78) 08:45:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="895b74e2ed7a00ea79b717bc42c33a565d019abadd5a3d871dbb91c42e13c840be72015827bcd8bded39191992264088b91d90f6f36fc6533b2f5b631c65d313258dd10278199fba2766bce85b72d82815bcdc5229ed45d1545c312f6d916fb1d4bfa6e68504000000000000002da6be788d7ceb83fdd8b32575d37400000000000000000054b7476c31547097a9322de4770ad1d883c99fb1b435e9be385476e6ea7b98b431b5945bb03dbe5faa2183531885fca6a07a88c7441e69cbf9cb7c84c4853f07e2e623359a16e3560507fb13e3157dc63a8c9cce223ee2de0e09afc00e36fffda739cbeaec69cc9d7c3eeff8f56644c803f621", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x5) 08:45:01 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)) 08:45:01 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='//selinux\x00\x00\x01\x10') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='fd/3\x00') r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x145042, 0x0) r2 = memfd_create(&(0x7f00000000c0)='\xe58\xb9C;`\xb6p\x98\xcf\x1dT\b$$+\x10\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000140)="fb", 0x1}], 0x1, 0x18180b, 0x0) sendfile(r1, r2, 0x0, 0x200000f) ftruncate(r1, 0x100) 08:45:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1ac5e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f00000000c0)={"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"}) [ 1249.393869][ T4512] ------------[ cut here ]------------ [ 1249.399398][ T4512] WARNING: CPU: 0 PID: 4512 at arch/x86/entry/common.c:692 idtentry_exit+0x4a/0x90 [ 1249.408678][ T4512] Kernel panic - not syncing: panic_on_warn set ... [ 1249.415281][ T4512] CPU: 0 PID: 4512 Comm: syz-executor.3 Not tainted 5.8.0-rc6-next-20200724-syzkaller #0 [ 1249.425082][ T4512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1249.435228][ T4512] Call Trace: [ 1249.438528][ T4512] dump_stack+0x18f/0x20d [ 1249.442872][ T4512] panic+0x2e3/0x75c [ 1249.446776][ T4512] ? __warn_printk+0xf3/0xf3 [ 1249.451377][ T4512] ? printk+0xba/0xed [ 1249.455367][ T4512] ? log_store.cold+0x16/0x16 [ 1249.460050][ T4512] ? no_context+0x120/0x9f0 [ 1249.464556][ T4512] ? __warn.cold+0x5/0x45 [ 1249.468895][ T4512] ? idtentry_exit+0x4a/0x90 [ 1249.473484][ T4512] __warn.cold+0x20/0x45 [ 1249.477730][ T4512] ? idtentry_exit+0x4a/0x90 [ 1249.482411][ T4512] report_bug+0x1bd/0x210 [ 1249.486740][ T4512] handle_bug+0x38/0x90 [ 1249.490902][ T4512] exc_invalid_op+0x14/0x40 [ 1249.495410][ T4512] asm_exc_invalid_op+0x12/0x20 [ 1249.500265][ T4512] RIP: 0010:idtentry_exit+0x4a/0x90 [ 1249.505464][ T4512] Code: 91 00 00 00 02 74 18 40 84 f6 75 3e 65 8b 05 2d 8b 15 78 a9 ff ff ff 7f 74 14 e9 11 98 8d f9 40 84 f6 75 42 c3 e9 86 fc ff ff <0f> 0b eb c7 e8 8d 95 75 f9 65 48 8b 04 25 c0 fe 01 00 48 8b 00 a8 [ 1249.525078][ T4512] RSP: 0018:ffffc900061d72d0 EFLAGS: 00010002 [ 1249.531153][ T4512] RAX: 0000000000000001 RBX: 0000000000000000 RCX: ffffc9000f303000 [ 1249.539134][ T4512] RDX: 0000000000040000 RSI: 0000000000000000 RDI: ffffc900061d7308 [ 1249.547115][ T4512] RBP: ffffc900061d7308 R08: 0000000000000000 R09: 0000000000000000 [ 1249.555089][ T4512] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1249.563150][ T4512] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1249.571141][ T4512] exc_page_fault+0xc2/0x160 [ 1249.575747][ T4512] asm_exc_page_fault+0x1e/0x30 [ 1249.580608][ T4512] RIP: 0010:__softirqentry_text_end+0x39/0x55 [ 1249.586683][ T4512] Code: e0 04 e0 ff b8 f2 ff ff ff 31 d2 e9 b6 67 cc ff 41 bf f2 ff ff ff 31 c0 e9 dc 41 e1 f8 41 bf f2 ff ff ff 31 ed e9 f7 41 e1 f8 <41> be f2 ff ff ff 48 31 c0 e9 04 45 e1 f8 41 be f2 ff ff ff 48 31 [ 1249.606291][ T4512] RSP: 0018:ffffc900061d73b0 EFLAGS: 00010046 [ 1249.612365][ T4512] RAX: 0000000000003e30 RBX: ffffc900061d7470 RCX: ffffc9000f303000 [ 1249.620345][ T4512] RDX: 0000000000040000 RSI: ffffffff81014f60 RDI: 0000000000000006 [ 1249.628318][ T4512] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff88804a578307 [ 1249.636296][ T4512] R10: 0000000000000000 R11: 0000000000000001 R12: ffffc900061d747c [ 1249.644271][ T4512] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88804a578300 [ 1249.652263][ T4512] ? perf_callchain_user+0x800/0xba0 [ 1249.657562][ T4512] get_perf_callchain+0x321/0x620 [ 1249.662591][ T4512] ? put_callchain_entry+0x90/0x90 [ 1249.667714][ T4512] ? kvm_sched_clock_read+0x14/0x40 [ 1249.672914][ T4512] ? sched_clock+0x2a/0x40 [ 1249.677334][ T4512] ? sched_clock_cpu+0x18/0x1b0 [ 1249.682189][ T4512] perf_callchain+0x165/0x1c0 [ 1249.686876][ T4512] perf_prepare_sample+0x8fd/0x1d40 [ 1249.692077][ T4512] ? perf_callchain+0x165/0x1c0 [ 1249.696926][ T4512] ? perf_callchain+0x1c0/0x1c0 [ 1249.701776][ T4512] ? perf_prepare_sample+0x8ab/0x1d40 [ 1249.707146][ T4512] perf_event_output_forward+0xf3/0x270 [ 1249.712692][ T4512] ? perf_prepare_sample+0x1d40/0x1d40 [ 1249.718148][ T4512] ? perf_event_output_forward+0x18c/0x270 [ 1249.723954][ T4512] __perf_event_overflow+0x13c/0x370 [ 1249.729236][ T4512] perf_swevent_event+0x347/0x550 [ 1249.734256][ T4512] ? tracing_generic_entry_update+0x1e3/0x260 [ 1249.740321][ T4512] perf_tp_event+0x2e4/0xb50 [ 1249.744915][ T4512] ? perf_swevent_event+0x347/0x550 [ 1249.750111][ T4512] ? perf_event_mmap_output+0xa30/0xa30 [ 1249.755653][ T4512] ? perf_tp_event+0x622/0xb50 [ 1249.760419][ T4512] ? lock_acquire+0x1f1/0xad0 [ 1249.765093][ T4512] ? lock_release+0x571/0x8e0 [ 1249.769767][ T4512] ? mark_held_locks+0x9f/0xe0 [ 1249.774526][ T4512] ? lock_release+0x571/0x8e0 [ 1249.779201][ T4512] ? lockdep_hardirqs_on+0x76/0xf0 [ 1249.784310][ T4512] ? finish_task_switch+0x1dc/0x750 [ 1249.789503][ T4512] ? __switch_to+0x425/0xfe0 [ 1249.794086][ T4512] ? lock_is_held_type+0xbb/0xf0 [ 1249.799022][ T4512] ? __schedule+0x910/0x21e0 [ 1249.803607][ T4512] ? io_schedule_timeout+0x140/0x140 [ 1249.808889][ T4512] ? perf_duration_warn+0x40/0x40 [ 1249.813999][ T4512] ? perf_trace_run_bpf_submit+0x11c/0x200 [ 1249.819802][ T4512] perf_trace_run_bpf_submit+0x11c/0x200 [ 1249.825431][ T4512] perf_trace_lock+0x2e2/0x4a0 [ 1249.830194][ T4512] ? perf_trace_run_bpf_submit+0x11c/0x200 [ 1249.835997][ T4512] ? __lockdep_free_key_range+0x110/0x110 [ 1249.841712][ T4512] ? perf_trace_lock+0x2e2/0x4a0 [ 1249.846650][ T4512] ? __do_sys_perf_event_open+0x1c5a/0x2b50 [ 1249.852539][ T4512] ? __lockdep_free_key_range+0x110/0x110 [ 1249.858255][ T4512] lock_release+0x571/0x8e0 [ 1249.862757][ T4512] ? lock_downgrade+0x830/0x830 [ 1249.867602][ T4512] ? lock_acquire+0x1f1/0xad0 [ 1249.872276][ T4512] ? __do_sys_perf_event_open+0x1c0a/0x2b50 [ 1249.878168][ T4512] ? find_held_lock+0x2d/0x110 [ 1249.882932][ T4512] __mutex_unlock_slowpath+0x81/0x610 [ 1249.888299][ T4512] ? mark_held_locks+0x9f/0xe0 [ 1249.893057][ T4512] ? wait_for_completion+0x260/0x260 [ 1249.898338][ T4512] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 1249.904310][ T4512] ? trace_hardirqs_on+0x5f/0x220 [ 1249.909334][ T4512] __do_sys_perf_event_open+0x1c5a/0x2b50 [ 1249.915055][ T4512] ? perf_event_set_output+0x4c0/0x4c0 [ 1249.920510][ T4512] ? put_timespec64+0xcb/0x120 [ 1249.925269][ T4512] ? ns_to_timespec64+0xc0/0xc0 [ 1249.930135][ T4512] ? lock_is_held_type+0xbb/0xf0 [ 1249.935069][ T4512] ? do_syscall_64+0x1c/0xe0 [ 1249.939666][ T4512] ? lockdep_hardirqs_on_prepare+0x354/0x530 [ 1249.945639][ T4512] do_syscall_64+0x60/0xe0 [ 1249.950055][ T4512] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1249.955947][ T4512] RIP: 0033:0x45c369 [ 1249.959827][ T4512] Code: Bad RIP value. [ 1249.963882][ T4512] RSP: 002b:00007f92b74aec78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1249.972379][ T4512] RAX: ffffffffffffffda RBX: 00000000000230c0 RCX: 000000000045c369 [ 1249.980346][ T4512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002025c000 [ 1249.988315][ T4512] RBP: 000000000078bf50 R08: 0000000000000000 R09: 0000000000000000 [ 1249.996375][ T4512] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000078bf0c [ 1250.004338][ T4512] R13: 00007ffe8cd2836f R14: 00007f92b74af9c0 R15: 000000000078bf0c [ 1250.013470][ T4512] Kernel Offset: disabled [ 1250.017788][ T4512] Rebooting in 86400 seconds..