le0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 09:14:25 executing program 5: 09:14:25 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x36, 0x4) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x4000, 0x0) 09:14:25 executing program 3: 09:14:25 executing program 2: 09:14:26 executing program 2: 09:14:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x4000, 0x0) 09:14:26 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 09:14:26 executing program 2: 09:14:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) openat$sequencer(0xffffffffffffff9c, 0x0, 0x4000, 0x0) 09:14:26 executing program 2: 09:14:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x0, 0x0) 09:14:26 executing program 5: 09:14:26 executing program 2: 09:14:26 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 09:14:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x0, 0x0) 09:14:26 executing program 3: 09:14:26 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x36, 0x4) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:26 executing program 2: 09:14:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000005, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/sequencer\x00', 0x0, 0x0) 09:14:26 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(0x0, &(0x7f00000001c0)='./file1\x00') 09:14:26 executing program 2: 09:14:26 executing program 2: 09:14:26 executing program 4: 09:14:26 executing program 5: 09:14:26 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(0x0, &(0x7f00000001c0)='./file1\x00') 09:14:26 executing program 2: 09:14:26 executing program 4: 09:14:26 executing program 3: 09:14:26 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x36, 0x4) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:26 executing program 2: 09:14:26 executing program 4: 09:14:26 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(0x0, &(0x7f00000001c0)='./file1\x00') 09:14:26 executing program 4: 09:14:26 executing program 2: 09:14:26 executing program 4: 09:14:27 executing program 5: 09:14:27 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000200)) r1 = syz_open_pts(r0, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/9, 0x9}], 0x1) 09:14:27 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', 0x0) 09:14:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 09:14:27 executing program 3: 09:14:27 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x36, 0x4) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:27 executing program 3: 09:14:27 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', 0x0) 09:14:27 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442"]) chdir(&(0x7f0000000380)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', 0x0) 09:14:27 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x36, 0x4) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:27 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 09:14:27 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 09:14:27 executing program 3: 09:14:27 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x15, r0, 0x0, 0x0) 09:14:27 executing program 0: ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) gettid() prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) rt_sigpending(0x0, 0xfffffffffffffceb) 09:14:27 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/61, 0x3d}}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1000000000000385) 09:14:27 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:27 executing program 4: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x84007bf7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpid() r2 = dup2(r0, r0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ptrace(0x10, r1) creat(&(0x7f0000000040)='./file0\x00', 0x0) sendto(r2, 0x0, 0x0, 0x4000, 0x0, 0x0) execve(0x0, 0x0, 0x0) ptrace(0x11, r1) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) 09:14:28 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) 09:14:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:28 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bc0") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x800, 0x101200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xb7, 0x80, 0x99a, 0x0, 0x1}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0x1e, "9cb41cb89a49c0c4c3cef430e4882f3d24fca2b81afcf9453a36955bf9f3"}, 0x0) pipe2$9p(&(0x7f00000000c0), 0x4000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r3, 0x401}, 0x8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000440)={0x5, 0x5, 0x2, 0x2}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3f, &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x8, 0x2, 0x1, r1}) [ 358.389343] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 358.423008] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:14:28 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 09:14:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) 09:14:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bc0") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x800, 0x101200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xb7, 0x80, 0x99a, 0x0, 0x1}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0x1e, "9cb41cb89a49c0c4c3cef430e4882f3d24fca2b81afcf9453a36955bf9f3"}, 0x0) pipe2$9p(&(0x7f00000000c0), 0x4000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r3, 0x401}, 0x8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000440)={0x5, 0x5, 0x2, 0x2}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3f, &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x8, 0x2, 0x1, r1}) 09:14:28 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3a9, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46000000ff020000000000000000f9909d880000000000000000000000000000004000000000000000000000000000000000000000000038000000c7092d0000000000000000000000000000000000000000000000000000000000000000930000000000000000000000000000000000000000000000000000289d018a2fb6b0efcbca15c2fe55985f705997f3d2fa4f380341fb1b4f3f9d272a7b19b7bdd2e8098f760a71d31fa7e23f5490cded508c018ead3cfe991c61c2b782b042011d2f1405d2029447"], 0xc9) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x105) write$binfmt_aout(r0, &(0x7f0000000680)={{}, "", [[], [], [], [], [], [], []]}, 0x720) 09:14:28 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:28 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:28 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000fff900040000ffff047800004000000000e9088a0100dc0100df77000000007f312e66f2c10d014e"], 0x3c) 09:14:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000400)={0x0, 0x0, @ioapic={0x1f005, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0x4}]}}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000080)={0x8, 0xffff}) 09:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000fff900040000ffff047800004000000000e9088a0100dc0100df77000000007f312e66f2c10d014e"], 0x3c) [ 359.291742] SELinux: ebitmap start bit (1308691905) is not a multiple of the map unit size (64) [ 359.330495] SELinux: failed to load policy 09:14:29 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') [ 359.365213] SELinux: ebitmap start bit (1308691905) is not a multiple of the map unit size (64) [ 359.380585] SELinux: failed to load policy 09:14:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000004080513f14d11fffdffff010a0000000c00030084ffffff7d0a00b60c0002000002fa17711104a6"], 0x2c}}, 0x0) 09:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000fff900040000ffff047800004000000000e9088a0100dc0100df77000000007f312e66f2c10d014e"], 0x3c) 09:14:29 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:29 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:29 executing program 3: socket$inet6(0xa, 0x400000000001, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x803, 0x3) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(0xffffffffffffffff, 0x5382, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f0000000380)={0x2, 0x40, 0x9, 0xfffffffffffffffa, 0x5, 0x3}) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 09:14:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0xa, &(0x7f0000000180)=0x400, 0x4) 09:14:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, 0x0) [ 359.866766] SELinux: ebitmap start bit (1308691905) is not a multiple of the map unit size (64) [ 359.895527] SELinux: failed to load policy 09:14:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) 09:14:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757816000000fff900040000ffff047800004000000000e9088a0100dc0100df77000000007f312e66f2c10d014e"], 0x3c) 09:14:29 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:29 executing program 2: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000080)={0x0, 0x7530}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socket$packet(0x11, 0x3, 0x300) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) creat(0x0, 0x0) r4 = getuid() lstat(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000440)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="6e0000007d02000000520001000300000040030000263c6600000000000000000000000000ffffff7f0000010009000000000000000600766d6e6574310900746872656164656400090074687265616465640007009f246c6f252121070074727573746564", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6], 0x71) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f00000001c0), 0xfffffef3) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000100)=0x101) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x800002, 0x11, r8, 0x27) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@mcast2, @in=@multicast2}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000340)=0xe8) read(r7, &(0x7f0000000000)=""/250, 0x128b9372) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) splice(r9, &(0x7f0000000140)=0x8, r3, &(0x7f00000001c0), 0x1, 0x7) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(r3, &(0x7f0000000200)='threaded\x00', 0xf642e7e) sendfile(r1, r2, 0x0, 0x8000fffffffe) 09:14:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:29 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:14:29 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000004080513f14d11fffdffff010a0000000c0003002f0000007d0a00b60c0002000002fa17711104a6"], 0x2c}}, 0x0) [ 360.122396] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 360.129456] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 360.204779] SELinux: ebitmap start bit (1308691905) is not a multiple of the map unit size (64) [ 360.214701] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 360.256389] SELinux: failed to load policy [ 360.319543] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 09:14:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) 09:14:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000140)) 09:14:30 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ad56b6c5820000000000000000a5ddf7", 0x10) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x1}}, 0x0) recvfrom(r2, &(0x7f0000001240)=""/4096, 0xffffff9a, 0x0, 0x0, 0xfffffffffffffef2) 09:14:30 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') [ 360.360481] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 09:14:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000140)) 09:14:30 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:30 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) 09:14:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/236, 0xec}], 0x63, 0x400000000000) 09:14:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:14:30 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x7, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000280)="c142690a7785cdaa1d35c97dcda54f68a6a0266925548f4ce48ac6033a8f3444f56a9076b4ea03b4670fc1fb858e3ceca70cfab5737bc909f3e40a69659cd95abd0e9fb54dc0d084d3fd5fc2249d2cb26ad81dca461eb00c35a62437ef95e090459508e5afc64cb859b012749de745f5efa9055bed4f1f97b3f3a38f8bebfb46dd4711c14a32570755c7c0b55590c2a321d34abef49fdfe92c44e2848393c7325b3326682b39f679d5b50b7d3a7efb1a46075dad7aac0add8a2068bfd8061f22f1ad00e5b1a5f01f8ed2577a6c039166e9686a5f", 0x6}}) 09:14:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bc0") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x800, 0x101200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xb7, 0x80, 0x99a, 0x0, 0x1}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0x1e, "9cb41cb89a49c0c4c3cef430e4882f3d24fca2b81afcf9453a36955bf9f3"}, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={r3, 0x401}, 0x8) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000200)) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000440)={0x5, 0x5, 0x2, 0x2}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3f, &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x8, 0x2, 0x1, r1}) 09:14:31 executing program 2: syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") syz_execute_func(&(0x7f00000001c0)="410f01f9c4e1f573d50664ff0941c3c442edbc1a46d87312120fd2323e470fb74b08d4b842e69dcc650f1bcc") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f0000000180)='./file0\x00', 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) ptrace(0x11, r0) 09:14:31 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:31 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) 09:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000180)=0x400, 0x4) 09:14:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:31 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:31 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:31 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) 09:14:31 executing program 3: 09:14:31 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:31 executing program 3: 09:14:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local={0x5}, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff86, 0x0, 0x0, 0x0, [0x14, 0x2], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3801, 0x3, 0x0, 0x0, 0x4]}, @mcast2}}}}}}}, 0x0) 09:14:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:34 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x5) syz_execute_func(&(0x7f0000000000)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") clone(0x400002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$sock_timeval(r0, 0x1, 0x0, 0x0, 0x0) 09:14:34 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 09:14:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:34 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:34 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:34 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:34 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:34 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) 09:14:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:35 executing program 3: 09:14:35 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:35 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x1000011, 0x1000000000000b, 0xfffffffffffefffd) sendmsg(r1, 0x0, 0x40000) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000004c0)=0xe408, &(0x7f0000000500)=0x4) syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f0000000640)={&(0x7f0000000540), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8050) r2 = socket$packet(0x11, 0x0, 0x300) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ff}]}, 0x10) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x0) dup(r0) syz_genetlink_get_family_id$tipc(0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000280)=0x4) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f00000002c0)) getpgid(0x0) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0x0, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, r3, 0x0) add_key$keyring(0x0, &(0x7f0000000800)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 09:14:35 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:35 executing program 5: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:35 executing program 2: 09:14:35 executing program 2: 09:14:35 executing program 3: 09:14:35 executing program 2: 09:14:35 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:35 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) fsetxattr$security_evm(r0, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:35 executing program 2: 09:14:35 executing program 2: 09:14:35 executing program 5: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:35 executing program 2: 09:14:35 executing program 3: 09:14:35 executing program 2: 09:14:35 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:35 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:35 executing program 2: 09:14:35 executing program 2: 09:14:35 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:35 executing program 2: 09:14:35 executing program 5: r0 = socket$inet6(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:35 executing program 3: 09:14:35 executing program 2: 09:14:35 executing program 5: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:35 executing program 2: 09:14:36 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:36 executing program 2: 09:14:36 executing program 3: 09:14:36 executing program 2: 09:14:36 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:36 executing program 2: 09:14:36 executing program 2: 09:14:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:36 executing program 5: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:36 executing program 2: 09:14:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:36 executing program 2: 09:14:36 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:36 executing program 3: 09:14:36 executing program 2: 09:14:36 executing program 2: 09:14:36 executing program 2: [ 366.688194] overlayfs: failed to resolve './file1': -2 09:14:36 executing program 2: 09:14:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:36 executing program 5: socket$inet6(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) 09:14:36 executing program 2: 09:14:36 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:36 executing program 2: 09:14:36 executing program 3: 09:14:36 executing program 2: 09:14:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 09:14:36 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:36 executing program 2: 09:14:36 executing program 2: 09:14:36 executing program 3: 09:14:36 executing program 2: 09:14:36 executing program 2: [ 367.195579] overlayfs: failed to resolve './file0': -2 09:14:37 executing program 2: 09:14:37 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:37 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 09:14:37 executing program 3: 09:14:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:37 executing program 2: 09:14:37 executing program 2: 09:14:37 executing program 2: 09:14:37 executing program 2: [ 367.451989] overlayfs: failed to resolve './file1': -2 09:14:37 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:37 executing program 2: 09:14:37 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:37 executing program 2: 09:14:37 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) 09:14:37 executing program 2: 09:14:37 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:37 executing program 3: 09:14:37 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:37 executing program 2: 09:14:37 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:37 executing program 2: 09:14:37 executing program 2: 09:14:37 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:37 executing program 2: 09:14:37 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, 0x0}, 0x0) 09:14:37 executing program 2: 09:14:37 executing program 3: 09:14:38 executing program 2: 09:14:38 executing program 1: mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:38 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:38 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, 0x0}, 0x0) 09:14:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:38 executing program 3: 09:14:38 executing program 2: 09:14:38 executing program 2: 09:14:38 executing program 3: 09:14:38 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, 0x0}, 0x0) 09:14:38 executing program 2: 09:14:38 executing program 2: 09:14:38 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 368.539454] overlayfs: failed to resolve './file1': -2 09:14:38 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:38 executing program 2: 09:14:38 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 09:14:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:38 executing program 3: 09:14:38 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:38 executing program 2: 09:14:38 executing program 2: 09:14:38 executing program 2: 09:14:38 executing program 2: 09:14:38 executing program 3: 09:14:38 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:38 executing program 2: 09:14:38 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 09:14:38 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:38 executing program 2: 09:14:38 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:38 executing program 2: 09:14:38 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 09:14:38 executing program 2: 09:14:38 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:38 executing program 3: 09:14:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:38 executing program 2: 09:14:38 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:38 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:39 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 3: 09:14:39 executing program 2: 09:14:39 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 09:14:39 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:39 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:39 executing program 3: 09:14:39 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:39 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 09:14:39 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:39 executing program 2: 09:14:39 executing program 2: 09:14:39 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:39 executing program 2: 09:14:39 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:39 executing program 2: 09:14:39 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x101000, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0xa) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xfff, 0x2, 0x40, 0x0, 0x0, 0x14f, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0x2, 0x0, 0x0, 0x400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x7fff, 0x9, 0x5, 0x7ff, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x84f, 0x5, 0x7, 0x0, 0x9e1}, 0x0, 0x0, r2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) 09:14:39 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000001, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)) 09:14:39 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:39 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 09:14:40 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:40 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:40 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:40 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 09:14:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x7) ioctl(r0, 0x1000008924, &(0x7f0000000100)) 09:14:40 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:40 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000440)='/dev/net/tun\x00', 0x101000, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x800) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0xda4fff08) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r2, 0xa) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x2) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xfff, 0x2, 0x40, 0x0, 0x0, 0x14f, 0x0, 0x0, 0x0, 0x3ff, 0x8, 0x0, 0x2, 0x0, 0x0, 0x400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x7fff, 0x9, 0x5, 0x7ff, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x84f, 0x5, 0x7, 0x0, 0x9e1}, 0x0, 0x0, r2, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x660c, 0x0) 09:14:40 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:40 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 09:14:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) [ 371.189554] sp0: Synchronizing with TNC 09:14:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:41 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:41 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:41 executing program 0: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3a9, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7f454c46000000ff020000000000000000f9909d880000000000000000000000000000004000000000000000000000000000000000000000000038000000c7092d0000000000000000000000000000000000000000000000000000000000000000930000000000000000000000000000000000000000000000000000289d018a2fb6b0efcbca15c2fe55985f705997f3d2fa4f380341fb1b4f3f9d272a7b19b7bdd2e8098f760a71d31fa7e23f5490cded508c018ead3cfe991c61c2b782b042011d2f1405d2029447"], 0xc9) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x7, 0x105) write$binfmt_aout(r0, &(0x7f0000000680)={{}, "", [[]]}, 0x120) 09:14:41 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:42 executing program 3: 09:14:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3", 0x2b}], 0x1}, 0x0) 09:14:42 executing program 2: 09:14:42 executing program 0: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:42 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000001c0)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x658}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 09:14:42 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:42 executing program 0: mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x8010aebc, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 09:14:42 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:42 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000001, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x9, "d60700000000000000000032f101000080917149fd661837b011b15f24fc4d12"}) 09:14:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bc0") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x800, 0x101200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xb7, 0x80, 0x99a, 0x0, 0x1}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x4000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x401}, 0x8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000440)={0x0, 0x5, 0x2, 0x2}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3f, &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x8, 0x2, 0x1, r1}) 09:14:42 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3", 0x2b}], 0x1}, 0x0) 09:14:42 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bc0") syz_emit_ethernet(0x211d49, &(0x7f0000000000)={@local, @empty=[0x2, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300030, 0x6c, 0x0, @ipv4={[0x2], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff89, 0x0, 0x0, 0x0, [0x9, 0x29], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x800, 0x101200) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0xb7, 0x80, 0x99a, 0x0, 0x1}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0), 0x4000) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x401}, 0x8) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000440)={0x0, 0x5, 0x2, 0x2}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x3f, &(0x7f00000004c0), &(0x7f0000000500)) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000280)={0x8, 0x2, 0x1, r1}) 09:14:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0xf, &(0x7f00000010c0), &(0x7f0000f24000)=0x4) 09:14:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3", 0x2b}], 0x1}, 0x0) 09:14:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, 0x1c) r2 = dup2(r0, r0) ioctl$EVIOCGLED(r2, 0x80404519, 0x0) 09:14:42 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1}, 0x0) 09:14:42 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:42 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:42 executing program 3: msync(&(0x7f0000108000/0x2000)=nil, 0x2000, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000002c0)=0xfffffffffffffea0) shmat(0x0, &(0x7f000010a000/0x4000)=nil, 0x5000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1}, 0x0) 09:14:42 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:42 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75a", 0x40}], 0x1}, 0x0) 09:14:42 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:42 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:43 executing program 2: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$setregset(0x4203, r0, 0x0, 0x0) 09:14:43 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1}, 0x0) 09:14:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:43 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x201) io_setup(0xa, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x1, 0x0, r0, 0x0, 0xffffff1b}]) 09:14:43 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:43 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1}, 0x0) 09:14:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:43 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:43 executing program 3: r0 = socket(0x11, 0x3, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) sendmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x3be, 0x0, 0x0, &(0x7f0000000000)=[{0x10}], 0x10}}], 0x40000e8, 0x0) 09:14:43 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1}, 0x0) 09:14:43 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='smaps\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/236, 0xec}], 0x63, 0x400000000000) 09:14:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:44 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0c", 0x50}], 0x1}, 0x0) 09:14:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:44 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg(r1, &(0x7f0000007e00), 0x26e, 0x0) sendmmsg(r1, &(0x7f000000ac80), 0x400000000000302, 0x0) 09:14:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000600)='smaps\x00') preadv(r0, &(0x7f0000000100)=[{&(0x7f0000000180)=""/236, 0xec}], 0x63, 0x400000000000) 09:14:44 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0c", 0x50}], 0x1}, 0x0) 09:14:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000100)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000200)={0x8, 0x9}) 09:14:44 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:44 executing program 2: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) capset(&(0x7f0000000180)={0x20071026}, &(0x7f0000001fe8)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f00000000c0)='fd\x00', 0x0) write(r1, &(0x7f0000000300)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) [ 374.919970] capability: warning: `syz-executor.2' uses deprecated v2 capabilities in a way that may be insecure 09:14:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') [ 374.964943] audit: type=1400 audit(1555319684.706:61): avc: denied { write } for pid=15430 comm="syz-executor.2" name="fd" dev="proc" ino=59159 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 09:14:44 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0c", 0x50}], 0x1}, 0x0) 09:14:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:44 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000001, 0x0) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc058560f, &(0x7f0000000180)={0x0, 0x9, "d60700000000000000000032f101000080917149fd661837b011b15f24fc4d12"}) [ 375.001806] audit: type=1400 audit(1555319684.706:62): avc: denied { add_name } for pid=15430 comm="syz-executor.2" name="3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 375.027581] audit: type=1400 audit(1555319684.706:63): avc: denied { create } for pid=15430 comm="syz-executor.2" name="3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 09:14:45 executing program 3: syz_open_dev$usbmon(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) dup2(r0, 0xffffffffffffffff) 09:14:45 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:45 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="65f336224bdd3b533505b3540906"], 0xe) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 09:14:45 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:45 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab", 0x53}], 0x1}, 0x0) 09:14:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:45 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:45 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab", 0x53}], 0x1}, 0x0) 09:14:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:45 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:45 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:45 executing program 3: clock_nanosleep(0x2, 0x1, &(0x7f0000000140)={0x0, 0x989680}, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x800040000000015) 09:14:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:45 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:45 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x400000101002, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0xffffffffffffff43) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80003) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000000c0)={0x3ff}) socket$rxrpc(0x21, 0x2, 0x2) getsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000200)=""/153, &(0x7f00000002c0)=0x99) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f00000001c0)) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000080)=r0) sendfile(r0, r1, &(0x7f0000000040)=0x5e, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, 0x0) r3 = gettid() setpriority(0x1, r3, 0x0) syz_open_dev$rtc(&(0x7f0000000140)='/dev/rtc#\x00', 0xf7, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000100)={0x7, 0x33, 0x1}, 0x7) unshare(0x40000000) 09:14:45 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:45 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab", 0x53}], 0x1}, 0x0) 09:14:45 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) [ 376.154217] sched: DL replenish lagged too much 09:14:45 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000006c0)={0x12, 0x10, 0xfa00, {0x0}}, 0x18) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:46 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1}, 0x0) 09:14:46 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1}, 0x0) 09:14:46 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 376.750726] IPVS: ftp: loaded support on port[0] = 21 09:14:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000200)={0x100}) 09:14:46 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c026244d25000b0008000c00080000006300a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91", 0x54}], 0x1}, 0x0) 09:14:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) [ 377.780209] IPVS: ftp: loaded support on port[0] = 21 09:14:47 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl$TIOCSLCKTRMIOS(r0, 0x8925, &(0x7f0000000000)) 09:14:47 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:47 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:47 executing program 5: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x800040000000015) 09:14:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f0000000200)={0x100}) 09:14:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:48 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x2c, &(0x7f0000000180)=0x400, 0x4) 09:14:48 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[], 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000400)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 09:14:48 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @loopback}, 0x1c) 09:14:49 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:49 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(0xffffffffffffffff, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:49 executing program 5: r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x06\x00\x00\x10\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000000000003003e"], 0x13) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 09:14:49 executing program 2: ioctl(0xffffffffffffffff, 0x22, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000740)='\x00\b\x00\x00tinfo\x00\xb1x\xb4@/\xb6\x04+\x16\xd2)\x8a\n\x80\xd6\xb1\n\v\x13\x8d\x1a\xfb58p\x00\x89>\xd0]\x12\x9bT\xd9\x91\b\xcf|\xd8\xb5\xee\xceDM\xdf\x1d(\xa6lIt\x7f\xa5\x8b\xb8\xd5A\xc9\x8a\xe1Ga\xde1\xdfa\x1f\xc7\x10,\xa4\xedN\xa4\v/\x1d\x84\xd2\xad\x8a\xf9\xd2\x8a\xe2\xa6d\x97^\xb0l\xe1\xbf\xbc\xe6}\xcf \xa9\x15\x96\x83`5\xf8\xef\x04\xd0@\x96\xd8x\x18\xac\x9fu\xf1\x85nE\xd3\xab\xc7fBEIM`\xb9\x17\xd3\xe1w\x98\xb0\xf3v\x98\xa8\xf8\xdd\xdcN \xe4\xa5#e\x8a\xb6\xd7') ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)={0x6, @multicast1, 0x0, 0x0, 'dh\x00', 0x20, 0x0, 0x17}, 0x2c) recvmmsg(0xffffffffffffffff, &(0x7f0000006240)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0405519, &(0x7f0000001000)) socket$nl_crypto(0x10, 0x3, 0x15) 09:14:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x0, @multicast2}, {0x2, 0x0, @dev}, {0x2, 0x0, @dev}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffa7a9, 0x3ff, 0x8}) 09:14:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:49 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(0xffffffffffffffff, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:49 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:49 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x0, 0x1000000000000b, 0xfffffffffffefffd) sendmsg(r1, 0x0, 0x40000) getsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendto$inet6(r0, 0x0, 0x0, 0xc001, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) sendmsg(r0, 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgid(0x0) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$BLKTRACETEARDOWN(r3, 0x1276, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x0, 0x9e6f, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xc1f}, 0x0, 0x0, r2, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 09:14:49 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x4000) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(0xffffffffffffffff, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @loopback, 0x0, 0x1, 'lblcr\x00'}, 0x2c) r1 = socket$inet6(0xa, 0xa, 0x5) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000040)={'mangle\x00'}, &(0x7f0000000100)=0x54) 09:14:49 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x4000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:50 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(r0, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 09:14:50 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, 0x0, 0xffffffffffffff10) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xffffffffffffff14) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$KDGKBLED(r0, 0x4b64, 0x0) fcntl$getownex(r2, 0x10, 0x0) sched_setscheduler(0x0, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) fcntl$getflags(r2, 0x408) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0xffff, 0x2, 0x2d0, 0xfffffffffffffffa, 0x13, 0x6, 0x8001, 0xa3, 0x0, 0x0, 0x8, 0x9}) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r5 = openat$selinux_context(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, &(0x7f00000003c0)) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000180)) connect$packet(r2, &(0x7f0000000480)={0x11, 0x1f, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_CONFIG(r5, 0x0, 0x20000000) sendmmsg(r4, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$RTC_PLL_GET(r2, 0x801c7011, &(0x7f0000000040)) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x400) 09:14:50 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x4000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:50 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:50 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) r1 = epoll_create(0x8a) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) 09:14:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:50 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x40002300001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="623ad882c0d98a0d7ed2fa6843dd3c22", 0x0, 0x0, 0x0, 0x4}, 0x20) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f00000000c0), 0x3bb1) write$cgroup_type(r4, &(0x7f00000001c0)='threaded\x00', 0xd47c4e) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) tkill(r3, 0x1) 09:14:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x1b) write(r0, 0x0, 0x0) 09:14:50 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x4000) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) [ 381.064370] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 09:14:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000140)="f3abf564ff0941c335e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc4bf34dd9e0") clone(0x2002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000380)=[@window={0x3, 0x0, 0x800}, @mss], 0x20000002) write$9p(r1, 0x0, 0x0) [ 381.561030] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 09:14:51 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc0505510, &(0x7f0000001000)) 09:14:51 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:51 executing program 4: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) ioctl(r0, 0x1000008926, &(0x7f0000000100)) 09:14:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:51 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) 09:14:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:53 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x40002300001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r3 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@rand_addr="623ad882c0d98a0d7ed2fa6843dd3c22", 0x0, 0x0, 0x0, 0x4}, 0x20) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f00000000c0), 0x3bb1) write$cgroup_type(r4, &(0x7f00000001c0)='threaded\x00', 0xd47c4e) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5}) tkill(r3, 0x1) 09:14:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x5) syz_execute_func(&(0x7f0000000000)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110d4b842419dcccc") clone(0x400002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) write$P9_RFLUSH(r1, 0x0, 0x0) 09:14:53 executing program 4: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:53 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:53 executing program 3: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000140)={0xc5, ""/197}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r0, 0x8081) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000000)=0x766, 0x4) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, 0x0) close(r2) 09:14:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:54 executing program 4: ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:54 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3a9, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000ff0200000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038000000c7092d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000289d018a2fb6b0efcbca15c2fe55985f705997f3d2fa4f380341fb1b4f3f9d272a7b19b7bdd2e8098f760a71d31fa7e23f5490cded508c018ead3cfe991c61c2b782b042011d2f1405d2029447902a8944"], 0xc9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000), 0x105) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x7fce) [ 384.393264] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable 09:14:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:54 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x1ee, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000080)={r2, 0xffffffffffffffff, 0x8000000000d}, 0x10) 09:14:57 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:57 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:57 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {0x0}}, 0x18) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 09:14:57 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1e123c123f319bd070") ioctl$ASHMEM_SET_SIZE(r0, 0x40087707, 0x70c000) 09:14:57 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r2 = dup2(r1, r1) read$FUSE(r2, &(0x7f0000001240), 0xffffff7b) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) 09:14:57 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, 0x0, 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) [ 387.407095] misc userio: Invalid payload size 09:14:57 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:57 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') [ 387.619133] misc userio: Invalid payload size 09:14:57 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 387.883296] misc userio: Invalid payload size 09:14:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000011c0)='/dev/loop#\x00', 0x0, 0x4000010004001) write(r0, &(0x7f0000002200)="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", 0x200) 09:14:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x80000000000001, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0xd, &(0x7f0000000000)=ANY=[@ANYBLOB="86d30000"], 0x1) 09:14:57 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b1bf39b3d000000000000b4a5f2"]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:57 executing program 4: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r0], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r0, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 388.040887] misc userio: Invalid payload size 09:14:57 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {0x0}}, 0x18) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 09:14:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:57 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000001, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0x1) 09:14:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000400)={0x0, 0x0, @ioapic={0x1f005, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {0x0, 0x100000000}, {}, {0x0, 0x0, 0x0, [], 0x4}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x80000001}, {}, {}, {}, {0x0, 0x0, 0x1000}]}}) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000200)) 09:14:57 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') 09:14:57 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:57 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x100000001, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0x1) 09:14:58 executing program 2: r0 = socket$inet6(0xa, 0x5, 0xffffffffffff4553) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x1, @rand_addr="b47f633dc4e5bf8f4c788c154e5faae4", 0x200}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000001c0)=""/171, &(0x7f0000000080)=0xab) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) 09:14:58 executing program 2: r0 = socket$inet6(0xa, 0x5, 0xffffffffffff4553) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x1, @rand_addr="b47f633dc4e5bf8f4c788c154e5faae4", 0x200}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f00000001c0)=""/171, &(0x7f0000000080)=0xab) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000180)={'rose0\x00', 0x201}) 09:14:58 executing program 2: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = dup2(r0, r0) fcntl$setpipe(r1, 0x408, 0x0) [ 388.305001] IPv6: ADDRCONF(NETDEV_CHANGE): rose0: link becomes ready [ 388.336795] misc userio: Invalid payload size 09:14:58 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) [ 388.535408] misc userio: Invalid payload size 09:14:58 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') 09:14:58 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:58 executing program 3: 09:14:58 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) recvfrom$inet(r0, &(0x7f0000000180)=""/164, 0xa4, 0x10120, 0x0, 0x0) 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 388.739645] overlayfs: missing 'lowerdir' 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:58 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:58 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') 09:14:58 executing program 3: 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:58 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) recvfrom$inet(r0, &(0x7f0000000180)=""/164, 0xa4, 0x10120, 0x0, 0x0) 09:14:59 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:14:59 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 3: 09:14:59 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[]) chdir(&(0x7f0000000380)='./file0\x00') 09:14:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:14:59 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:14:59 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:00 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) recvfrom$inet(r0, &(0x7f0000000180)=""/164, 0xa4, 0x10120, 0x0, 0x0) 09:15:00 executing program 3: 09:15:00 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:00 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:00 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:00 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000010000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 09:15:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:00 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) [ 390.701767] overlayfs: missing 'lowerdir' 09:15:00 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:00 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 390.962424] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 390.971817] EXT4-fs (loop3): group descriptors corrupted! [ 391.022212] EXT4-fs (loop3): ext4_check_descriptors: Block bitmap for group 0 overlaps superblock [ 391.032845] EXT4-fs (loop3): group descriptors corrupted! 09:15:01 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:01 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) recvfrom$inet(r0, &(0x7f0000000180)=""/164, 0xa4, 0x10120, 0x0, 0x0) 09:15:01 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:01 executing program 3: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08060001080006040001aaaaaaaaaaaaac1414bb000000000000ac4ef79d2a563d300a0af9e0e0e81da943c966289b85d111b2fdd49255058e31ccf392ef68e96e20212f802e2179db9a538de38b253fc3ac4fa888f704c199c65bce017f57ca236e82a2a43fcf1d51e1080b65f09a66a43e794ed73f6f41452da0dc46998b6e654e5366b16f5ac4f4c386"], 0x0) 09:15:01 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:01 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:01 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:01 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:01 executing program 3: 09:15:01 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:01 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./file0\x00') [ 391.970730] overlayfs: missing 'lowerdir' 09:15:02 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 3: 09:15:02 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), 0x0, 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:02 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x0, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:02 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:02 executing program 3: 09:15:02 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x0, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:02 executing program 3: 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:02 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:02 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:03 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:03 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x3, &(0x7f0000ffc000/0x1000)=nil) 09:15:03 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e1"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:03 executing program 3: 09:15:03 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x0, &(0x7f0000ffc000/0x1000)=nil) 09:15:03 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x0, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:03 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x0, &(0x7f0000ffc000/0x1000)=nil) 09:15:03 executing program 2: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1010, 0x0, &(0x7f0000ffc000/0x1000)=nil) 09:15:03 executing program 3: 09:15:03 executing program 2: 09:15:03 executing program 2: 09:15:03 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:03 executing program 2: 09:15:03 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e1"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:03 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:03 executing program 3: 09:15:03 executing program 2: 09:15:03 executing program 2: 09:15:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:03 executing program 3: 09:15:03 executing program 2: 09:15:03 executing program 2: 09:15:03 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:03 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:03 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e1"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:03 executing program 2: 09:15:03 executing program 3: 09:15:03 executing program 2: 09:15:03 executing program 2: 09:15:03 executing program 2: 09:15:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x0) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:04 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:04 executing program 2: 09:15:04 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:04 executing program 2: 09:15:04 executing program 3: 09:15:04 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:04 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:04 executing program 2: 09:15:04 executing program 2: 09:15:04 executing program 2: 09:15:04 executing program 2: 09:15:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(0x0, &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:04 executing program 3: 09:15:04 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:04 executing program 2: 09:15:04 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:04 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:04 executing program 2: 09:15:04 executing program 2: 09:15:04 executing program 3: 09:15:04 executing program 2: 09:15:04 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:04 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:04 executing program 3: 09:15:04 executing program 2: 09:15:04 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:04 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:04 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(0x0, &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:04 executing program 2: 09:15:04 executing program 2: 09:15:04 executing program 2: 09:15:04 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:04 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:04 executing program 2: 09:15:05 executing program 3: 09:15:05 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:05 executing program 2: 09:15:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(0x0, &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:05 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:05 executing program 2: 09:15:05 executing program 2: 09:15:05 executing program 2: 09:15:05 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:05 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:05 executing program 2: 09:15:05 executing program 3: 09:15:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), 0x0, 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:05 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:05 executing program 2: 09:15:05 executing program 3: 09:15:05 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:05 executing program 2: 09:15:05 executing program 2: 09:15:05 executing program 2: 09:15:05 executing program 3: 09:15:05 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), 0x0, 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:05 executing program 2: 09:15:05 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:05 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:05 executing program 2: 09:15:05 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) 09:15:05 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r0, &(0x7f00000001c0)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f8}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) 09:15:05 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT=r1], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:05 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r0, &(0x7f00000001c0)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f8}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) 09:15:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), 0x0, 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:06 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x2, [@empty, @loopback]}, 0x18) setsockopt$inet_mreqn(r0, 0x0, 0x100000000000026, &(0x7f0000000380)={@multicast2, @local}, 0xc) [ 396.213711] autofs4:pid:16436:autofs4_fill_super: called with bogus options [ 396.225823] autofs4:pid:16441:autofs4_fill_super: called with bogus options 09:15:06 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:06 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:06 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:06 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x800000000006, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 09:15:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000440)='lp\x00', 0x3) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) readlinkat(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/47, 0x2f) getsockname$packet(r1, &(0x7f00000001c0), &(0x7f0000000380)=0x14) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000900)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x80, 0x2, 0x7, 0x0, 0x2, 0x3e, 0x6, 0x24c, 0x38, 0xef, 0x7cd7, 0x2, 0x20, 0x1, 0x9, 0x14e1}, [{0x7, 0xde, 0x100000000, 0x8001, 0x2, 0x7, 0x9ee, 0x101}, {0x70000005, 0x2, 0x76, 0x1ff, 0xfffffffffffffffd, 0x80000001, 0x1, 0x2}], "0b5c9cde81767aa57c10d58d12fa0b7a77dfe812690855d6bd99feddab6e0e2c0855fc0333fb68cc46f74902b35061e2d38899994a16fc024b9b0b40ffdca04439b36a3789997e7f4bf19cb97e8625dcfea146f895b1b80ae271236d37dca0ca899b3838c09bc91664e3074016fba92f06bd2e400f9c8fbe496a34a6552059cb4f8445ce5a539f68da929139be982fa14ac8276be8bf174d322b1b6d14bdf89ddb3c193027586875c97af3aa", [[], [], [], [], [], []]}, 0x724) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x15) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in=@loopback}}, {{@in=@local}, 0x0, @in=@local}}, 0x0) r2 = getpgid(0xffffffffffffffff) sched_setparam(r2, &(0x7f0000000000)=0x80000001) 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr="e3c55aeb990b3c6e7f11dea2543e9675"}, 0x0) 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:06 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:06 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x3f, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x206000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0xffffffffffffffff, 0x2, 0x0, 0x2, 0x7}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'eql\x00'}}) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) dup2(r3, r1) sendfile(r4, r5, 0x0, 0x102000002) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x0, 0x4000000000002, 0x200}) 09:15:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:07 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:07 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:07 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:07 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:07 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:07 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:07 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x3f, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x206000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0xffffffffffffffff, 0x2, 0x0, 0x2, 0x7}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'eql\x00'}}) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r6) dup2(r3, r1) sendfile(r4, r5, 0x0, 0x102000002) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x0, 0x4000000000002, 0x200}) 09:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) [ 398.250973] overlayfs: failed to resolve './file0': -2 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:08 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:08 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:08 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:08 executing program 3: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x10120, 0x0, 0x0) 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:08 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:08 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:08 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:09 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0x4008ae48) 09:15:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xc7, 0xf00) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0xf00) 09:15:09 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9f"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:09 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) dup2(r0, r1) 09:15:09 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0xa4000) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, &(0x7f0000000400)=0x13) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, 0x0, &(0x7f0000000400)) 09:15:10 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, 0x0, &(0x7f0000000400)) 09:15:10 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, 0x0, &(0x7f0000000400)) 09:15:10 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r1 = dup2(r0, r0) r2 = socket$inet(0x2, 0x6000000000000001, 0x0) mmap(&(0x7f0000001000/0x200000)=nil, 0x200000, 0x0, 0x2011, r2, 0x0) read$FUSE(r1, &(0x7f0000001240), 0xffffff7b) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34) 09:15:10 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9f"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0xf00) 09:15:10 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, 0x0) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, 0x0) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x2, &(0x7f0000581000)={{{@in, @in6=@mcast2}}}, 0x0) 09:15:10 executing program 2: ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x400400) ioctl$TIOCCBRK(r0, 0x5428) r1 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x70c, 0x20007ffc) 09:15:10 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 400.706510] overlayfs: failed to resolve './file1': -2 09:15:10 executing program 2: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x1f) bind$inet(0xffffffffffffffff, 0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 09:15:10 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:10 executing program 2: r0 = socket(0x10, 0x803, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto(r0, &(0x7f00000001c0)="120000001200e7361c86d2000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x20, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xc4}, {&(0x7f0000000140)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f00000000c0)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000002400)=""/191, 0xbf, 0xec10000000000000}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x1, 0x4) 09:15:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:10 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9f"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, 0x0, 0x0, 0xf00) 09:15:10 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) poll(&(0x7f0000000500)=[{0xffffffffffffffff, 0x9010}, {0xffffffffffffffff, 0x4000}, {}, {r1}], 0x4, 0xb29) 09:15:10 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e8"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:10 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(0x0, 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 401.145912] SELinux: failed to load policy 09:15:11 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 401.312514] SELinux: failed to load policy 09:15:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f00000007c0)=""/242, 0xf2}], 0x3, 0xf00) 09:15:11 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:11 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 401.475551] SELinux: failed to load policy 09:15:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:11 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e8"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:11 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 401.591381] SELinux: failed to load policy 09:15:11 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]}) sendto$inet6(0xffffffffffffff9c, 0x0, 0x18c, 0x2011, &(0x7f0000000100)={0xa, 0x0, 0x0, @rand_addr="922f7c85490b19b0574b94970873d05e"}, 0x0) 09:15:11 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e8"]) chdir(&(0x7f0000000380)='./file0\x00') 09:15:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:11 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0xf00) 09:15:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndctrl(&(0x7f0000000300)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0x40405514, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) 09:15:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:11 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:11 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 402.189816] audit: type=1400 audit(1555319711.926:64): avc: denied { wake_alarm } for pid=16885 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 09:15:12 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0xf00) 09:15:12 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:12 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b"]) chdir(0x0) 09:15:12 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:12 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:12 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:12 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0xf00) 09:15:12 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:12 executing program 2: unshare(0x20600) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) [ 402.805284] SELinux: failed to load policy 09:15:12 executing program 2: unshare(0x20600) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b"]) chdir(0x0) 09:15:12 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:12 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:12 executing program 2: unshare(0x20600) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 2: r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:12 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:13 executing program 2: r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0xf00) [ 403.295389] SELinux: failed to load policy 09:15:13 executing program 2: r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 2: unshare(0x0) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:13 executing program 2: unshare(0x0) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:13 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:13 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000100)='security.evm\x00', 0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, 0x0, 0x0) getgid() mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531007c778e0bfce8be9442e5de490cbb0be96b2c6530f4d45fe9a8759d3253118037b336f1d28bdd28af07a13b9fcd5b1c99fabd5141e162e10f6bc7a42e84a3397cbc08fe6d7808cae9c43a3da7629f6d6fe702692cd1f86dcce2720a3cf2a4a497e1c9e974267ed7044fde46b1ac14f5dfb44f06c118696b96191e41f2d29aa7125c9974f619cd21ab9a07c41374a1ad9fa7e88b"]) chdir(0x0) 09:15:13 executing program 2: unshare(0x0) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 2: unshare(0x20600) r0 = timerfd_create(0x0, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 403.728782] SELinux: failed to load policy 09:15:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}], 0x2, 0xf00) 09:15:13 executing program 2: unshare(0x20600) r0 = timerfd_create(0x0, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:13 executing program 2: unshare(0x20600) r0 = timerfd_create(0x0, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) [ 403.913407] SELinux: failed to load policy 09:15:13 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:13 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:13 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(0x0, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) 09:15:13 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(0x0, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:13 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}], 0x2, 0xf00) 09:15:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(0x0, &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000), &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:14 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) [ 404.337581] SELinux: failed to load policy [ 404.399161] SELinux: failed to load policy 09:15:14 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:14 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000), &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000), &(0x7f0000000040)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:14 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) 09:15:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {0x0}], 0x2, 0xf00) 09:15:14 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(0x0, 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:14 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:14 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:15 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(0x0, 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:15 executing program 2: unshare(0x20600) timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xf00) 09:15:15 executing program 2: unshare(0x20600) timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:15 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(0x0, 0x0, 0x8000) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) 09:15:15 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:15 executing program 2: unshare(0x20600) timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000005000)={{0x4000000000000000}, {0x40000000000000}}, 0x0) 09:15:15 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xf00) 09:15:15 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, 0x0, 0x0) 09:15:15 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, 0x0, 0x0) 09:15:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f00000008c0)=""/106, 0x6a}], 0x1, 0xf00) 09:15:15 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:15 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 406.248060] sel_write_load: 4 callbacks suppressed [ 406.248190] SELinux: failed to load policy 09:15:16 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x51, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000580)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$bt_hidp(0x1f, 0x3, 0x6) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file1\x00', 0x8, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x192) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000380)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x1) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)='./file0\x00') open$dir(&(0x7f0000000200)='./file0\x00', 0x113a01, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000003500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 09:15:16 executing program 2: unshare(0x20600) r0 = timerfd_create(0x8, 0x0) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) timerfd_settime(r0, 0x0, 0x0, 0x0) 09:15:16 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:16 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0xf00) 09:15:16 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="01"]) 09:15:16 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKDISCARD(r0, 0x1277, 0x0) 09:15:16 executing program 2: [ 406.964757] SELinux: failed to load policy 09:15:16 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:16 executing program 1: 09:15:16 executing program 2: 09:15:16 executing program 1: 09:15:16 executing program 2: 09:15:16 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0xf00) 09:15:17 executing program 2: 09:15:17 executing program 1: 09:15:17 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000500)={0xfdfdffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 1: 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 1: 09:15:17 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) [ 407.526988] SELinux: failed to load policy 09:15:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:17 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{0x0}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0xf00) 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 407.912421] SELinux: failed to load policy 09:15:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) 09:15:17 executing program 1: 09:15:17 executing program 2: 09:15:17 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:17 executing program 1: [ 408.096498] SELinux: failed to load policy 09:15:17 executing program 2: 09:15:17 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:17 executing program 2: 09:15:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:17 executing program 2: 09:15:17 executing program 1: 09:15:18 executing program 2: [ 408.369646] SELinux: failed to load policy 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:18 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) 09:15:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:18 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) [ 408.859151] SELinux: failed to load policy 09:15:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) unshare(0x8020000) mount(&(0x7f0000000080), &(0x7f0000000180)='.', 0x0, 0x5110, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x6a}], 0x2, 0x0) 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:18 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:18 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:18 executing program 1: 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 2: 09:15:18 executing program 1: 09:15:18 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, r0, &(0x7f0000000680)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f0000000240)="f1fcc160d80ac80d1fdfc4cb503e0d517514ffd9a5af7303d154dce623f222a91fbd03ab4b904a16ed3c066024c191b89e38d45410ffd9e71625894d0a0898534641ab701021cbbfd66db4e4fd11e28d55911e79e796ed5d25f63fe9418974033252166206f7c0266fbefadc074828aa1b8cba53c212f65d9ad6624644c80fb40e51dbda5107e36400d4f3fc3203139c34ff85331f8ba3889bccbc5626bbac9fad5699132ae5b58545a6166d3e804c6bef6f6abe386bb0ce076796618523c22749cf556dc6790b74be6c0387952fe4e4c8be97ea2c33f3c7443ec99a6ed2465564c7f9e37e65cdb135c3", 0xea) [ 409.211348] SELinux: failed to load policy 09:15:19 executing program 2: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, r0, &(0x7f0000000680)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f0000000240)="f1fcc160d80ac80d1fdfc4cb503e0d517514ffd9a5af7303d154dce623f222a91fbd03ab4b904a16ed3c066024c191b89e38d45410ffd9e71625894d0a0898534641ab701021cbbfd66db4e4fd11e28d55911e79e796ed5d25f63fe9418974033252166206f7c0266fbefadc074828aa1b8cba53c212f65d9ad6624644c80fb40e51dbda5107e36400d4f3fc3203139c34ff85331f8ba3889bccbc5626bbac9fad5699132ae5b58545a6166d3e804c6bef6f6abe386bb0ce076796618523c22749cf556dc6790b74be6c0387952fe4e4c8be97ea2c33f3c7443ec99a6ed2465564c7f9e37e65cdb135c3", 0xea) 09:15:19 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) 09:15:19 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:19 executing program 0: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$update(0x2, r0, &(0x7f0000000680)="c0ca1cdbaa1aedbbed80dddaa28e15b9449e2e82cca4244c40ffd0fd4e6631c7d3d86e1339de17344340b02dd527f2d8b3ae6c1db3594e657da33c3ec668f143974a65753472df5319a6b83e1e86b8f2666c61a2e700d1c1e0ae1fc52494bd4885a5c64e9007d39fa11313805290dd6342f9775f01a02ec88f6bee22f25a377a9b143abba1264586d2779088006d5f9be82b00f10287031623f73470264cc5897f18f357aad6deb3883da88ae2266664933785a3ce72bb224a441437ea93c21782d4501b9dfbf48a9f3ea14cb792a7876f17297a8c870d7a2d46a36a2cd3e33e21894d91caa64b131dbf5c53066c1ac83ceba29ceab25127e8", 0xf9) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000540)={'syz'}, &(0x7f0000000600)="63bbdf5b932bb04481028798fd5fb1bf7183b30984e21c3eb3094d70650ee8624e2bdce1427bd61c8e222dbd67d402b7ccaf0c5dc50030ee14d419fa9c84b0ffd1019f1b2ae022a0f182301f9942566e6f61eabe384c732d0813a18bb3dc9f3a678d9d44e6293e786ab2e6d28f236c138d63fe4f6ece6f3d04", 0x79, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r0, r2}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) setsockopt$inet_buf(r1, 0x0, 0x26, &(0x7f0000000240)="f1fcc160d80ac80d1fdfc4cb503e0d517514ffd9a5af7303d154dce623f222a91fbd03ab4b904a16ed3c066024c191b89e38d45410ffd9e71625894d0a0898534641ab701021cbbfd66db4e4fd11e28d55911e79e796ed5d25f63fe9418974033252166206f7c0266fbefadc074828aa1b8cba53c212f65d9ad6624644c80fb40e51dbda5107e36400d4f3fc3203139c34ff85331f8ba3889bccbc5626bbac9fad5699132ae5b58545a6166d3e804c6bef6f6abe386bb0ce076796618523c22749cf556dc6790b74be6c0387952fe4e4c8be97ea2c33f3c7443ec99a6ed2465564c7f9e37e65cdb135c3", 0xea) 09:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) [ 409.578620] SELinux: failed to load policy 09:15:19 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 409.826930] SELinux: failed to load policy 09:15:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:19 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:19 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4f}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x98}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:15:19 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:19 executing program 2: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) recvmmsg(r0, &(0x7f0000000280)=[{{&(0x7f0000000000)=@vsock, 0x80, &(0x7f0000000480)=[{&(0x7f0000000080)=""/212, 0xd4}, {&(0x7f0000000180)=""/100, 0x64}, {&(0x7f0000000200)=""/115, 0x73}, {&(0x7f0000000340)=""/114, 0x72}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x5, &(0x7f0000000500)=""/4096, 0x1000}, 0xffffffff}], 0x1, 0x100, &(0x7f0000001500)={0x77359400}) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) r4 = dup2(r3, r3) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000c40)={'team0\x00'}) sendmsg$IPVS_CMD_GET_CONFIG(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001580)=ANY=[@ANYBLOB="775659ecdcd5da5f4ed894d35e3d3f33cc61df"], 0x1}}, 0x44801) sendmsg$FOU_CMD_DEL(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000040)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x0, 0x80000) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f00000000c0)=""/11, 0xb}, 0x120) recvmmsg(r6, &(0x7f0000000940)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, &(0x7f0000000480)=""/136, 0x88}, 0xbf}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=""/91, 0x5b}, 0x3}], 0x2, 0x40, &(0x7f00000009c0)) lstat(0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) write(r2, &(0x7f0000005c00)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 09:15:20 executing program 1: 09:15:20 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, 0x0, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:20 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:20 executing program 0: r0 = socket$inet6(0xa, 0x80001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) 09:15:20 executing program 1: [ 410.344155] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 09:15:20 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) socket(0x1e, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) [ 410.385557] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.448562] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.498752] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.531225] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.564103] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.573499] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.580341] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.587209] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.594251] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 410.601348] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 09:15:20 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x1) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, 0x1c) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000007f80)=@alg, 0x80, 0x0}}], 0x400000000000040, 0x10122, 0x0) 09:15:20 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, 0x0, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 410.609863] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 09:15:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x1) 09:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:20 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:20 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, 0x0, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:20 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4f}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0x50}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:15:20 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, 0x0, 0x0, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x1) fchmod(0xffffffffffffffff, 0x2) 09:15:20 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) [ 411.296504] sel_write_load: 5 callbacks suppressed [ 411.296510] SELinux: failed to load policy 09:15:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x1) 09:15:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) readahead(0xffffffffffffffff, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007e00), 0x26e, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r1, &(0x7f000000ac80), 0x400000000000302, 0x4008800) 09:15:21 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:21 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, 0x0, 0x0, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 411.709046] SELinux: failed to load policy 09:15:21 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:21 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, 0x0, 0x0, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x6800) 09:15:21 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 09:15:21 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x1) fchmod(0xffffffffffffffff, 0x2) 09:15:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:21 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) open(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0xfffffffffffffed1) dup(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getrusage(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) geteuid() fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getresuid(0x0, 0x0, 0x0) lstat(0x0, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='lp\x00', 0x2ca) ioctl$int_out(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0xfffffffffffffed3, 0x0, 0x0, 0x2f8) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) select(0x1000001f3, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0x72516111, 0x100, &(0x7f0000001880), 0xffffff97) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r1, &(0x7f00000008c0)='/', 0x1, 0x0, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 09:15:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x401000000801, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f0000000040)='./bus\x00', 0x1141042, 0xfffffffffffffffc) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8000fffffffe) ioctl$int_in(r0, 0x5421, &(0x7f0000000000)=0x9) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)=0x1) fchmod(0xffffffffffffffff, 0x2) 09:15:22 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:22 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:22 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x0) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:22 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:22 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:22 executing program 1: ioctl(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x4, 0x0) syz_genetlink_get_family_id$tipc(0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000300)) readv(r0, &(0x7f0000395000)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x3d}, 0x4) 09:15:22 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x3a9, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c46000000ff020000000000000000f9909d880000000000000000000000000000004000000000000000000000000000000000000000000038000000c7092d0000000000000000000000000000000000000000000000000000000000000000930000000000000000000000000000000000000000000000000000289d018a2fb6b0efcbca15c2fe55985f705997f3d2fa4f380341fb1b4f3f9d272a7b19b7bdd2e8098f760a71d31fa7e23f5490cded508c018ead3cfe991c61c2b782b042011d2f1405d2029447"], 0xc9) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000000)=0x7, 0x105) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x3d7) 09:15:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000200)={0x0, 0xfffffffffffffdf3, &(0x7f00000001c0)={0x0}}, 0x0) 09:15:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:22 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) 09:15:22 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="7f454c46ff09000202000000000000000300060000100000fd00000038000000bd020000040000000400200002000200020a1f0c0000000000000070dc00000001000000f9fffffffbffffff020000000100000020000000000000000800000006000000790a00000300000008000000b3960000070000002456c4b11caf6fe33e8e9ed26ef30a7f7016bab841a28cf6a84229f501ceefc78a54002a9f506e5b4d9c296884915be1b663a80b703b468c688d14d28d24b39d060d2ceefbd7ee0eff9b0f105d1b7391f8f8eb4f94865efaf51bf5c97453c2aa6079b0657861431ed77184581417a14d76ee24373a010764b5f81af625020bc94c5110c2f818fa2e77652605052715c479acdde82c083216cf906d7e7fbafba15b865face6226cf36181993fa42700"/1570], 0x622) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000100)) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) r3 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000200), &(0x7f0000000300)=0x4) uselib(&(0x7f00000000c0)='./file0\x00') timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x800040000000015) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), 0x4) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) r4 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x0) ioctl$VIDIOC_LOG_STATUS(r4, 0x5646, 0x0) 09:15:23 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r2, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/1570], 0x622) dup2(r1, r2) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:23 executing program 0: r0 = syz_open_dev$video(&(0x7f0000002d40)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000000)={0x0, @bt={0x7f, 0x5ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}) 09:15:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r2 = accept4$inet6(r1, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x17, 0x0, &(0x7f0000000080)) [ 413.398376] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. [ 413.424480] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 09:15:23 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 09:15:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(0xffffffffffffffff, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d11"], 0xb2) 09:15:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4f}, [@ldst={0x3, 0x0, 0x3, 0x1c10a1, 0x0, 0xaf}]}, 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 09:15:23 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:23 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, 0x0, 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x5e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000580)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 09:15:23 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) [ 413.895033] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 413.938100] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 413.992336] CPU: 1 PID: 17670 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 413.999420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.008800] Call Trace: [ 414.011419] dump_stack+0x138/0x19c [ 414.015073] warn_alloc.cold+0x96/0x1af [ 414.019074] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 414.023946] ? lock_downgrade+0x6e0/0x6e0 [ 414.028120] ? avc_has_perm+0x2df/0x4b0 [ 414.032114] __vmalloc_node_range+0x3be/0x6a0 [ 414.036642] ? trace_hardirqs_on+0x10/0x10 [ 414.040923] vmalloc+0x46/0x50 [ 414.044160] ? sel_write_load+0x1a0/0x1050 [ 414.048432] sel_write_load+0x1a0/0x1050 [ 414.052528] ? save_trace+0x290/0x290 [ 414.056353] ? sel_read_bool+0x240/0x240 [ 414.060416] ? trace_hardirqs_on+0x10/0x10 [ 414.064707] ? save_trace+0x290/0x290 [ 414.068691] __vfs_write+0x107/0x6c0 [ 414.072550] ? __lock_is_held+0xb6/0x140 [ 414.076613] ? sel_read_bool+0x240/0x240 [ 414.080670] ? kernel_read+0x120/0x120 [ 414.084554] ? __lock_is_held+0xb6/0x140 [ 414.088620] ? check_preemption_disabled+0x3c/0x250 [ 414.093667] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 414.099159] ? rcu_read_lock_sched_held+0x110/0x130 [ 414.104229] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 414.109226] ? __sb_start_write+0x153/0x2f0 [ 414.113556] vfs_write+0x198/0x500 [ 414.117099] SyS_write+0xb8/0x180 [ 414.120557] ? SyS_read+0x180/0x180 [ 414.124273] ? do_syscall_64+0x53/0x630 [ 414.128250] ? SyS_read+0x180/0x180 [ 414.131895] do_syscall_64+0x1eb/0x630 [ 414.135785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 414.140647] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 414.145848] RIP: 0033:0x458c29 [ 414.149038] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 414.156738] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 414.164180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 414.171470] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 414.179052] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 414.186316] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff [ 414.197918] Mem-Info: [ 414.206471] active_anon:168554 inactive_anon:194 isolated_anon:0 [ 414.206471] active_file:8366 inactive_file:13447 isolated_file:0 [ 414.206471] unevictable:0 dirty:213 writeback:0 unstable:0 [ 414.206471] slab_reclaimable:13539 slab_unreclaimable:107052 [ 414.206471] mapped:58880 shmem:242 pagetables:4712 bounce:0 [ 414.206471] free:824460 free_pcp:315 free_cma:0 09:15:24 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 09:15:24 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, 0x0, 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:24 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:24 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}}) write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) [ 414.251179] Node 0 active_anon:674016kB inactive_anon:776kB active_file:33332kB inactive_file:53788kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235520kB dirty:848kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no 09:15:24 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, 0x0, 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000001c0)=""/11, 0x5e) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000580)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCGICOUNT(r2, 0x545d, 0x0) 09:15:24 executing program 0: r0 = syz_open_dev$video(0x0, 0x3f, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f00000002c0)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x7}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r5 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r6 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) ioctl$PPPOEIOCSFWD(r2, 0x4008b100, &(0x7f0000000340)={0x18, 0x0, {0x0, @remote, 'eql\x00'}}) pwritev(r6, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) dup2(r3, r1) fsetxattr$security_smack_entry(r3, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000180)='/dev/loop#\x00', 0xb, 0x3) sendfile(r4, r5, 0x0, 0x102000002) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000080)={0x0, 0x4000000000002, 0x200}) 09:15:24 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:24 executing program 1: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) 09:15:24 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:24 executing program 0: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f00000000c0)=0x1e) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) write$P9_RCLUNK(r0, &(0x7f00000001c0)={0x7, 0x79, 0x2}, 0x7) [ 415.057470] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 415.355990] Node 0 DMA free:10788kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 415.396537] lowmem_reserve[]: 0 2580 2580 2580 [ 415.407867] Node 0 DMA32 free:200804kB min:36468kB low:45584kB high:54700kB active_anon:674296kB inactive_anon:828kB active_file:33332kB inactive_file:56204kB unevictable:0kB writepending:3228kB present:3129332kB managed:2644924kB mlocked:0kB kernel_stack:12096kB pagetables:18860kB bounce:0kB free_pcp:832kB local_pcp:664kB free_cma:0kB [ 415.448348] lowmem_reserve[]: 0 0 0 0 [ 415.453133] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 415.479010] lowmem_reserve[]: 0 0 0 0 [ 415.483756] Node 1 Normal free:3083276kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 415.512260] lowmem_reserve[]: 0 0 0 0 [ 415.516251] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10788kB [ 415.530912] Node 0 DMA32: 1542*4kB (UE) 253*8kB (UM) 3041*16kB (UME) 2235*32kB (UME) 914*64kB (UME) 67*128kB (UME) 8*256kB (ME) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 198000kB [ 415.547467] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 415.558991] Node 1 Normal: 55*4kB (UE) 334*8kB (UE) 252*16kB (UE) 64*32kB (UE) 18*64kB (UE) 11*128kB (UME) 3*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 5*2048kB (UME) 746*4096kB (M) = 3083276kB [ 415.576374] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 415.585792] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 415.594909] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 09:15:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) 09:15:25 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3580, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:15:25 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(0xffffffffffffffff, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:25 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:25 executing program 0: [ 415.604352] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 415.613165] 23701 total pagecache pages [ 415.617298] 0 pages in swap cache [ 415.621318] Swap cache stats: add 0, delete 0, find 0/0 [ 415.626845] Free swap = 0kB [ 415.630008] Total swap = 0kB [ 415.633676] 1965979 pages RAM [ 415.636908] 0 pages HighMem/MovableOnly [ 415.641394] 333219 pages reserved [ 415.645035] 0 pages cma reserved 09:15:25 executing program 0: 09:15:25 executing program 2: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3580, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:15:25 executing program 0: creat(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3580, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x4e20, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 09:15:25 executing program 2: [ 416.076059] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 416.092078] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 416.097659] CPU: 0 PID: 17767 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 416.104709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.114074] Call Trace: [ 416.116681] dump_stack+0x138/0x19c [ 416.120326] warn_alloc.cold+0x96/0x1af [ 416.124322] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 416.129182] ? lock_downgrade+0x6e0/0x6e0 [ 416.133346] ? avc_has_perm+0x2df/0x4b0 [ 416.137339] __vmalloc_node_range+0x3be/0x6a0 [ 416.141848] ? trace_hardirqs_on+0x10/0x10 [ 416.146103] vmalloc+0x46/0x50 [ 416.149317] ? sel_write_load+0x1a0/0x1050 [ 416.153566] sel_write_load+0x1a0/0x1050 [ 416.157641] ? save_trace+0x290/0x290 [ 416.161473] ? sel_read_bool+0x240/0x240 [ 416.165547] ? trace_hardirqs_on+0x10/0x10 [ 416.169770] ? save_trace+0x290/0x290 [ 416.173563] __vfs_write+0x107/0x6c0 [ 416.177260] ? __lock_is_held+0xb6/0x140 [ 416.181311] ? sel_read_bool+0x240/0x240 [ 416.185377] ? kernel_read+0x120/0x120 [ 416.189259] ? __lock_is_held+0xb6/0x140 [ 416.193312] ? check_preemption_disabled+0x3c/0x250 [ 416.198321] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 416.203766] ? rcu_read_lock_sched_held+0x110/0x130 [ 416.209033] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 416.213777] ? __sb_start_write+0x153/0x2f0 [ 416.218093] vfs_write+0x198/0x500 [ 416.221630] SyS_write+0xb8/0x180 [ 416.225071] ? SyS_read+0x180/0x180 [ 416.228686] ? do_syscall_64+0x53/0x630 [ 416.232651] ? SyS_read+0x180/0x180 [ 416.236271] do_syscall_64+0x1eb/0x630 [ 416.240155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 416.245000] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 416.250187] RIP: 0033:0x458c29 [ 416.253401] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 416.261134] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 416.268396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 09:15:26 executing program 1: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) socket$inet6(0xa, 0x0, 0x0) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[], 0xfffffd97) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) 09:15:26 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(0xffffffffffffffff, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:26 executing program 2: [ 416.275659] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 416.282921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 416.290196] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff [ 416.327426] Mem-Info: [ 416.349396] active_anon:168512 inactive_anon:200 isolated_anon:0 [ 416.349396] active_file:8374 inactive_file:13458 isolated_file:0 [ 416.349396] unevictable:0 dirty:227 writeback:0 unstable:0 [ 416.349396] slab_reclaimable:14354 slab_unreclaimable:106245 [ 416.349396] mapped:58880 shmem:249 pagetables:4696 bounce:0 [ 416.349396] free:824554 free_pcp:245 free_cma:0 [ 416.392882] Node 0 active_anon:674148kB inactive_anon:800kB active_file:33364kB inactive_file:53832kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235520kB dirty:904kB writeback:0kB shmem:996kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 416.421274] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 416.447490] Node 0 DMA free:10788kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 416.473802] lowmem_reserve[]: 0 2580 2580 2580 [ 416.478430] Node 0 DMA32 free:203836kB min:36468kB low:45584kB high:54700kB active_anon:674256kB inactive_anon:784kB active_file:33364kB inactive_file:53832kB unevictable:0kB writepending:900kB present:3129332kB managed:2644924kB mlocked:0kB kernel_stack:12064kB pagetables:18836kB bounce:0kB free_pcp:1184kB local_pcp:652kB free_cma:0kB [ 416.478513] lowmem_reserve[]: 0 0 0 0 [ 416.478530] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 416.539095] lowmem_reserve[]: 0 0 0 0 [ 416.543037] Node 1 Normal free:3083276kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 416.572543] lowmem_reserve[]: 0 0 0 0 [ 416.577296] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10788kB [ 416.590727] Node 0 DMA32: 1751*4kB (UME) 1291*8kB (UM) 3009*16kB (UME) 2169*32kB (UME) 916*64kB (UME) 70*128kB (UME) 8*256kB (ME) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 205028kB [ 416.623383] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 416.637095] Node 1 Normal: 55*4kB (UE) 334*8kB (UE) 252*16kB (UE) 64*32kB (UE) 18*64kB (UE) 11*128kB (UME) 3*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 5*2048kB (UME) 746*4096kB (M) = 3083276kB [ 416.662080] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 416.737386] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 416.749931] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 416.764549] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 416.773462] 22931 total pagecache pages [ 416.777681] 0 pages in swap cache [ 416.786350] Swap cache stats: add 0, delete 0, find 0/0 [ 416.792040] Free swap = 0kB [ 416.795266] Total swap = 0kB [ 416.798592] 1965979 pages RAM [ 416.806823] 0 pages HighMem/MovableOnly [ 416.816914] 333219 pages reserved [ 416.833490] 0 pages cma reserved 09:15:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) 09:15:26 executing program 0: 09:15:26 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f00000004c0)={0x1000000a, 0xfffbffffffffffff}) 09:15:26 executing program 2: 09:15:26 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(0xffffffffffffffff, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:26 executing program 0: 09:15:26 executing program 0: 09:15:26 executing program 0: 09:15:26 executing program 0: [ 417.218683] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) 09:15:27 executing program 1: 09:15:27 executing program 0: 09:15:27 executing program 2: [ 417.327031] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 417.348238] attempt to access beyond end of device [ 417.353570] loop1: rw=1, want=114, limit=112 [ 417.358025] buffer_io_error: 22 callbacks suppressed [ 417.358033] Buffer I/O error on dev loop1, logical block 113, lost async page write [ 417.377669] CPU: 0 PID: 17798 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 417.378786] attempt to access beyond end of device [ 417.384736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.384743] Call Trace: [ 417.384766] dump_stack+0x138/0x19c [ 417.384784] warn_alloc.cold+0x96/0x1af [ 417.384801] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 417.384815] ? lock_downgrade+0x6e0/0x6e0 [ 417.384837] ? avc_has_perm+0x2df/0x4b0 [ 417.384854] __vmalloc_node_range+0x3be/0x6a0 [ 417.384869] ? trace_hardirqs_on+0x10/0x10 [ 417.384883] vmalloc+0x46/0x50 [ 417.384895] ? sel_write_load+0x1a0/0x1050 [ 417.384905] sel_write_load+0x1a0/0x1050 [ 417.384916] ? save_trace+0x290/0x290 [ 417.384932] ? sel_read_bool+0x240/0x240 [ 417.384944] ? trace_hardirqs_on+0x10/0x10 [ 417.384959] ? save_trace+0x290/0x290 [ 417.384978] __vfs_write+0x107/0x6c0 [ 417.384989] ? __lock_is_held+0xb6/0x140 [ 417.385000] ? sel_read_bool+0x240/0x240 [ 417.385013] ? kernel_read+0x120/0x120 [ 417.385024] ? __lock_is_held+0xb6/0x140 [ 417.385036] ? check_preemption_disabled+0x3c/0x250 [ 417.385052] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 417.385065] ? rcu_read_lock_sched_held+0x110/0x130 [ 417.385076] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 417.385086] ? __sb_start_write+0x153/0x2f0 [ 417.385099] vfs_write+0x198/0x500 [ 417.385113] SyS_write+0xb8/0x180 [ 417.385141] ? SyS_read+0x180/0x180 [ 417.385155] ? do_syscall_64+0x53/0x630 [ 417.385169] ? SyS_read+0x180/0x180 [ 417.385183] do_syscall_64+0x1eb/0x630 [ 417.390231] loop1: rw=1, want=115, limit=112 [ 417.399519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.402489] Buffer I/O error on dev loop1, logical block 114, lost async page write [ 417.405764] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 417.409756] attempt to access beyond end of device [ 417.414580] RIP: 0033:0x458c29 [ 417.414587] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 417.414596] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 417.414601] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 417.414606] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 417.414611] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 417.414616] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff [ 417.425974] Mem-Info: [ 417.427396] loop1: rw=1, want=116, limit=112 [ 417.433164] active_anon:168551 inactive_anon:197 isolated_anon:0 [ 417.433164] active_file:8374 inactive_file:17550 isolated_file:0 [ 417.433164] unevictable:0 dirty:4332 writeback:0 unstable:0 [ 417.433164] slab_reclaimable:15726 slab_unreclaimable:106117 [ 417.433164] mapped:58891 shmem:249 pagetables:4704 bounce:0 [ 417.433164] free:819146 free_pcp:317 free_cma:0 [ 417.447084] Buffer I/O error on dev loop1, logical block 115, lost async page write [ 417.448959] Node 0 active_anon:674104kB inactive_anon:788kB active_file:33364kB inactive_file:70200kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235564kB dirty:17324kB writeback:0kB shmem:996kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 417.452343] attempt to access beyond end of device [ 417.462254] loop1: rw=1, want=117, limit=112 [ 417.471594] Buffer I/O error on dev loop1, logical block 116, lost async page write [ 417.497668] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 417.508304] attempt to access beyond end of device [ 417.520807] Node 0 [ 417.523044] loop1: rw=1, want=130, limit=112 [ 417.526856] DMA free:10788kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 417.531342] Buffer I/O error on dev loop1, logical block 129, lost async page write [ 417.531387] attempt to access beyond end of device [ 417.531395] loop1: rw=1, want=131, limit=112 [ 417.531402] Buffer I/O error on dev loop1, logical block 130, lost async page write [ 417.531423] attempt to access beyond end of device [ 417.541373] lowmem_reserve[]: [ 417.544111] loop1: rw=1, want=132, limit=112 [ 417.549295] 0 2580 [ 417.554321] Buffer I/O error on dev loop1, logical block 131, lost async page write [ 417.554366] attempt to access beyond end of device [ 417.554373] loop1: rw=1, want=133, limit=112 [ 417.554380] Buffer I/O error on dev loop1, logical block 132, lost async page write [ 417.557027] attempt to access beyond end of device [ 417.563313] 2580 [ 417.565629] loop1: rw=1, want=4237, limit=112 [ 417.577572] 2580 [ 417.581932] attempt to access beyond end of device [ 417.594845] loop1: rw=1, want=4757, limit=112 [ 417.606957] Node 0 [ 417.609206] attempt to access beyond end of device [ 417.648353] DMA32 free:182404kB min:36468kB low:45584kB high:54700kB active_anon:674104kB inactive_anon:788kB active_file:33364kB inactive_file:70200kB unevictable:0kB writepending:15104kB present:3129332kB managed:2644924kB mlocked:0kB kernel_stack:11968kB pagetables:18668kB bounce:0kB free_pcp:1296kB local_pcp:568kB free_cma:0kB [ 417.651105] loop1: rw=1, want=4758, limit=112 [ 417.685769] lowmem_reserve[]: [ 417.688772] Buffer I/O error on dev loop1, logical block 4757, lost async page write [ 417.688812] attempt to access beyond end of device [ 417.700700] 0 [ 417.722533] loop1: rw=1, want=4759, limit=112 [ 417.722549] Buffer I/O error on dev loop1, logical block 4758, lost async page write [ 417.722594] attempt to access beyond end of device [ 417.722599] loop1: rw=1, want=4760, limit=112 [ 417.722624] attempt to access beyond end of device [ 417.732552] 0 [ 417.734257] loop1: rw=1, want=4761, limit=112 [ 417.768756] 0 [ 417.774125] attempt to access beyond end of device [ 417.778142] 0 [ 417.785945] loop1: rw=1, want=4790, limit=112 [ 417.785992] attempt to access beyond end of device [ 417.798510] loop1: rw=1, want=4791, limit=112 [ 417.798556] attempt to access beyond end of device [ 417.801453] Node 0 [ 417.808772] loop1: rw=1, want=4792, limit=112 [ 417.808826] attempt to access beyond end of device [ 417.818771] Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 417.826293] loop1: rw=1, want=4793, limit=112 [ 417.832236] lowmem_reserve[]: [ 417.833379] attempt to access beyond end of device [ 417.837799] 0 [ 417.839859] loop1: rw=1, want=4814, limit=112 [ 417.849603] 0 [ 417.851623] attempt to access beyond end of device [ 417.856528] 0 0 [ 417.886062] loop1: rw=1, want=4815, limit=112 [ 417.886112] attempt to access beyond end of device [ 417.886130] loop1: rw=1, want=4816, limit=112 [ 417.886152] attempt to access beyond end of device [ 417.901694] loop1: rw=1, want=4817, limit=112 [ 417.901734] attempt to access beyond end of device [ 417.906722] Node 1 [ 417.908435] loop1: rw=1, want=4850, limit=112 [ 417.908472] attempt to access beyond end of device [ 417.908481] loop1: rw=1, want=4851, limit=112 [ 417.918697] Normal free:3083276kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 417.921037] attempt to access beyond end of device [ 417.921048] loop1: rw=1, want=4852, limit=112 [ 417.926029] lowmem_reserve[]: [ 417.930539] attempt to access beyond end of device [ 417.930548] loop1: rw=1, want=4853, limit=112 [ 417.930598] attempt to access beyond end of device [ 417.941292] 0 [ 417.941802] loop1: rw=1, want=4866, limit=112 [ 417.943590] 0 [ 417.948507] attempt to access beyond end of device [ 417.954961] 0 [ 417.959836] loop1: rw=1, want=4867, limit=112 [ 417.959876] attempt to access beyond end of device [ 417.965479] 0 [ 417.969341] loop1: rw=1, want=4868, limit=112 [ 417.969376] attempt to access beyond end of device [ 417.981143] loop1: rw=1, want=4869, limit=112 [ 417.981189] attempt to access beyond end of device [ 418.012702] Node 0 [ 418.013644] loop1: rw=1, want=4878, limit=112 [ 418.018613] DMA: [ 418.020488] attempt to access beyond end of device [ 418.027612] 1*4kB [ 418.031784] loop1: rw=1, want=4879, limit=112 [ 418.031829] attempt to access beyond end of device [ 418.036189] (U) [ 418.038278] loop1: rw=1, want=4880, limit=112 [ 418.038316] attempt to access beyond end of device [ 418.046064] 0*8kB [ 418.047811] loop1: rw=1, want=4881, limit=112 [ 418.050562] attempt to access beyond end of device [ 418.055425] 0*16kB [ 418.057257] loop1: rw=1, want=8977, limit=112 [ 418.061305] attempt to access beyond end of device [ 418.064848] 1*32kB [ 418.068958] loop1: rw=1, want=13073, limit=112 [ 418.073315] attempt to access beyond end of device [ 418.078180] (U) [ 418.078496] loop1: rw=1, want=17169, limit=112 [ 418.111372] 2*64kB [ 418.118970] attempt to access beyond end of device [ 418.127355] (U) [ 418.127689] loop1: rw=1, want=21265, limit=112 [ 418.133789] 1*128kB [ 418.138472] attempt to access beyond end of device [ 418.139023] (U) [ 418.140872] loop1: rw=1, want=25361, limit=112 [ 418.145309] attempt to access beyond end of device [ 418.149873] 1*256kB [ 418.152236] loop1: rw=1, want=29457, limit=112 [ 418.155877] attempt to access beyond end of device [ 418.157992] (U) [ 418.158996] loop1: rw=1, want=32985, limit=112 [ 418.167605] 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10788kB [ 418.314859] Node 0 DMA32: 1920*4kB (UM) 1042*8kB (UME) 2510*16kB (UM) 2136*32kB (UM) 859*64kB (UME) 67*128kB (UME) 8*256kB (ME) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 190640kB [ 418.340223] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 418.355647] Node 1 Normal: 55*4kB (UE) 334*8kB (UE) 252*16kB (UE) 64*32kB (UE) 18*64kB (UE) 11*128kB (UME) 3*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 5*2048kB (UME) 746*4096kB (M) = 3083276kB [ 418.379278] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 418.388211] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 418.403970] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 418.413773] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 418.425187] 22119 total pagecache pages [ 418.429237] 0 pages in swap cache [ 418.432780] Swap cache stats: add 0, delete 0, find 0/0 09:15:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[], 0x0) 09:15:28 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 09:15:28 executing program 0: 09:15:28 executing program 2: 09:15:28 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:28 executing program 2: [ 418.438160] Free swap = 0kB [ 418.441292] Total swap = 0kB [ 418.444310] 1965979 pages RAM [ 418.447397] 0 pages HighMem/MovableOnly [ 418.451439] 333219 pages reserved [ 418.454888] 0 pages cma reserved 09:15:28 executing program 0: 09:15:28 executing program 1: 09:15:28 executing program 2: 09:15:28 executing program 0: 09:15:28 executing program 1: 09:15:28 executing program 2: [ 418.733951] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 418.756815] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 418.762516] CPU: 1 PID: 17831 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 418.769559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.778966] Call Trace: [ 418.781562] dump_stack+0x138/0x19c [ 418.785186] warn_alloc.cold+0x96/0x1af [ 418.789154] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 418.794013] ? lock_downgrade+0x6e0/0x6e0 [ 418.798184] ? avc_has_perm+0x2df/0x4b0 [ 418.802155] __vmalloc_node_range+0x3be/0x6a0 [ 418.806660] ? trace_hardirqs_on+0x10/0x10 [ 418.810902] vmalloc+0x46/0x50 [ 418.814086] ? sel_write_load+0x1a0/0x1050 [ 418.818308] sel_write_load+0x1a0/0x1050 [ 418.822356] ? save_trace+0x290/0x290 [ 418.826146] ? sel_read_bool+0x240/0x240 [ 418.830191] ? trace_hardirqs_on+0x10/0x10 [ 418.834413] ? save_trace+0x290/0x290 [ 418.838216] __vfs_write+0x107/0x6c0 [ 418.841948] ? __lock_is_held+0xb6/0x140 [ 418.845996] ? sel_read_bool+0x240/0x240 [ 418.850052] ? kernel_read+0x120/0x120 [ 418.853963] ? __lock_is_held+0xb6/0x140 [ 418.858008] ? check_preemption_disabled+0x3c/0x250 [ 418.863014] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 418.868454] ? rcu_read_lock_sched_held+0x110/0x130 [ 418.873474] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 418.878226] ? __sb_start_write+0x153/0x2f0 [ 418.882543] vfs_write+0x198/0x500 [ 418.886074] SyS_write+0xb8/0x180 [ 418.889542] ? SyS_read+0x180/0x180 [ 418.893160] ? do_syscall_64+0x53/0x630 [ 418.897128] ? SyS_read+0x180/0x180 [ 418.900749] do_syscall_64+0x1eb/0x630 [ 418.904623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.909480] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 418.914663] RIP: 0033:0x458c29 [ 418.917833] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 418.925530] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 418.932789] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 418.940074] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 418.947353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 418.954642] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff [ 418.963151] Mem-Info: [ 418.965608] active_anon:168515 inactive_anon:195 isolated_anon:0 [ 418.965608] active_file:8368 inactive_file:13481 isolated_file:0 [ 418.965608] unevictable:0 dirty:252 writeback:0 unstable:0 [ 418.965608] slab_reclaimable:15710 slab_unreclaimable:104579 [ 418.965608] mapped:58891 shmem:252 pagetables:4678 bounce:0 [ 418.965608] free:824866 free_pcp:282 free_cma:0 [ 419.006894] Node 0 active_anon:674060kB inactive_anon:780kB active_file:33340kB inactive_file:53924kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235564kB dirty:1004kB writeback:0kB shmem:1008kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 419.038295] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 419.069497] Node 0 DMA free:10788kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 419.100970] lowmem_reserve[]: 0 2580 2580 2580 [ 419.106908] Node 0 DMA32 free:204932kB min:36468kB low:45584kB high:54700kB active_anon:674052kB inactive_anon:776kB active_file:33340kB inactive_file:53936kB unevictable:0kB writepending:1028kB present:3129332kB managed:2644924kB mlocked:0kB kernel_stack:11936kB pagetables:18640kB bounce:0kB free_pcp:1448kB local_pcp:708kB free_cma:0kB [ 419.137886] lowmem_reserve[]: 0 0 0 0 [ 419.141787] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 419.167843] lowmem_reserve[]: 0 0 0 0 [ 419.171738] Node 1 Normal free:3083276kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 419.199703] lowmem_reserve[]: 0 0 0 0 [ 419.203649] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10788kB [ 419.217072] Node 0 DMA32: 1791*4kB (UME) 1563*8kB (UME) 3143*16kB (UME) 2155*32kB (UM) 866*64kB (UME) 74*128kB (UME) 8*256kB (ME) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 206372kB [ 419.233375] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 419.244197] Node 1 Normal: 55*4kB (UE) 334*8kB (UE) 252*16kB (UE) 64*32kB (UE) 18*64kB (UE) 11*128kB (UME) 3*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 5*2048kB (UME) 746*4096kB (M) = 3083276kB [ 419.261930] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 419.270834] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 419.279426] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB 09:15:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[], 0x0) 09:15:29 executing program 0: 09:15:29 executing program 2: 09:15:29 executing program 1: 09:15:29 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) 09:15:29 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) [ 419.288332] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 419.296954] 22096 total pagecache pages [ 419.301001] 0 pages in swap cache [ 419.304463] Swap cache stats: add 0, delete 0, find 0/0 [ 419.309813] Free swap = 0kB [ 419.312897] Total swap = 0kB [ 419.315912] 1965979 pages RAM [ 419.318997] 0 pages HighMem/MovableOnly [ 419.323027] 333219 pages reserved [ 419.326498] 0 pages cma reserved 09:15:29 executing program 1: 09:15:29 executing program 0: 09:15:29 executing program 2: 09:15:29 executing program 1: 09:15:29 executing program 0: 09:15:29 executing program 2: [ 419.596840] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 419.614877] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 419.622162] CPU: 1 PID: 17860 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 419.629289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.638693] Call Trace: [ 419.641279] dump_stack+0x138/0x19c [ 419.644897] warn_alloc.cold+0x96/0x1af [ 419.648903] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 419.653740] ? lock_downgrade+0x6e0/0x6e0 [ 419.657882] ? avc_has_perm+0x2df/0x4b0 [ 419.661848] __vmalloc_node_range+0x3be/0x6a0 [ 419.666355] ? trace_hardirqs_on+0x10/0x10 [ 419.670641] vmalloc+0x46/0x50 [ 419.673828] ? sel_write_load+0x1a0/0x1050 [ 419.678053] sel_write_load+0x1a0/0x1050 [ 419.682106] ? save_trace+0x290/0x290 [ 419.685950] ? sel_read_bool+0x240/0x240 [ 419.690009] ? trace_hardirqs_on+0x10/0x10 [ 419.694253] ? save_trace+0x290/0x290 [ 419.698052] __vfs_write+0x107/0x6c0 [ 419.701770] ? __lock_is_held+0xb6/0x140 [ 419.705836] ? sel_read_bool+0x240/0x240 [ 419.709887] ? kernel_read+0x120/0x120 [ 419.713790] ? __lock_is_held+0xb6/0x140 [ 419.717844] ? check_preemption_disabled+0x3c/0x250 [ 419.722856] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 419.728302] ? rcu_read_lock_sched_held+0x110/0x130 [ 419.733318] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 419.738070] ? __sb_start_write+0x153/0x2f0 [ 419.742390] vfs_write+0x198/0x500 [ 419.745965] SyS_write+0xb8/0x180 [ 419.749452] ? SyS_read+0x180/0x180 [ 419.753074] ? do_syscall_64+0x53/0x630 [ 419.757043] ? SyS_read+0x180/0x180 [ 419.760666] do_syscall_64+0x1eb/0x630 [ 419.764570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.769417] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 419.774615] RIP: 0033:0x458c29 [ 419.777809] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 419.785533] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 09:15:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[], 0x0) 09:15:29 executing program 1: 09:15:29 executing program 2: 09:15:29 executing program 0: 09:15:29 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, 0x0) 09:15:29 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, 0xffffffffffffffff) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x4000) [ 419.792798] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 419.800067] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 419.807357] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 419.814623] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff 09:15:29 executing program 1: 09:15:29 executing program 2: 09:15:29 executing program 0: 09:15:29 executing program 2: 09:15:29 executing program 1: 09:15:29 executing program 0: [ 420.076868] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 420.095895] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 420.104605] CPU: 0 PID: 17885 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 420.111673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.121050] Call Trace: [ 420.123688] dump_stack+0x138/0x19c [ 420.127348] warn_alloc.cold+0x96/0x1af [ 420.131354] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 420.136235] ? lock_downgrade+0x6e0/0x6e0 [ 420.140420] ? avc_has_perm+0x2df/0x4b0 [ 420.144417] __vmalloc_node_range+0x3be/0x6a0 [ 420.148918] ? trace_hardirqs_on+0x10/0x10 [ 420.153158] vmalloc+0x46/0x50 [ 420.156345] ? sel_write_load+0x1a0/0x1050 [ 420.160592] sel_write_load+0x1a0/0x1050 [ 420.164661] ? save_trace+0x290/0x290 [ 420.168467] ? sel_read_bool+0x240/0x240 [ 420.172525] ? trace_hardirqs_on+0x10/0x10 [ 420.176757] ? save_trace+0x290/0x290 [ 420.180555] __vfs_write+0x107/0x6c0 [ 420.184288] ? __lock_is_held+0xb6/0x140 [ 420.188339] ? sel_read_bool+0x240/0x240 [ 420.192390] ? kernel_read+0x120/0x120 [ 420.196286] ? __lock_is_held+0xb6/0x140 [ 420.201409] ? check_preemption_disabled+0x3c/0x250 [ 420.206457] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 420.211917] ? rcu_read_lock_sched_held+0x110/0x130 [ 420.216949] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 420.221698] ? __sb_start_write+0x153/0x2f0 [ 420.226139] vfs_write+0x198/0x500 [ 420.229680] SyS_write+0xb8/0x180 [ 420.233153] ? SyS_read+0x180/0x180 [ 420.236789] ? do_syscall_64+0x53/0x630 [ 420.240763] ? SyS_read+0x180/0x180 [ 420.244391] do_syscall_64+0x1eb/0x630 [ 420.248548] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.253407] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 420.258599] RIP: 0033:0x458c29 [ 420.261777] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 420.269483] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 420.276761] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 420.284062] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 420.291391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 420.300320] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff [ 420.308672] warn_alloc_show_mem: 1 callbacks suppressed [ 420.308677] Mem-Info: [ 420.316583] active_anon:168519 inactive_anon:193 isolated_anon:0 [ 420.316583] active_file:8368 inactive_file:13497 isolated_file:0 [ 420.316583] unevictable:0 dirty:271 writeback:0 unstable:0 [ 420.316583] slab_reclaimable:15703 slab_unreclaimable:104497 [ 420.316583] mapped:58880 shmem:242 pagetables:4665 bounce:0 [ 420.316583] free:824925 free_pcp:277 free_cma:0 [ 420.350925] Node 0 active_anon:674076kB inactive_anon:772kB active_file:33340kB inactive_file:53988kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235520kB dirty:1080kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 420.379244] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 420.405751] Node 0 DMA free:10788kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 420.433071] lowmem_reserve[]: 0 2580 2580 2580 [ 420.437728] Node 0 DMA32 free:205860kB min:36468kB low:45584kB high:54700kB active_anon:674076kB inactive_anon:772kB active_file:33340kB inactive_file:53988kB unevictable:0kB writepending:1084kB present:3129332kB managed:2644924kB mlocked:0kB kernel_stack:11936kB pagetables:18660kB bounce:0kB free_pcp:1324kB local_pcp:676kB free_cma:0kB [ 420.467876] lowmem_reserve[]: 0 0 0 0 [ 420.471784] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 420.497164] lowmem_reserve[]: 0 0 0 0 [ 420.501274] Node 1 Normal free:3083276kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 420.529145] lowmem_reserve[]: 0 0 0 0 [ 420.533108] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10788kB [ 420.546544] Node 0 DMA32: 1763*4kB (UME) 1369*8kB (UME) 3188*16kB (UME) 2166*32kB (UM) 866*64kB (UME) 75*128kB (UME) 8*256kB (ME) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 205908kB [ 420.563199] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 420.573996] Node 1 Normal: 55*4kB (UE) 334*8kB (UE) 252*16kB (UE) 64*32kB (UE) 18*64kB (UE) 11*128kB (UME) 3*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 5*2048kB (UME) 746*4096kB (M) = 3083276kB [ 420.591234] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 420.600230] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 420.608873] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 420.618177] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 09:15:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 09:15:30 executing program 1: 09:15:30 executing program 2: 09:15:30 executing program 0: 09:15:30 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x0) 09:15:30 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x0, 0xfffbffffffffffff}) 09:15:30 executing program 1: [ 420.626795] 22110 total pagecache pages [ 420.630837] 0 pages in swap cache [ 420.634291] Swap cache stats: add 0, delete 0, find 0/0 [ 420.639640] Free swap = 0kB [ 420.642700] Total swap = 0kB [ 420.645724] 1965979 pages RAM [ 420.648833] 0 pages HighMem/MovableOnly [ 420.652909] 333219 pages reserved [ 420.656487] 0 pages cma reserved 09:15:30 executing program 0: 09:15:30 executing program 2: 09:15:30 executing program 1: 09:15:30 executing program 0: 09:15:30 executing program 2: [ 420.960610] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 420.975300] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 420.982216] CPU: 0 PID: 17915 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 420.989481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.998846] Call Trace: [ 421.001456] dump_stack+0x138/0x19c [ 421.005071] warn_alloc.cold+0x96/0x1af [ 421.009038] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 421.013881] ? lock_downgrade+0x6e0/0x6e0 [ 421.018023] ? avc_has_perm+0x2df/0x4b0 [ 421.021990] __vmalloc_node_range+0x3be/0x6a0 [ 421.027129] ? trace_hardirqs_on+0x10/0x10 [ 421.031370] vmalloc+0x46/0x50 [ 421.034564] ? sel_write_load+0x1a0/0x1050 [ 421.038785] sel_write_load+0x1a0/0x1050 [ 421.042840] ? save_trace+0x290/0x290 [ 421.046638] ? sel_read_bool+0x240/0x240 [ 421.050715] ? trace_hardirqs_on+0x10/0x10 [ 421.054970] ? save_trace+0x290/0x290 [ 421.068673] __vfs_write+0x107/0x6c0 [ 421.074471] ? __lock_is_held+0xb6/0x140 [ 421.078753] ? sel_read_bool+0x240/0x240 [ 421.082818] ? kernel_read+0x120/0x120 [ 421.086700] ? __lock_is_held+0xb6/0x140 [ 421.099555] ? check_preemption_disabled+0x3c/0x250 [ 421.104774] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 421.110495] ? rcu_read_lock_sched_held+0x110/0x130 [ 421.115869] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 421.121212] ? __sb_start_write+0x153/0x2f0 [ 421.125959] vfs_write+0x198/0x500 [ 421.130154] SyS_write+0xb8/0x180 [ 421.133773] ? SyS_read+0x180/0x180 [ 421.137515] ? do_syscall_64+0x53/0x630 [ 421.141528] ? SyS_read+0x180/0x180 [ 421.146363] do_syscall_64+0x1eb/0x630 [ 421.150339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.155613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 421.161091] RIP: 0033:0x458c29 09:15:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 09:15:30 executing program 1: 09:15:30 executing program 2: 09:15:30 executing program 0: 09:15:30 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x0) 09:15:30 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x0, 0xfffbffffffffffff}) [ 421.164274] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 421.172015] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 421.179909] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 421.187211] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 421.194497] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 421.201764] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff 09:15:31 executing program 1: 09:15:31 executing program 0: 09:15:31 executing program 2: 09:15:31 executing program 0: 09:15:31 executing program 2: 09:15:31 executing program 1: [ 421.436899] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 421.463756] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 421.473213] CPU: 1 PID: 17938 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 421.480271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.489641] Call Trace: [ 421.492252] dump_stack+0x138/0x19c [ 421.495910] warn_alloc.cold+0x96/0x1af [ 421.500037] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 421.504911] ? lock_downgrade+0x6e0/0x6e0 [ 421.509138] ? avc_has_perm+0x2df/0x4b0 [ 421.513155] __vmalloc_node_range+0x3be/0x6a0 [ 421.513172] ? trace_hardirqs_on+0x10/0x10 [ 421.513185] vmalloc+0x46/0x50 [ 421.513199] ? sel_write_load+0x1a0/0x1050 [ 421.513212] sel_write_load+0x1a0/0x1050 [ 421.521968] ? save_trace+0x290/0x290 [ 421.521985] ? sel_read_bool+0x240/0x240 [ 421.521996] ? trace_hardirqs_on+0x10/0x10 [ 421.522006] ? save_trace+0x290/0x290 [ 421.522022] __vfs_write+0x107/0x6c0 [ 421.522036] ? __lock_is_held+0xb6/0x140 [ 421.557255] ? sel_read_bool+0x240/0x240 [ 421.561359] ? kernel_read+0x120/0x120 [ 421.565534] ? __lock_is_held+0xb6/0x140 [ 421.569608] ? check_preemption_disabled+0x3c/0x250 [ 421.574653] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 421.580112] ? rcu_read_lock_sched_held+0x110/0x130 [ 421.585137] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 421.589930] ? __sb_start_write+0x153/0x2f0 [ 421.594292] vfs_write+0x198/0x500 [ 421.597854] SyS_write+0xb8/0x180 [ 421.601301] ? SyS_read+0x180/0x180 [ 421.604917] ? do_syscall_64+0x53/0x630 [ 421.608882] ? SyS_read+0x180/0x180 [ 421.612615] do_syscall_64+0x1eb/0x630 [ 421.616591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.621452] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 421.626640] RIP: 0033:0x458c29 [ 421.629816] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 421.637514] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 421.644796] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 [ 421.652343] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 421.659607] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 421.666868] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff [ 421.675181] warn_alloc_show_mem: 1 callbacks suppressed [ 421.675185] Mem-Info: [ 421.685061] active_anon:168540 inactive_anon:194 isolated_anon:0 [ 421.685061] active_file:8369 inactive_file:13511 isolated_file:0 [ 421.685061] unevictable:0 dirty:283 writeback:0 unstable:0 [ 421.685061] slab_reclaimable:15697 slab_unreclaimable:104650 [ 421.685061] mapped:58880 shmem:242 pagetables:4688 bounce:0 [ 421.685061] free:824685 free_pcp:312 free_cma:0 [ 421.724720] Node 0 active_anon:674052kB inactive_anon:776kB active_file:33344kB inactive_file:54044kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235520kB dirty:1128kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 620544kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 421.753345] Node 1 active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 421.780569] Node 0 DMA free:10788kB min:216kB low:268kB high:320kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 421.806902] lowmem_reserve[]: 0 2580 2580 2580 [ 421.811609] Node 0 DMA32 free:206000kB min:36468kB low:45584kB high:54700kB active_anon:674052kB inactive_anon:776kB active_file:33344kB inactive_file:54056kB unevictable:0kB writepending:1140kB present:3129332kB managed:2644924kB mlocked:0kB kernel_stack:11936kB pagetables:18648kB bounce:0kB free_pcp:1308kB local_pcp:664kB free_cma:0kB [ 421.842148] lowmem_reserve[]: 0 0 0 0 [ 421.845990] Node 0 Normal free:0kB min:0kB low:0kB high:0kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:0kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 421.871435] lowmem_reserve[]: 0 0 0 0 [ 421.875271] Node 1 Normal free:3083276kB min:53420kB low:66772kB high:80124kB active_anon:0kB inactive_anon:0kB active_file:132kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870208kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 421.902998] lowmem_reserve[]: 0 0 0 0 [ 421.906827] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 0*1024kB 1*2048kB (M) 2*4096kB (M) = 10788kB [ 421.920209] Node 0 DMA32: 1780*4kB (UME) 1083*8kB (UME) 3263*16kB (UME) 2186*32kB (UM) 870*64kB (UME) 77*128kB (UME) 8*256kB (ME) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 206040kB [ 421.936500] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 421.947276] Node 1 Normal: 55*4kB (UE) 334*8kB (UE) 252*16kB (UE) 64*32kB (UE) 18*64kB (UE) 11*128kB (UME) 3*256kB (UM) 4*512kB (UE) 3*1024kB (UME) 5*2048kB (UME) 746*4096kB (M) = 3083276kB [ 421.964632] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 421.973721] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB 09:15:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) 09:15:31 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc04c5349, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue0\x00'}) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) 09:15:31 executing program 2: syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000140)="410f01f9c4e1f573d50664ff0941c3c4a25929123e46d8731266420fe2e33e0f11b1bc10d41042419d500101") mknod(&(0x7f00000000c0)='./file0\x00', 0x1040, 0x0) r0 = getpid() execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ptrace(0x10, r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) timer_gettime(0x0, 0x0) ptrace(0x11, r0) 09:15:31 executing program 0: 09:15:31 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x0, 0xfffbffffffffffff}) 09:15:31 executing program 4: r0 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x7, 0x9}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) syz_open_dev$usbmon(0x0, 0x80000001, 0x0) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x0, 0x8201) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000100), 0x0) fsetxattr(r3, &(0x7f0000000040)=@random={'osx.', '/dev/admmidi#\x00'}, &(0x7f0000000300)='mime_type\x00', 0xa, 0x3) write$binfmt_elf32(r2, &(0x7f0000000580)=ANY=[], 0x0) dup2(r1, r3) shmat(0x0, &(0x7f0000107000/0x4000)=nil, 0x0) [ 421.982346] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 421.991301] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 422.000089] 22125 total pagecache pages [ 422.004180] 0 pages in swap cache [ 422.007622] Swap cache stats: add 0, delete 0, find 0/0 [ 422.013037] Free swap = 0kB [ 422.016056] Total swap = 0kB [ 422.019276] 1965979 pages RAM [ 422.022706] 0 pages HighMem/MovableOnly [ 422.026686] 333219 pages reserved [ 422.030282] 0 pages cma reserved 09:15:31 executing program 0: 09:15:31 executing program 1: 09:15:31 executing program 1: 09:15:31 executing program 0: 09:15:31 executing program 1: 09:15:31 executing program 0: [ 422.346069] syz-executor.3: vmalloc: allocation failure: 0 bytes, mode:0x14000c0(GFP_KERNEL), nodemask=(null) [ 422.357062] syz-executor.3 cpuset=syz3 mems_allowed=0-1 [ 422.362630] CPU: 1 PID: 17977 Comm: syz-executor.3 Not tainted 4.14.111 #1 [ 422.369661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.379007] Call Trace: [ 422.381621] dump_stack+0x138/0x19c [ 422.385272] warn_alloc.cold+0x96/0x1af [ 422.389247] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 422.394104] ? lock_downgrade+0x6e0/0x6e0 [ 422.398277] ? avc_has_perm+0x2df/0x4b0 [ 422.402253] __vmalloc_node_range+0x3be/0x6a0 [ 422.406776] ? trace_hardirqs_on+0x10/0x10 [ 422.411021] vmalloc+0x46/0x50 [ 422.414230] ? sel_write_load+0x1a0/0x1050 [ 422.418505] sel_write_load+0x1a0/0x1050 [ 422.422575] ? save_trace+0x290/0x290 [ 422.426381] ? sel_read_bool+0x240/0x240 [ 422.430440] ? trace_hardirqs_on+0x10/0x10 [ 422.434783] ? save_trace+0x290/0x290 [ 422.438585] __vfs_write+0x107/0x6c0 [ 422.442317] ? __lock_is_held+0xb6/0x140 [ 422.446379] ? sel_read_bool+0x240/0x240 [ 422.450432] ? kernel_read+0x120/0x120 [ 422.454312] ? __lock_is_held+0xb6/0x140 [ 422.458380] ? check_preemption_disabled+0x3c/0x250 [ 422.463436] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 422.468906] ? rcu_read_lock_sched_held+0x110/0x130 [ 422.473931] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 422.478717] ? __sb_start_write+0x153/0x2f0 [ 422.483038] vfs_write+0x198/0x500 [ 422.486579] SyS_write+0xb8/0x180 [ 422.490041] ? SyS_read+0x180/0x180 [ 422.493673] ? do_syscall_64+0x53/0x630 [ 422.497710] ? SyS_read+0x180/0x180 [ 422.501340] do_syscall_64+0x1eb/0x630 [ 422.505230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.510079] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 422.515272] RIP: 0033:0x458c29 [ 422.518472] RSP: 002b:00007f942ca99c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 422.526278] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458c29 [ 422.533562] RDX: 0000000000000000 RSI: 0000000020000240 RDI: 0000000000000004 09:15:32 executing program 1: 09:15:32 executing program 4: [ 422.541015] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 422.548289] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f942ca9a6d4 [ 422.555567] R13: 00000000004c8777 R14: 00000000004def48 R15: 00000000ffffffff 09:15:32 executing program 2: 09:15:32 executing program 0: 09:15:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd0060010000800000000000000056"], 0x59) 09:15:32 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a}) 09:15:32 executing program 1: 09:15:32 executing program 4: 09:15:32 executing program 2: 09:15:32 executing program 4: 09:15:32 executing program 0: 09:15:32 executing program 1: 09:15:32 executing program 2: 09:15:32 executing program 1: 09:15:32 executing program 4: 09:15:32 executing program 2: [ 423.058348] SELinux: failed to load policy 09:15:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd0060010000800000000000000056"], 0x59) 09:15:32 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a}) 09:15:32 executing program 0: 09:15:32 executing program 1: 09:15:32 executing program 4: 09:15:32 executing program 2: 09:15:32 executing program 1: 09:15:32 executing program 4: 09:15:32 executing program 0: 09:15:33 executing program 2: 09:15:33 executing program 2: 09:15:33 executing program 0: [ 423.333627] SELinux: failed to load policy 09:15:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd0060010000800000000000000056"], 0x59) 09:15:33 executing program 5: socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000004c0)={0x1000000a}) 09:15:33 executing program 1: 09:15:33 executing program 4: 09:15:33 executing program 0: 09:15:33 executing program 2: 09:15:33 executing program 1: 09:15:33 executing program 2: 09:15:33 executing program 4: 09:15:33 executing program 0: 09:15:33 executing program 4: 09:15:33 executing program 1: 09:15:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bc"], 0x86) 09:15:33 executing program 2: 09:15:33 executing program 0: 09:15:33 executing program 1: 09:15:33 executing program 4: 09:15:33 executing program 5: [ 423.708674] SELinux: failed to load policy 09:15:33 executing program 2: 09:15:33 executing program 4: 09:15:33 executing program 1: 09:15:33 executing program 0: 09:15:33 executing program 2: 09:15:33 executing program 1: 09:15:33 executing program 0: 09:15:33 executing program 4: 09:15:33 executing program 2: 09:15:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$VIDIOC_ENUMOUTPUT(0xffffffffffffffff, 0xc0485630, &(0x7f00000001c0)={0x0, "5a35dde68fae13946df89a9691dfe154c78b3d72c80f36772d904ace861393bc", 0x0, 0xcd, 0xf8, 0x7, 0xa}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) prctl$PR_GET_ENDIAN(0x13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 09:15:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bc"], 0x86) 09:15:33 executing program 5: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x8002) write(r0, &(0x7f00000002c0)="ccb2edf3", 0x4) [ 423.951315] SELinux: failed to load policy 09:15:33 executing program 2: 09:15:33 executing program 0: 09:15:33 executing program 4: 09:15:33 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0xbb5, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x134a, 0x40800) read(r1, 0x0, 0x0) 09:15:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000014c0), 0x1000) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, 0x0) 09:15:33 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000200)=0xfffffffffffffffd) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x3) fcntl$getflags(0xffffffffffffffff, 0x401) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) [ 424.256785] EXT4-fs warning (device sda1): ext4_group_extend:1756: will only finish group (524288 blocks, 256 new) 09:15:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") times(&(0x7f0000000140)) [ 424.299129] EXT4-fs warning (device sda1): ext4_group_extend:1762: can't read last block, resize aborted 09:15:34 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0xbb5, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x134a, 0x40800) read(r1, 0x0, 0x0) 09:15:34 executing program 2: syz_execute_func(&(0x7f0000000280)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e36645d92d010000003e0f1110c442019dcc6f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) symlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00') r2 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r3 = dup2(r1, r2) open$dir(0x0, 0x0, 0x0) clone(0x4003102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) [ 424.567718] SELinux: failed to load policy 09:15:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f00000000c0)=""/200, 0xc8}, {&(0x7f00000001c0)=""/79, 0x4f}, {&(0x7f0000000280)=""/253, 0xfd}], 0x3, 0x0) 09:15:34 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0xbb5, 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x134a, 0x40800) read(r1, 0x0, 0x0) 09:15:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bc"], 0x86) 09:15:34 executing program 2: syz_emit_ethernet(0x163, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x155, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x11, 0x0, 0x0, @empty, "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"}}}}}, 0x0) 09:15:34 executing program 5: 09:15:34 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="3b00000002"]}) 09:15:34 executing program 5: r0 = epoll_create1(0x0) flock(r0, 0x100000000000001) 09:15:34 executing program 4: 09:15:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") gettid() timer_create(0x0, 0x0, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000380)={{}, {0x0, 0x1c9c380}}, &(0x7f00000003c0)) 09:15:34 executing program 2: syz_execute_func(&(0x7f0000000280)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e36645d92d010000003e0f1110c442019dcc6f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x203, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00') mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) execve(0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r3 = dup2(r1, r2) execve(0x0, 0x0, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) clone(0x4003102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 09:15:34 executing program 0: 09:15:34 executing program 1: 09:15:34 executing program 1: 09:15:34 executing program 4: 09:15:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f00"], 0x9c) 09:15:34 executing program 0: 09:15:34 executing program 1: 09:15:34 executing program 4: [ 425.225973] SELinux: failed to load policy 09:15:35 executing program 5: 09:15:35 executing program 2: 09:15:35 executing program 1: 09:15:35 executing program 0: 09:15:35 executing program 4: 09:15:35 executing program 2: 09:15:35 executing program 0: 09:15:35 executing program 1: 09:15:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f00"], 0x9c) 09:15:35 executing program 4: 09:15:35 executing program 0: 09:15:35 executing program 2: 09:15:35 executing program 1: 09:15:35 executing program 5: [ 425.558087] SELinux: failed to load policy 09:15:35 executing program 4: 09:15:35 executing program 0: 09:15:35 executing program 2: 09:15:35 executing program 1: 09:15:35 executing program 2: 09:15:35 executing program 1: 09:15:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f00"], 0x9c) 09:15:35 executing program 0: 09:15:35 executing program 4: 09:15:35 executing program 2: 09:15:35 executing program 1: 09:15:35 executing program 5: [ 425.819922] SELinux: failed to load policy 09:15:35 executing program 0: 09:15:35 executing program 1: 09:15:35 executing program 2: 09:15:35 executing program 4: 09:15:35 executing program 1: 09:15:35 executing program 0: 09:15:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb45"], 0xa7) 09:15:35 executing program 2: 09:15:35 executing program 4: 09:15:35 executing program 0: 09:15:35 executing program 1: [ 426.066848] SELinux: failed to load policy 09:15:35 executing program 5: 09:15:35 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) shutdown(r1, 0x0) 09:15:35 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) utimes(0x0, 0x0) 09:15:35 executing program 4: 09:15:35 executing program 2: 09:15:35 executing program 4: 09:15:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\b', 0x2000003ffe}) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000080)={'eql\x00', @ifru_ivalue=0x10e8}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 09:15:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb45"], 0xa7) 09:15:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='c\xb0@oup.e\xcb2\x04\xcc22\xb3kx\x18\xa2vents\a\xfb\xf4M\x161%q\x98E1q \x80\xf0E\xc7\xcf3\xa1Z>\xe5\x05\x90\r\xf4F\xce7\x04\xc0\xa9\xf1T\xc9\xca\xeb\x9a\xf7\xa01\xe8\xeb\r\xec{\x88c\xa2\r\x1a\x00\x9f\x9c\xc2\xc6s\xeaK\xa9f\xd67\xea\xe3\xa5\xfa\xb2Y\xe9DN[{\xf0\x1e\xb5Ly\xe5\xf7\xd9M\xcc\xec\x8a\x85\xea\xb3\x18\xe5,\xb3\xa8D \x88\xd0p@I\xdaz\"\xfal\xa9\xcb\xb1 \x9f+j\xb8$m\"\"a?\xb3\x00\xbc\f\xbb\x16\x8b\xb1ac\x06\xb4\xa2\xe4m`\xe7\xed\x02\xa8E\xcc\x1d\xce\xd7 UO\x17\x9d\xfbu\x19#LD\"\xc6mA\x8d\x9e\x0e\x0f\xcb\x04\xbf\xf6\x1cc\x14\x1dz\f\xf5p\x12D+\xcd\x98\x0f>\xa9\xe3+\b\x97H\'9\xdc\xf5\xf6\xab1\xb3\x960\x10\x1c\xec\xf1\x1b\x90O+HZ0\xe9\x9bL\xa3\x87?\xb2\xed\xb6\x8f\xe9T\x90\xa4\xda\x14\x9f\x95L\xb9\x8c\t\xae\xd1 z\x81\xe6\xba\xc7b\xbb\x7f\xbbY\xa9\xf8\xcc&\xd2[\x18\xf8\x1f\xb7r]\x8c\vp\xca-\xe5R\x17\xf8\xfdS\xc6,o\r.\x8ay\xb0n}\x18\xdf?\x80f^\xe7\x01h\"\x89^[07JV\xa5L\x06\x0ea\xf4jZ\xcf\xe1\x18e\x99Xs\x83\xed_\x0f%\x14\"BXV\xac\x117\x96\xc7\xbe\x88\'\xd5\b\x1e\x193H[>\xa7\xbc\xcd\x87\x96\xabg\"\x9f\xaa\xa3N\x98\x0e2\x1b\xd8\x9aC\x97\xbb\x11\xd7\x8a\xe5\x95\x97\x98cWD\xb8\xf5K\xbb\xeb\xd7\x89\xef\xaf5\xd0\xb9\xe2\xff/1\x05\xf5l\x04\xe3\x06\xab=\x924[>lE\xf3\x9b\xd4\xc9\xe5-\xf1\x93)\xbe\xe0{{\x99\t\x92Z\xfaZ\xfe\xac\xe9\xaf\a>zH\xdaJ\x9e\xd1\x7f\n \xde\xb6>m\xdcG\x83H,\xc1\x14\xcb\xd4 \x15T)-', 0xea02ffe0, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="03020000000000002c00"], 0x1, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x2000, 0x2000004, 0x1013, r1, 0x0) 09:15:36 executing program 4: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000100)="2300000052008152915a655067d7aee4050c0000136017edcaa30000000000008b1832", 0x23}], 0x1}, 0x0) 09:15:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) utimes(0x0, 0x0) 09:15:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") read$FUSE(r0, 0x0, 0x0) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x80) [ 426.359016] SELinux: failed to load policy [ 426.405642] audit: type=1800 audit(1555319736.146:65): pid=18300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name=63B0406F75702E65CB3204CC3232B36B7818A276656E747307FBF44D16312571984531712080F045C7CF33A15A3EE505900DF446CE3704C0A9F154C9CAEB9AF7A031E8EB0DEC7B8863A20D1A dev="sda1" ino=17492 res=0 09:15:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) ppoll(&(0x7f0000000040)=[{r1, 0x1240}, {r0}], 0x2, 0x0, 0x0, 0x0) 09:15:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="baa000edf26df20f080347640f0058d5640f320f381dec0f221b8d4e9c66b80500000066b94a7b00000f01c1", 0x2c}], 0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 426.458297] audit: type=1800 audit(1555319736.196:66): pid=18300 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name=63B0406F75702E65CB3204CC3232B36B7818A276656E747307FBF44D16312571984531712080F045C7CF33A15A3EE505900DF446CE3704C0A9F154C9CAEB9AF7A031E8EB0DEC7B8863A20D1A dev="sda1" ino=17492 res=0 09:15:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) utimes(0x0, 0x0) 09:15:36 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0044308, &(0x7f0000000080)={0x0, 0x0}) 09:15:36 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0044308, &(0x7f0000000080)={0x0, 0x0}) [ 426.598046] kvm: pic: non byte read 09:15:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x40002102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0xfdf2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000380)='r(mfc\x00\x18\x0e`[\xb2\xce\xa0\x8b\xeb\xe9\xa4\x8e\xb0X\x01\x00\x00\x00\x00\x00\x00\x00\xb3\x80\"}\xa8>u!\xba\f\x1d\x89y\xbe\xf0\xa2\xd1eh#\xa7gP\x88\xf0\xe2\x9c\xb09\b\xfe(\xfe\xf1\xf4a\xd7,\v\x17fD\xbbda\xed\x1f\x03>\x03\xbb\x14\xfd\xdd\x7f\xb5\xef\xd3\xa3\xc7\xdcx\xa9Xa\xe1\xd4\xe3\xa8\x89\xb5\xe0V\xad\x92\xc3\xfc\xba:~\xba\xae\xcbV\x95\xf5\xa4\xa9\x8f\xe2\xd3\xe6\x9c#n@-\xc5E\xf2J\xc2:\x93C\xd1}V\xb2Z\x82\x92K\xa2\xe2\xeb\xa52\vr\x80\x96\xf9\x19-!\xf9M\x90DiN\x89\xf4v\xa9\x01\xf3\xc8\xe8\xfc\x1e\xd7P\xd6atz\xe7\xa4P\xb9\x1b\xc4\t\x92\xaf\xabq\x7f\xadCE\xf6.9c\xd9\x9b\xbc\xeb+\x95O\xfe\xeb\xbdh\x12`\xcb\xe3\x16D\x04\xef\xdfj-\xfe\x9d>\xa1', 0x0, 0x0) [ 426.633557] kvm: pic: non byte read [ 426.647131] kvm: pic: single mode not supported [ 426.668308] kvm: pic: non byte read 09:15:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) utimes(0x0, 0x0) [ 426.685857] kvm: pic: non byte read [ 426.692455] kvm: pic: non byte read [ 426.706997] kvm: pic: level sensitive irq not supported [ 426.709973] kvm: pic: non byte read [ 426.726820] kvm: pic: single mode not supported 09:15:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x8000000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) 09:15:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb45"], 0xa7) [ 426.726868] kvm: pic: level sensitive irq not supported 09:15:36 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:36 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x5d1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 09:15:36 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cg\xe2\xe6Y\x05\xe3\x8d_R\x02\x89?ro\xc2\xb7\xa3!s9\xa2\x97\xff\x04,f\xa4\x1a\x00*\xae`\xd0\xf7\xf60:\'$9x\xb2U\x85\xbd\xaf\xd6w\xffcP+RO\xb4', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r3 = dup(r2) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) syz_genetlink_get_family_id$team(0x0) 09:15:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='task\x00') getdents(r0, &(0x7f00000000c0)=""/239, 0x61) 09:15:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b"], 0xad) 09:15:37 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, {0x0, 0x0, 0x0, 0x1e, 0x0, 0x64}}) 09:15:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) 09:15:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:37 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x29) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) exit_group(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c1261319bd070") 09:15:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:37 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x800000000002, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, 0x0, 0x0) 09:15:37 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_rm_watch(r0, 0x0) 09:15:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000280)={{}, 'syz0\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 09:15:37 executing program 1: 09:15:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 427.789484] input: syz0 as /devices/virtual/input/input14 [ 427.909305] input: syz0 as /devices/virtual/input/input15 09:15:37 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) syz_open_procfs(0x0, &(0x7f0000000080)='autogroup\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x13, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 09:15:37 executing program 2: 09:15:37 executing program 1: 09:15:37 executing program 4: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 09:15:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b"], 0xad) 09:15:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 09:15:37 executing program 1: 09:15:37 executing program 4: 09:15:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b"], 0xad) [ 428.087014] sel_write_load: 3 callbacks suppressed [ 428.087018] SELinux: failed to load policy 09:15:37 executing program 1: 09:15:37 executing program 4: [ 428.305531] SELinux: failed to load policy [ 428.398777] xprt_adjust_timeout: rq_timeout = 0! 09:15:38 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) syz_open_procfs(0x0, &(0x7f0000000080)='autogroup\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x13, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 09:15:38 executing program 1: 09:15:38 executing program 2: 09:15:38 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:38 executing program 4: 09:15:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e98"], 0xb0) [ 428.476254] xprt_adjust_timeout: rq_timeout = 0! 09:15:38 executing program 1: 09:15:38 executing program 2: 09:15:38 executing program 4: 09:15:38 executing program 0: r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:38 executing program 1: 09:15:38 executing program 4: 09:15:38 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) syz_open_procfs(0x0, &(0x7f0000000080)='autogroup\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x13, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 09:15:38 executing program 2: 09:15:38 executing program 4: 09:15:38 executing program 1: 09:15:38 executing program 0: r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e98"], 0xb0) [ 428.748947] SELinux: failed to load policy 09:15:38 executing program 1: 09:15:38 executing program 4: 09:15:38 executing program 0: r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:38 executing program 2: 09:15:38 executing program 4: 09:15:38 executing program 1: [ 429.038085] SELinux: failed to load policy 09:15:38 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) syz_open_procfs(0x0, &(0x7f0000000080)='autogroup\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x13, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 09:15:38 executing program 2: 09:15:38 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:38 executing program 4: 09:15:38 executing program 1: 09:15:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e98"], 0xb0) 09:15:38 executing program 1: 09:15:38 executing program 2: 09:15:38 executing program 4: 09:15:38 executing program 1: 09:15:38 executing program 2: 09:15:38 executing program 4: [ 429.218289] SELinux: failed to load policy [ 429.468127] xprt_adjust_timeout: rq_timeout = 0! 09:15:39 executing program 5: 09:15:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d"], 0xb1) 09:15:39 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:39 executing program 4: 09:15:39 executing program 2: 09:15:39 executing program 1: 09:15:39 executing program 2: 09:15:39 executing program 4: 09:15:39 executing program 1: 09:15:39 executing program 2: 09:15:39 executing program 4: 09:15:39 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 429.687816] SELinux: failed to load policy 09:15:39 executing program 5: 09:15:39 executing program 2: 09:15:39 executing program 1: 09:15:39 executing program 4: 09:15:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d"], 0xb1) 09:15:39 executing program 1: 09:15:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', 0x0, 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:39 executing program 2: 09:15:39 executing program 4: 09:15:39 executing program 1: 09:15:39 executing program 2: 09:15:39 executing program 4: 09:15:39 executing program 5: 09:15:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781500000000f600000800000007000000402c1100000000000900000700000000000000000000000038585800000000000000000000000000006dbd006001000080000000000000005600000014e0cabe08c56cfad8827ab2219098074e4d2c4b4d2253096a42e23f530eda74061239e254ed59b241bcd9b3f89db09bd329f903b6cc1634726881f779aa7f0000000000000005bb5bcb4583b85957548b454e987d"], 0xb1) [ 429.986382] SELinux: failed to load policy 09:15:39 executing program 2: 09:15:39 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', 0x0, 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:39 executing program 4: 09:15:39 executing program 1: 09:15:39 executing program 2: 09:15:39 executing program 2: 09:15:39 executing program 1: 09:15:39 executing program 4: 09:15:40 executing program 2: 09:15:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', 0x0, 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 430.258428] SELinux: failed to load policy 09:15:40 executing program 5: 09:15:40 executing program 1: 09:15:40 executing program 3: 09:15:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:40 executing program 4: 09:15:40 executing program 2: 09:15:40 executing program 2: 09:15:40 executing program 1: 09:15:40 executing program 4: 09:15:40 executing program 2: [ 430.496975] FAT-fs (loop0): bogus number of reserved sectors [ 430.503522] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:40 executing program 1: syz_execute_func(&(0x7f0000000000)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) socket(0x3, 0x0, 0x0) 09:15:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000300)=""/193) 09:15:40 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r3 = dup(r2) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) syz_genetlink_get_family_id$team(0x0) 09:15:40 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000300)) r2 = dup(r1) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) syz_genetlink_get_family_id$team(0x0) 09:15:40 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cg\xe2\xe6Y\x05\xe3\x8d_R\x02\x89?ro\xc2\xb7\xa3!s9\xa2\x97\xff\x04,f\xa4\x1a\x00*\xae`\xd0\xf7\xf60:\'$9x\xb2U\x85\xbd\xaf\xd6w\xffcP+RO\xb4', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r3 = dup(r2) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) syz_genetlink_get_family_id$team(0x0) [ 430.685609] FAT-fs (loop0): bogus number of reserved sectors [ 430.695918] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:40 executing program 1: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00\x00\x06\x01k\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) 09:15:40 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) 09:15:40 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{&(0x7f00000011c0)=@generic, 0x80, &(0x7f0000002700)=[{&(0x7f0000001240)=""/75, 0x4b}], 0x5, &(0x7f00000027c0)=""/243, 0x500}}], 0x500, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x80000000000007, &(0x7f0000000180), 0x4) [ 430.815230] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.822685] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.831886] FAT-fs (loop0): bogus number of reserved sectors [ 430.837730] FAT-fs (loop0): Can't find a valid FAT filesystem [ 430.887980] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.894427] input: syz1 as /devices/virtual/input/input16 [ 430.894520] bridge0: port 2(bridge_slave_1) entered forwarding state [ 430.906801] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.913284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 430.927994] device bridge0 entered promiscuous mode 09:15:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 430.933933] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 430.985781] input: syz1 as /devices/virtual/input/input17 [ 430.999091] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.999604] FAT-fs (loop0): bogus number of reserved sectors [ 431.005637] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.019258] device bridge0 left promiscuous mode [ 431.039499] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.046006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.052287] FAT-fs (loop0): Can't find a valid FAT filesystem [ 431.052755] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.067872] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.081792] device bridge0 entered promiscuous mode 09:15:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:40 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 431.088812] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 09:15:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) timer_create(0x0, 0x0, 0x0) [ 431.202558] FAT-fs (loop0): bogus number of reserved sectors [ 431.253046] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:41 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msgrcv(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xfffffe28) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) msgctl$IPC_RMID(0x0, 0x0) 09:15:41 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0) fchdir(r0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./control\x00', 0x3) 09:15:41 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) shutdown(r0, 0x0) read(r0, &(0x7f0000000280)=""/202, 0xca) 09:15:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x2, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) timer_create(0x0, 0x0, 0x0) 09:15:41 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cg\xe2\xe6Y\x05\xe3\x8d_R\x02\x89?ro\xc2\xb7\xa3!s9\xa2\x97\xff\x04,f\xa4\x1a\x00*\xae`\xd0\xf7\xf60:\'$9x\xb2U\x85\xbd\xaf\xd6w\xffcP+RO\xb4', 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r3 = dup(r2) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) syz_genetlink_get_family_id$team(0x0) 09:15:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x4, 0x8}, 0x2c) unshare(0x28020400) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r0, &(0x7f0000000240), 0x0}, 0x18) 09:15:41 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_dev$mouse(0x0, 0x0, 0xa200) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)={0x2, [0x0, 0x0]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 431.474016] FAT-fs (loop0): bogus number of reserved sectors [ 431.474064] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 431.584465] FAT-fs (loop0): bogus number of reserved sectors [ 431.598451] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:41 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000013000/0x1000)=nil, 0x1000}}) 09:15:41 executing program 4: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000100)='eth0\x00') mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x7f, 0x0) close(r0) 09:15:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 431.789628] FAT-fs (loop0): bogus number of reserved sectors [ 431.795999] FAT-fs (loop0): Can't find a valid FAT filesystem [ 431.910228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 09:15:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:42 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) 09:15:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:42 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(0xffffffffffffffff, 0xc004ae02, &(0x7f0000000040)={0x2, [0x0, 0x0]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 09:15:42 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x800, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/1, 0x2}], 0x200000000000000f) 09:15:42 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000280)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x20000003ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000040)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") r1 = creat(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r1, 0x1260, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 09:15:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) [ 432.395860] FAT-fs (loop0): bogus number of reserved sectors [ 432.431375] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x3, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') preadv(r0, &(0x7f0000002380)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x91) 09:15:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) shutdown(r1, 0x1) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000300)="410f01f964ff0941c3c0e2e69358423e46d8731266420fe2e33e0f1110c442019dcc6f") sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4004010) write$smack_current(r1, 0x0, 0x0) [ 432.689286] FAT-fs (loop0): bogus number of reserved sectors 09:15:42 executing program 4: setxattr$security_smack_transmute(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x3) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xc000000000, 0x40001) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) fadvise64(r0, 0x0, 0xae2, 0x5) keyctl$revoke(0x3, r3) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc0\x00', 0x400, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(r4, 0x29, 0x0, &(0x7f00000007c0)={@loopback, r5}, 0x14) write$P9_RREADLINK(r4, &(0x7f0000002ac0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYBLOB="e25b65db64dfe6caf72d69a41c1a003590aff200dc967b42610f", @ANYRES32]], 0x4) ioctl$RNDZAPENTCNT(r4, 0x5204, &(0x7f0000000380)=0x5) clone(0x6102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$random(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x1, 0x0) writev(r2, &(0x7f0000000700)=[{&(0x7f0000000640)="66272eaa06a51a7d7226b96c2afb86ce08ef206b217688545660d86fe1f9c065e14cd72ace015de136876bff95ab12204af3a19a121cafc578add591ed5cdf36debdfe982b958c73b950c20791a2518c94a6d94d38e8093c3fae17f19015d49732509ed467082e75cc9ad0410509b6461a9ede4dee14f906c34252e8639cb99db404843e87bc912683adedae11e4a4462eff26c24152cbba49c3168b5bc240c1032280b3af260175f3bd341e1fdb74f3c60d51a252adb9dd5d410f36b4bf", 0xbe}], 0x1) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f00000003c0)={0x29, 0x400001, 0x7f, 0x0, "0000e1d1ea0000000000000000afa68a69da0000000000000000000800"}) ioctl$EVIOCGSW(r2, 0x8040451b, 0x0) socketpair$unix(0x1, 0x40000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap(&(0x7f0000320000/0x3000)=nil, 0x3000, 0x0, 0x8031, r0, 0x3) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000180), 0x4) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0xf012) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='syz_tun\x00', 0x10) r8 = dup2(r0, r0) sendmsg$NBD_CMD_RECONFIGURE(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYRESOCT=0x0], 0x1}}, 0x0) write$cgroup_type(r8, &(0x7f0000000140)='threaded\x00', 0xfffffebd) [ 432.747215] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:42 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 09:15:42 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 433.107441] FAT-fs (loop0): bogus number of reserved sectors [ 433.128653] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) r1 = socket(0x44000000002, 0x3, 0x67) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)=@abs, 0x6e) 09:15:43 executing program 4: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) mq_notify(r0, &(0x7f0000000480)={0x0, 0x13, 0x1, @thr={&(0x7f00000003c0)="40f9b89f635a281b2f6e2c0fa9c229d6abde3833c5be384a40f855f938e138d5c903511709b1efc3961a937a837be15be254d2c25c6e054c0f1886f169ad1bc5073beecc6bf54de6c342ef2591119a50c3e246f537d8d6da8d4b5b4e1d74413c3af79b621df2e5df4f419547b4876bfd9d3d205bd8e2cb2b7e23d17a7cc4a136cbaf81a67a0c06ca44e174d84eba8024b6d4", 0x0}}) mq_timedsend(r0, 0x0, 0x0, 0x7f, 0x0) 09:15:43 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r0) 09:15:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:43 executing program 2: r0 = socket(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 09:15:43 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x900, 0x80) openat(r0, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000080)='autogroup\x00') rt_tgsigqueueinfo(0x0, r1, 0x13, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 09:15:43 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0044308, &(0x7f0000000080)={0x7ff, 0x0}) 09:15:43 executing program 1: syz_execute_func(&(0x7f0000000080)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000480)='./file0\x00', 0x1043, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/11, 0xfffffe28) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) msgctl$IPC_RMID(r0, 0x0) 09:15:43 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000040), 0x1000) ppoll(&(0x7f0000001200)=[{r0}], 0x1, 0x0, &(0x7f0000001280)={0x1c7a000000000000}, 0x8) [ 433.838151] FAT-fs (loop0): bogus number of reserved sectors [ 433.845259] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodatasum='nodatasum'}, {@compress_algo={'compress', 0x3d, 'no'}}, {@noflushoncommit='noflushoncommit'}]}) gettid() [ 433.946298] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! [ 433.989968] FAT-fs (loop0): bogus number of reserved sectors [ 433.997382] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:43 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:43 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r3 = dup(r2) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) 09:15:43 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f00000001c0)='cg\xe2\xe6Y\x05\xe3\x8d_R\x02\x89?ro\xc2\xb7\xa3!s9\xa2\x97\xff\x04,f\xa4\x1a\x00*\xae`\xd0\xf7\xf60:\'$9x\xb2U\x85\xbd\xaf\xd6w\xffcP+RO\xb4', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) fsetxattr$security_ima(r1, &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x2) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r2 = dup(r1) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) syz_genetlink_get_family_id$team(0x0) 09:15:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={[{@nodatasum='nodatasum'}, {@compress_algo={'compress', 0x3d, 'no'}}, {@noflushoncommit='noflushoncommit'}]}) gettid() [ 434.144452] FAT-fs (loop0): bogus number of reserved sectors [ 434.168891] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:44 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) unlink(&(0x7f00000002c0)='./bus\x00') [ 434.305271] FAT-fs (loop0): bogus number of reserved sectors [ 434.318331] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:44 executing program 3: r0 = socket(0x400040000000015, 0x805, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") getsockopt(r0, 0x114, 0x271d, 0x0, &(0x7f0000000040)) 09:15:44 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:46 executing program 1: syz_execute_func(&(0x7f0000000140)="f3abf564ff0941c335e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc4bf34dd9e0") clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000040)=""/11, 0xb) r1 = epoll_create1(0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) r4 = syz_open_pts(r0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) dup2(r1, r4) 09:15:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f0000000080), &(0x7f0000000300)=0x4) r2 = dup(r1) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) syz_genetlink_get_family_id$team(0x0) 09:15:46 executing program 5: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendto$rose(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000500)='./bus\x00', 0x200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000002c0)='./bus\x00') sendfile(r1, r1, &(0x7f00000000c0), 0x80810002ca7d) 09:15:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) write$P9_RLCREATE(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 436.887610] FAT-fs (loop0): bogus number of reserved sectors [ 436.899196] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:46 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) flock(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) 09:15:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) dup(r0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x80000000006) r2 = dup3(r1, r0, 0x0) write$UHID_INPUT(r2, &(0x7f0000001640)={0x300, "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", 0x1000}, 0x1006) [ 437.002796] FAT-fs (loop0): bogus number of reserved sectors [ 437.008755] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) write$P9_RLCREATE(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 09:15:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:46 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) [ 437.187611] FAT-fs (loop0): bogus number of reserved sectors [ 437.211110] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) [ 437.332716] FAT-fs (loop0): invalid media value (0x00) [ 437.338053] FAT-fs (loop0): Can't find a valid FAT filesystem [ 437.466252] FAT-fs (loop0): invalid media value (0x00) [ 437.471765] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:47 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) flock(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$uhid(0xffffffffffffff9c, 0x0, 0x802, 0x0) 09:15:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xe, 0x180) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x9, 0xfff, 0x49a, 'queue1\x00', 0x1}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:15:47 executing program 5: openat$cgroup_int(0xffffffffffffffff, &(0x7f00000001c0)='cg\xe2\xe6Y\x05\xe3\x8d_R\x02\x89?ro\xc2\xb7\xa3!s9\xa2\x97\xff\x04,f\xa4\x1a\x00*\xae`\xd0\xf7\xf60:\'$9x\xb2U\x85\xbd\xaf\xd6w\xffcP+RO\xb4', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000500)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000300)) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x0, 0x2000000013}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) syz_genetlink_get_family_id$team(0x0) 09:15:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:47 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000680)=0xfff, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x10000017c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1ffc}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x400100) [ 437.634939] FAT-fs (loop0): invalid media value (0x00) [ 437.641795] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000274", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000001180)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000001040)={0x90, 0x0, 0x0, {0x20000000007, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}, 0x90) 09:15:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f00000000c0)={0x0, 0xffffff65, 0x0}) 09:15:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xe, 0x180) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x9, 0xfff, 0x49a, 'queue1\x00', 0x1}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 437.806846] FAT-fs (loop0): invalid media value (0x00) [ 437.826361] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000274", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) rename(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1/file0\x00') [ 437.977194] FAT-fs (loop0): invalid media value (0x00) [ 437.984253] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e666174000204010002000274", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xe, 0x180) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x9, 0xfff, 0x49a, 'queue1\x00', 0x1}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:15:47 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) [ 438.139939] FAT-fs (loop0): invalid media value (0x00) [ 438.164925] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:48 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000680)=0xfff, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x10000017c) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1ffc}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x400100) 09:15:48 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$rose(0xb, 0x5, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/mcfilter6\x00') pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) 09:15:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0xe, 0x180) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f00000002c0)={0x9, 0xfff, 0x49a, 'queue1\x00', 0x1}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000100)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x11, 0x802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x22, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz1\x00', 0x1ff) ioctl$KVM_RUN(r3, 0xae80, 0x0) 09:15:48 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000200)={{&(0x7f0000013000/0x1000)=nil, 0x2302}}) 09:15:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) [ 438.519833] FAT-fs (loop0): invalid media value (0x00) [ 438.541106] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:48 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000000), 0x2) 09:15:48 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:48 executing program 2: 09:15:48 executing program 1: [ 438.783481] FAT-fs (loop0): invalid media value (0x00) [ 438.800154] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:49 executing program 3: syz_read_part_table(0xff0f000000000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 09:15:49 executing program 2: 09:15:49 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x2102801ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x400000, 0x20) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000080)='autogroup\x00') rt_tgsigqueueinfo(0x0, r0, 0x13, 0x0) perf_event_open(&(0x7f0000000000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0xa00000000, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000000)) 09:15:49 executing program 5: r0 = mq_open(&(0x7f0000001380)='eth0\x00', 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x400c}], 0x1, 0x0) 09:15:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:49 executing program 2: [ 439.678526] FAT-fs (loop0): invalid media value (0x00) 09:15:49 executing program 1: 09:15:49 executing program 2: [ 439.721158] FAT-fs (loop0): Can't find a valid FAT filesystem 09:15:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) socket$pptp(0x18, 0x1, 0x2) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:49 executing program 1: [ 440.043590] loop3: p1 p2 p3 p4 < > 09:15:49 executing program 1: 09:15:49 executing program 2: 09:15:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:49 executing program 3: syz_read_part_table(0xff0f000000000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 09:15:49 executing program 5: 09:15:49 executing program 2: 09:15:49 executing program 1: 09:15:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:49 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:49 executing program 1: 09:15:49 executing program 5: 09:15:49 executing program 2: 09:15:50 executing program 1: 09:15:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:50 executing program 2: [ 440.571167] loop3: p1 p2 p3 p4 < > 09:15:50 executing program 3: syz_read_part_table(0xff0f000000000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 09:15:50 executing program 1: 09:15:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:50 executing program 2: 09:15:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:50 executing program 5: 09:15:50 executing program 1: 09:15:50 executing program 2: 09:15:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:50 executing program 1: 09:15:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:50 executing program 2: [ 440.967011] loop3: p1 p2 p3 p4 < > 09:15:50 executing program 3: syz_read_part_table(0xff0f000000000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="000000000000000000000000000000000000000000000000e0e51532000000000200880126000100000064000000000127008e030c00650000006400000000030d00f0043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") 09:15:50 executing program 1: 09:15:50 executing program 2: 09:15:50 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) close(r0) socket$pptp(0x18, 0x1, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) 09:15:50 executing program 5: 09:15:50 executing program 2: 09:15:50 executing program 1: 09:15:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) close(0xffffffffffffffff) socket$pptp(0x18, 0x1, 0x2) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xff63, 0x0, 0x0, 0xfffffffffffffe93) 09:15:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) openat$cgroup_int(r0, 0x0, 0x2, 0x0) 09:15:50 executing program 1: 09:15:51 executing program 1: [ 511.764814] audit: type=1400 audit(1555319821.506:67): avc: denied { map } for pid=19373 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 714.710682] INFO: task syz-executor.3:19367 blocked for more than 140 seconds. [ 714.718230] Not tainted 4.14.111 #1 [ 714.724983] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 714.733028] syz-executor.3 D28368 19367 7030 0x00000004 [ 714.738697] Call Trace: [ 714.743715] __schedule+0x7be/0x1cf0 [ 714.747584] ? __mutex_lock+0x737/0x1470 [ 714.751826] ? pci_mmcfg_check_reserved+0x150/0x150 [ 714.757103] schedule+0x92/0x1c0 [ 714.763131] schedule_preempt_disabled+0x13/0x20 [ 714.767928] __mutex_lock+0x73c/0x1470 [ 714.772140] ? blkdev_reread_part+0x1f/0x40 [ 714.776545] ? mutex_trylock+0x1c0/0x1c0 [ 714.783240] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 714.788355] ? __wake_up_common_lock+0xe3/0x160 [ 714.793338] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 714.798441] mutex_lock_nested+0x16/0x20 [ 714.804978] ? mutex_lock_nested+0x16/0x20 [ 714.809215] blkdev_reread_part+0x1f/0x40 [ 714.813737] loop_reread_partitions+0x7c/0x90 [ 714.818325] loop_set_status+0xc28/0x1200 [ 714.825055] loop_set_status64+0xa6/0xf0 [ 714.829217] ? loop_set_status_old+0x2d0/0x2d0 [ 714.833954] lo_ioctl+0x5c1/0x1c70 [ 714.837686] ? loop_probe+0x160/0x160 [ 714.843913] blkdev_ioctl+0x983/0x1880 [ 714.847801] ? blkpg_ioctl+0x980/0x980 [ 714.851747] ? __might_sleep+0x93/0xb0 [ 714.855631] ? __fget+0x210/0x370 [ 714.859082] block_ioctl+0xde/0x120 [ 714.865307] ? blkdev_fallocate+0x3b0/0x3b0 [ 714.869940] do_vfs_ioctl+0x7b9/0x1070 [ 714.874030] ? selinux_file_mprotect+0x5d0/0x5d0 [ 714.878849] ? lock_downgrade+0x6e0/0x6e0 [ 714.885375] ? ioctl_preallocate+0x1c0/0x1c0 [ 714.889783] ? __fget+0x237/0x370 [ 714.893385] ? security_file_ioctl+0x8f/0xc0 [ 714.897784] SyS_ioctl+0x8f/0xc0 [ 714.903515] ? do_vfs_ioctl+0x1070/0x1070 [ 714.907766] do_syscall_64+0x1eb/0x630 [ 714.911708] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 714.916726] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 714.924320] RIP: 0033:0x458a97 [ 714.927507] RSP: 002b:00007f942ca999f8 EFLAGS: 00000202 ORIG_RAX: 0000000000000010 [ 714.935780] RAX: ffffffffffffffda RBX: 00007f942ca9a6d4 RCX: 0000000000458a97 [ 714.943157] RDX: 00007f942ca99ab0 RSI: 0000000000004c04 RDI: 0000000000000004 [ 714.950695] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 714.958156] R10: 0000000000000075 R11: 0000000000000202 R12: 0000000000000003 [ 714.965756] R13: 0000000000000003 R14: 0000000000000004 R15: 00000000ffffffff [ 714.973204] INFO: task blkid:19365 blocked for more than 140 seconds. [ 714.979779] Not tainted 4.14.111 #1 [ 714.983981] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 714.991975] blkid D28512 19365 6993 0x00000004 [ 714.997687] Call Trace: [ 715.000401] __schedule+0x7be/0x1cf0 [ 715.004106] ? __mutex_lock+0x737/0x1470 [ 715.008158] ? pci_mmcfg_check_reserved+0x150/0x150 [ 715.013400] schedule+0x92/0x1c0 [ 715.016762] schedule_preempt_disabled+0x13/0x20 [ 715.022034] __mutex_lock+0x73c/0x1470 [ 715.025969] ? trace_hardirqs_on+0x10/0x10 [ 715.030579] ? lo_release+0x84/0x1b0 [ 715.034291] ? save_trace+0x1f1/0x290 [ 715.038081] ? mutex_trylock+0x1c0/0x1c0 [ 715.042200] ? __blkdev_put+0x397/0x7f0 [ 715.046241] ? find_held_lock+0x35/0x130 [ 715.050339] ? __blkdev_put+0x397/0x7f0 [ 715.054312] ? loop_clr_fd+0xae0/0xae0 [ 715.058234] mutex_lock_nested+0x16/0x20 [ 715.062753] ? mutex_lock_nested+0x16/0x20 [ 715.067080] lo_release+0x84/0x1b0 [ 715.070725] ? loop_clr_fd+0xae0/0xae0 [ 715.074607] __blkdev_put+0x436/0x7f0 [ 715.078391] ? bd_set_size+0xb0/0xb0 [ 715.082155] ? wait_for_completion+0x420/0x420 [ 715.086738] blkdev_put+0x88/0x510 [ 715.090379] ? fcntl_setlk+0xb90/0xb90 [ 715.094273] ? blkdev_put+0x510/0x510 [ 715.098055] blkdev_close+0x8b/0xb0 [ 715.101739] __fput+0x277/0x7a0 [ 715.105016] ____fput+0x16/0x20 [ 715.108328] task_work_run+0x119/0x190 [ 715.112378] exit_to_usermode_loop+0x1da/0x220 [ 715.116961] do_syscall_64+0x4a9/0x630 [ 715.121033] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.126014] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.131274] RIP: 0033:0x7f8fd523c2b0 [ 715.135184] RSP: 002b:00007ffd54ea47a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 715.143112] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007f8fd523c2b0 [ 715.150565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 715.157915] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 715.165253] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000015f3030 [ 715.172839] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000005 [ 715.180347] INFO: task blkid:19366 blocked for more than 140 seconds. [ 715.187506] Not tainted 4.14.111 #1 [ 715.191786] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 715.199854] blkid D29040 19366 6994 0x00000004 [ 715.205582] Call Trace: [ 715.208385] __schedule+0x7be/0x1cf0 [ 715.212166] ? __mutex_lock+0x737/0x1470 [ 715.216231] ? pci_mmcfg_check_reserved+0x150/0x150 [ 715.221322] schedule+0x92/0x1c0 [ 715.224699] schedule_preempt_disabled+0x13/0x20 [ 715.229443] __mutex_lock+0x73c/0x1470 [ 715.233382] ? trace_hardirqs_on+0x10/0x10 [ 715.237629] ? lo_open+0x1d/0xb0 [ 715.241071] ? refcount_inc_not_zero+0x81/0xe0 [ 715.245663] ? mutex_trylock+0x1c0/0x1c0 [ 715.249762] ? find_held_lock+0x35/0x130 [ 715.253877] ? disk_get_part+0x9c/0x140 [ 715.257865] ? lock_downgrade+0x6e0/0x6e0 [ 715.262131] ? loop_unregister_transfer+0x90/0x90 [ 715.266980] mutex_lock_nested+0x16/0x20 [ 715.271099] ? mutex_lock_nested+0x16/0x20 [ 715.275337] lo_open+0x1d/0xb0 [ 715.278521] __blkdev_get+0x2c9/0x1120 [ 715.282583] ? __blkdev_put+0x7f0/0x7f0 [ 715.286715] ? bd_acquire+0x178/0x2c0 [ 715.290576] ? find_held_lock+0x35/0x130 [ 715.294641] blkdev_get+0xa8/0x8e0 [ 715.298176] ? bd_may_claim+0xd0/0xd0 [ 715.302057] ? _raw_spin_unlock+0x2d/0x50 [ 715.306214] blkdev_open+0x1d1/0x260 [ 715.309929] ? security_file_open+0x8f/0x1a0 [ 715.314398] do_dentry_open+0x73e/0xeb0 [ 715.318393] ? bd_acquire+0x2c0/0x2c0 [ 715.322251] vfs_open+0x105/0x230 [ 715.325714] path_openat+0x8bd/0x3f70 [ 715.329805] ? trace_hardirqs_on+0x10/0x10 [ 715.334107] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 715.338794] ? find_held_lock+0x35/0x130 [ 715.342914] ? __alloc_fd+0x1d4/0x4a0 [ 715.346760] do_filp_open+0x18e/0x250 [ 715.350633] ? may_open_dev+0xe0/0xe0 [ 715.354517] ? _raw_spin_unlock+0x2d/0x50 [ 715.358662] ? __alloc_fd+0x1d4/0x4a0 [ 715.362533] do_sys_open+0x2c5/0x430 [ 715.366250] ? filp_open+0x70/0x70 [ 715.369970] SyS_open+0x2d/0x40 [ 715.373314] ? do_sys_open+0x430/0x430 [ 715.377208] do_syscall_64+0x1eb/0x630 [ 715.381413] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.386273] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.391525] RIP: 0033:0x7f4b0f974120 [ 715.395241] RSP: 002b:00007ffe652a90a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 715.402997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4b0f974120 [ 715.410326] RDX: 00007ffe652a9f34 RSI: 0000000000000000 RDI: 00007ffe652a9f34 [ 715.417593] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 715.424992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001db4030 [ 715.432349] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 715.439670] INFO: task blkid:19368 blocked for more than 140 seconds. [ 715.446308] Not tainted 4.14.111 #1 [ 715.450501] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 715.458475] blkid D28368 19368 7111 0x00000004 [ 715.464195] Call Trace: [ 715.466792] __schedule+0x7be/0x1cf0 [ 715.470735] ? __mutex_lock+0x737/0x1470 [ 715.474809] ? pci_mmcfg_check_reserved+0x150/0x150 [ 715.479828] schedule+0x92/0x1c0 [ 715.483282] schedule_preempt_disabled+0x13/0x20 [ 715.488145] __mutex_lock+0x73c/0x1470 [ 715.492191] ? trace_hardirqs_on+0x10/0x10 [ 715.496527] ? lo_open+0x1d/0xb0 [ 715.499899] ? refcount_inc_not_zero+0x80/0xe0 [ 715.504935] ? mutex_trylock+0x1c0/0x1c0 [ 715.509069] ? find_held_lock+0x35/0x130 [ 715.513379] ? disk_get_part+0x9c/0x140 [ 715.517536] ? lock_downgrade+0x6e0/0x6e0 [ 715.521954] ? loop_unregister_transfer+0x90/0x90 [ 715.526815] mutex_lock_nested+0x16/0x20 [ 715.530943] ? mutex_lock_nested+0x16/0x20 [ 715.535190] lo_open+0x1d/0xb0 [ 715.538374] __blkdev_get+0x2c9/0x1120 [ 715.542336] ? __blkdev_put+0x7f0/0x7f0 [ 715.546310] ? bd_acquire+0x178/0x2c0 [ 715.550155] ? find_held_lock+0x35/0x130 [ 715.554255] blkdev_get+0xa8/0x8e0 [ 715.557849] ? bd_may_claim+0xd0/0xd0 [ 715.561753] ? _raw_spin_unlock+0x2d/0x50 [ 715.565917] blkdev_open+0x1d1/0x260 [ 715.569623] ? security_file_open+0x8f/0x1a0 [ 715.574152] do_dentry_open+0x73e/0xeb0 [ 715.578137] ? bd_acquire+0x2c0/0x2c0 [ 715.582017] vfs_open+0x105/0x230 [ 715.585559] path_openat+0x8bd/0x3f70 [ 715.589422] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 715.594366] ? __handle_mm_fault+0x299c/0x3470 [ 715.599027] ? __alloc_fd+0x1d4/0x4a0 [ 715.602888] do_filp_open+0x18e/0x250 [ 715.606863] ? may_open_dev+0xe0/0xe0 [ 715.610740] ? _raw_spin_unlock+0x2d/0x50 [ 715.614894] ? __alloc_fd+0x1d4/0x4a0 [ 715.618695] do_sys_open+0x2c5/0x430 [ 715.622527] ? filp_open+0x70/0x70 [ 715.626081] SyS_open+0x2d/0x40 [ 715.629542] ? do_sys_open+0x430/0x430 [ 715.633541] do_syscall_64+0x1eb/0x630 [ 715.637530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.642780] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.648169] RIP: 0033:0x7fd6f791a120 [ 715.651935] RSP: 002b:00007ffd7e8b3e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 715.659742] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd6f791a120 [ 715.667380] RDX: 00007ffd7e8b4f41 RSI: 0000000000000000 RDI: 00007ffd7e8b4f41 [ 715.674825] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 715.683097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001d92030 [ 715.690450] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 715.697777] INFO: task blkid:19370 blocked for more than 140 seconds. [ 715.704406] Not tainted 4.14.111 #1 [ 715.708552] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 715.716808] blkid D29040 19370 7204 0x00000004 [ 715.722514] Call Trace: [ 715.725122] __schedule+0x7be/0x1cf0 [ 715.728828] ? __mutex_lock+0x737/0x1470 [ 715.732943] ? pci_mmcfg_check_reserved+0x150/0x150 [ 715.737969] schedule+0x92/0x1c0 [ 715.741404] schedule_preempt_disabled+0x13/0x20 [ 715.746219] __mutex_lock+0x73c/0x1470 [ 715.750355] ? lo_open+0x1d/0xb0 [ 715.753733] ? refcount_inc_not_zero+0x80/0xe0 [ 715.758414] ? mutex_trylock+0x1c0/0x1c0 [ 715.762563] ? exact_match+0xd/0x20 [ 715.766199] ? kobj_lookup+0x319/0x410 [ 715.770257] ? loop_unregister_transfer+0x90/0x90 [ 715.775270] mutex_lock_nested+0x16/0x20 [ 715.779512] ? mutex_lock_nested+0x16/0x20 [ 715.783815] lo_open+0x1d/0xb0 [ 715.787238] __blkdev_get+0xab1/0x1120 [ 715.791908] ? __blkdev_put+0x7f0/0x7f0 [ 715.795997] ? bd_acquire+0x178/0x2c0 [ 715.799890] ? find_held_lock+0x35/0x130 [ 715.804033] blkdev_get+0xa8/0x8e0 [ 715.807675] ? bd_may_claim+0xd0/0xd0 [ 715.811827] ? _raw_spin_unlock+0x2d/0x50 [ 715.816250] blkdev_open+0x1d1/0x260 [ 715.819963] ? security_file_open+0x8f/0x1a0 [ 715.824526] do_dentry_open+0x73e/0xeb0 [ 715.828639] ? bd_acquire+0x2c0/0x2c0 [ 715.832613] vfs_open+0x105/0x230 [ 715.836635] path_openat+0x8bd/0x3f70 [ 715.840525] ? trace_hardirqs_on+0x10/0x10 [ 715.844773] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 715.849429] ? find_held_lock+0x35/0x130 [ 715.853539] ? __alloc_fd+0x1d4/0x4a0 [ 715.857343] do_filp_open+0x18e/0x250 [ 715.861266] ? may_open_dev+0xe0/0xe0 [ 715.865240] ? _raw_spin_unlock+0x2d/0x50 [ 715.869442] ? __alloc_fd+0x1d4/0x4a0 [ 715.873364] do_sys_open+0x2c5/0x430 [ 715.877090] ? filp_open+0x70/0x70 [ 715.880729] SyS_open+0x2d/0x40 [ 715.884018] ? do_sys_open+0x430/0x430 [ 715.887989] do_syscall_64+0x1eb/0x630 [ 715.892168] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 715.897172] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 715.902409] RIP: 0033:0x7f439814f120 [ 715.906121] RSP: 002b:00007ffe1cc1cd68 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 715.914079] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f439814f120 [ 715.921408] RDX: 00007ffe1cc1ef41 RSI: 0000000000000000 RDI: 00007ffe1cc1ef41 [ 715.928706] RBP: 0000000000000000 R08: 0000000000000078 R09: 0000000000000000 [ 715.936143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000001d11030 [ 715.943456] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000005 [ 715.950806] [ 715.950806] Showing all locks held in the system: [ 715.957146] 1 lock held by khungtaskd/1009: [ 715.961674] #0: (tasklist_lock){.+.+}, at: [] debug_show_all_locks+0x7f/0x21f [ 715.970767] 1 lock held by rsyslogd/6863: [ 715.974903] #0: (&f->f_pos_lock){+.+.}, at: [] __fdget_pos+0xab/0xd0 [ 715.983393] 2 locks held by getty/6986: [ 715.987361] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 715.996267] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.005760] 2 locks held by getty/6987: [ 716.009824] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 716.018845] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.028218] 2 locks held by getty/6988: [ 716.032247] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 716.041183] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.050727] 2 locks held by getty/6989: [ 716.054706] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 716.071790] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.081832] 2 locks held by getty/6990: [ 716.085799] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 716.094531] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.103914] 2 locks held by getty/6991: [ 716.107900] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 716.116638] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.126155] 2 locks held by getty/6992: [ 716.130181] #0: (&tty->ldisc_sem){++++}, at: [] ldsem_down_read+0x33/0x40 [ 716.138877] #1: (&ldata->atomic_read_lock){+.+.}, at: [] n_tty_read+0x1e6/0x17b0 [ 716.148512] 2 locks held by syz-executor.3/19367: [ 716.153429] #0: (loop_ctl_mutex/1){+.+.}, at: [] lo_ioctl+0x87/0x1c70 [ 716.162010] #1: (&bdev->bd_mutex){+.+.}, at: [] blkdev_reread_part+0x1f/0x40 [ 716.171191] 3 locks held by blkid/19365: [ 716.175252] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_put+0xa6/0x7f0 [ 716.183821] #1: (loop_index_mutex){+.+.}, at: [] lo_release+0x1e/0x1b0 [ 716.192315] #2: (loop_ctl_mutex#2){+.+.}, at: [] lo_release+0x84/0x1b0 [ 716.200842] 2 locks held by blkid/19366: [ 716.204900] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 716.213704] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 716.221906] 2 locks held by blkid/19368: [ 716.225972] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 716.234699] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 716.242841] 2 locks held by blkid/19370: [ 716.246894] #0: (&bdev->bd_mutex){+.+.}, at: [] __blkdev_get+0x145/0x1120 [ 716.255665] #1: (loop_index_mutex){+.+.}, at: [] lo_open+0x1d/0xb0 [ 716.263946] [ 716.265580] ============================================= [ 716.265580] [ 716.272742] NMI backtrace for cpu 1 [ 716.276381] CPU: 1 PID: 1009 Comm: khungtaskd Not tainted 4.14.111 #1 [ 716.282951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.292295] Call Trace: [ 716.294883] dump_stack+0x138/0x19c [ 716.298504] nmi_cpu_backtrace.cold+0x57/0x94 [ 716.302987] ? irq_force_complete_move.cold+0x7d/0x7d [ 716.308213] nmi_trigger_cpumask_backtrace+0x141/0x189 [ 716.313580] arch_trigger_cpumask_backtrace+0x14/0x20 [ 716.318758] watchdog+0x5d8/0xb80 [ 716.322245] kthread+0x31c/0x430 [ 716.325607] ? reset_hung_task_detector+0x20/0x20 [ 716.330431] ? kthread_create_on_node+0xd0/0xd0 [ 716.335245] ret_from_fork+0x3a/0x50 [ 716.339208] Sending NMI from CPU 1 to CPUs 0: [ 716.344013] NMI backtrace for cpu 0 [ 716.344017] CPU: 0 PID: 79 Comm: kworker/u4:3 Not tainted 4.14.111 #1 [ 716.344021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.344024] Workqueue: bat_events batadv_nc_worker [ 716.344030] task: ffff8880a98e8540 task.stack: ffff8880a98f0000 [ 716.344033] RIP: 0010:batadv_nc_purge_paths+0xe1/0x350 [ 716.344035] RSP: 0018:ffff8880a98f7c68 EFLAGS: 00000246 [ 716.344041] RAX: 1ffff1101310afb0 RBX: ffff88806a5a5200 RCX: 0000000077f47a40 [ 716.344044] RDX: 1ffff1100d4b4a42 RSI: ffff8880a98e8e10 RDI: ffff88806a5a5204 [ 716.344048] RBP: ffff8880a98f7ce0 R08: 00000000000024dd R09: ffffffff88c8aaa8 [ 716.344058] R10: ffff8880a98e8e10 R11: ffff8880a98e8540 R12: 0000000000000000 [ 716.344062] R13: dffffc0000000000 R14: ffffffff8602ea40 R15: ffff88806a506880 [ 716.344075] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 716.344078] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 716.344081] CR2: 0000000002186000 CR3: 000000008c8dc000 CR4: 00000000001406f0 [ 716.344084] Call Trace: [ 716.344086] ? lock_downgrade+0x6e0/0x6e0 [ 716.344089] batadv_nc_worker+0x270/0x6d0 [ 716.344091] process_one_work+0x868/0x1610 [ 716.344094] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 716.344097] worker_thread+0x5d9/0x1050 [ 716.344099] kthread+0x31c/0x430 [ 716.344102] ? process_one_work+0x1610/0x1610 [ 716.344105] ? kthread_create_on_node+0xd0/0xd0 [ 716.344107] ret_from_fork+0x3a/0x50 [ 716.344109] Code: d0 48 6b db 38 48 03 58 08 48 89 df 48 89 5d c0 e8 75 c1 17 00 4c 89 e0 48 c1 e8 03 42 80 3c 28 00 0f 85 c4 01 00 00 4d 8b 24 24 <4c> 8b 7d 98 eb 23 e8 04 f8 59 fb e8 af f2 d5 fe 85 c0 0f 85 65 [ 716.344753] Kernel panic - not syncing: hung_task: blocked tasks [ 716.508931] CPU: 1 PID: 1009 Comm: khungtaskd Not tainted 4.14.111 #1 [ 716.515509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.524859] Call Trace: [ 716.527439] dump_stack+0x138/0x19c [ 716.531095] panic+0x1f2/0x438 [ 716.534285] ? add_taint.cold+0x16/0x16 [ 716.538272] ? irq_force_complete_move.cold+0x7d/0x7d [ 716.543460] watchdog+0x5e9/0xb80 [ 716.546908] kthread+0x31c/0x430 [ 716.550304] ? reset_hung_task_detector+0x20/0x20 [ 716.555320] ? kthread_create_on_node+0xd0/0xd0 [ 716.559980] ret_from_fork+0x3a/0x50 [ 716.564378] Kernel Offset: disabled [ 716.568060] Rebooting in 86400 seconds..