) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f00000004c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x7c, 0x0, 0x0, 0x0, 0x1d7}}], 0x1, 0x20101, 0x0) getpid() pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) r4 = creat(0x0, 0x0) fcntl$setflags(r4, 0x2, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f0000000480)={0x400, 0x1f, r0, 0x0, 0x0, 0x0, 0x7fffffff, 0x63c}) setxattr$security_selinux(&(0x7f0000000180)='./file0\x00', &(0x7f0000000400)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:clock_device_t:s0\x00', 0x24, 0x1) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f00000009c0)=ANY=[], 0x0) delete_module(&(0x7f0000000200)='$]posix_acl_access^*\x00', 0x400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000002c0)={0x7, 0x5}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, @perf_config_ext, 0x200000240, 0x2, 0x0, 0x2, 0x80000005}, 0x0, 0x2, 0xffffffffffffffff, 0x9) creat(0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x9) pipe(&(0x7f0000000040)) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket(0x10, 0x3, 0x0) [ 939.478004][ T9486] Unknown ioctl 1075883590 [ 939.564733][ T9486] Unknown ioctl 1075883590 [ 939.590653][ T9486] Unknown ioctl 1075883590 [ 939.636100][ T9496] autofs4:pid:9496:autofs_fill_super: called with bogus options [ 939.689656][ T9499] devpts: called with bogus options 20:36:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x2d) r3 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x4, 0xb21140) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x800, 0x0) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) setsockopt$netrom_NETROM_T2(r4, 0x103, 0x2, &(0x7f0000000240)=0x20, 0x4) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000200)={0x80, 0x0, &(0x7f0000000080)="2583a43c64a39570bde21328b085f977673a183883f4e86398cfe550ab1b8ad6090fd7018a1d7e55dd0b3fd2ddca842dbb972fd404c10c376319bc38a3a9c309a5d68569a09c3c6ba1d76ad281a884a9889702d151d05a3f20c41b3d1d97537dbd9bab420553544402cd83c43a2598dae369d72cf032a7a526ba0ca14aa80e297c461b9e27999c54ff08cf36fadb", {0x6, 0xfff, 0x56544943, 0x0, 0x0, 0x800, 0x17, 0x20}}) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200, 0x0) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:36:31 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x5eef439bff9b86cf, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 20:36:31 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) msgget(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x2000, 0xaa) socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r1, 0x2008002) sendto(0xffffffffffffffff, &(0x7f0000000a00)="8b788cff963438c70bc06abe7cded86f52190a2924ee6ca3f091e5df3a2b227e32799955fdf748f56f41289cdf39acf398c0474fb7b707b917393d425c800b6e96057e975be25b53fb8a6101f0bc4bbf1f79dadaa3509355a0399d8a19076136b0aa868bd711cd174c81b89700c64242f5", 0x71, 0x0, &(0x7f0000000380)=@in6={0xa, 0x4e24, 0x4, @mcast1, 0x6}, 0x80) lsetxattr$security_evm(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02036a5128a60c4df6d605cdde8a748201ba"], 0x10, 0x1) geteuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000805}, 0x8000) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000400)={0x0, 0xb43945c755c92e71}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'timer0\x00', 0x0, 0x2}) r4 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) sendfile(r2, r4, 0x0, 0x401) [ 939.989454][ T9812] Unknown ioctl 1075883590 [ 940.027839][ T9812] Unknown ioctl 1075883590 [ 940.054971][ T9812] Unknown ioctl 1075883590 [ 940.072983][ T9812] Unknown ioctl 1075883590 [ 940.124993][ T9812] Unknown ioctl 1075883590 [ 940.169747][ T9812] Unknown ioctl 1075883590 20:36:32 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x10000) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000100)) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000080)={0x0, 0x0, {0x0, 0x0, 0x0, 0x8}}) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x888, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fchmod(r6, 0x1) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r7, 0x0) r9 = getpgrp(0xffffffffffffffff) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r12, &(0x7f0000000600)=ANY=[@ANYBLOB="15f0a3a0cb0f270157920367ea5e0f0de34a93e550d9d430576e9a46e01c322b59bafd9203331f0260b3315365a1215dd48eca7afa3757283df06060a5ac382490c52dce6883f6c3786893a470f7f72914ea86600472aca69996698cd60c2a0ad824da5be500a9d2459ab8fb6930eb5acabe7a261a7a5f28a935da536fe63e4a1050b3a8d50b4a5dd18f81257c9a63454a4eb0cf97"], 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r13, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r10, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r11}}}, @rights={{0x20, 0x1, 0x1, [r12, r13, 0xffffffffffffffff, r4]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r9, r7, r8}}}], 0x78, 0xc0880}, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x48004, &(0x7f0000000400)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_mmap='cache=mmap'}], [{@obj_type={'obj_type', 0x3d, '&[posix_acl_accesseth1'}}, {@fowner_gt={'fowner>', r3}}, {@measure='measure'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@dont_appraise='dont_appraise'}, {@uid_gt={'uid>', r7}}, {@fsname={'fsname', 0x3d, 'autofs\x00'}}]}}) r14 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r14, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$bt_hci(r14, 0x0, 0x1, &(0x7f0000000540)=""/67, &(0x7f00000005c0)=0x43) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 940.203673][ T9812] Unknown ioctl 1075883590 [ 940.215131][ T9812] Unknown ioctl 1075883590 [ 940.264193][ T9812] Unknown ioctl 1075883590 [ 940.294980][ T9812] Unknown ioctl 1075883590 [ 940.302579][ T9812] Unknown ioctl 1075883590 [ 940.315894][ T9812] Unknown ioctl 1075883590 [ 940.329896][ T9812] Unknown ioctl 1075883590 [ 940.354109][ T9812] Unknown ioctl 1075883590 [ 940.371104][ T9812] Unknown ioctl 1075883590 [ 940.385662][ T9812] Unknown ioctl 1075883590 [ 940.399487][ T9812] Unknown ioctl 1075883590 [ 940.413730][ T9812] Unknown ioctl 1075883590 [ 940.443591][ T9810] devpts: called with bogus options [ 940.456664][ T9890] autofs4:pid:9890:autofs_fill_super: called with bogus options [ 940.469767][ T9812] Unknown ioctl 1075883590 [ 940.488303][ T9812] Unknown ioctl 1075883590 [ 940.512252][ T9812] Unknown ioctl 1075883590 20:36:32 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) msgget(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x2000, 0xaa) socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r1, 0x2008002) sendto(0xffffffffffffffff, &(0x7f0000000a00)="8b788cff963438c70bc06abe7cded86f52190a2924ee6ca3f091e5df3a2b227e32799955fdf748f56f41289cdf39acf398c0474fb7b707b917393d425c800b6e96057e975be25b53fb8a6101f0bc4bbf1f79dadaa3509355a0399d8a19076136b0aa868bd711cd174c81b89700c64242f5", 0x71, 0x0, &(0x7f0000000380)=@in6={0xa, 0x4e24, 0x4, @mcast1, 0x6}, 0x80) lsetxattr$security_evm(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02036a5128a60c4df6d605cdde8a748201ba"], 0x10, 0x1) geteuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000805}, 0x8000) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000400)={0x0, 0xb43945c755c92e71}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'timer0\x00', 0x0, 0x2}) r4 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) sendfile(r2, r4, 0x0, 0x401) [ 940.544842][ T9812] Unknown ioctl 1075883590 20:36:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a929381f289828b2d4572221d6749ec49060000008c0000000000000000", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ptrace$getregset(0x4204, r1, 0x2, &(0x7f0000000340)={&(0x7f0000000580)=""/212, 0xd4}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 940.584323][ T9812] Unknown ioctl 1075883590 [ 940.614844][ T9812] Unknown ioctl 1075883590 [ 940.654881][ T9812] Unknown ioctl 1075883590 20:36:32 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x5eef439bff9b86cf, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 20:36:32 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000940)={@rand_addr, @multicast1, 0x0}, &(0x7f0000000980)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000a40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a00)={&(0x7f0000000040)=ANY=[@ANYBLOB="af0000002600dfd22abd6000fddbdf250000000000000000", @ANYRES32=r2, @ANYBLOB="0400e5ff0f00ffff0000e0ff04000a0004000a0004000a0004000a0004000a0004009578d96b0ad52750ee12110a00"], 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 940.815620][T10147] Unknown ioctl 1075883590 [ 940.825355][T10148] devpts: called with bogus options 20:36:32 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2001c03}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0xa08b55f814e745fc, 0x0, 0x25dfdbfe}, 0xffffffffffffff44}, 0x1, 0x0, 0x0, 0x40844}, 0x20016) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x10001, 0x1) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$LOOP_SET_DIRECT_IO(r4, 0x4c08, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xd7a, 0x20}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000100)={r5, 0x2, 0x3, [0xeb95, 0xa146, 0x20]}, 0xe) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 941.092438][T10164] devpts: called with bogus options 20:36:33 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) msgget(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x2000, 0xaa) socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r1, 0x2008002) sendto(0xffffffffffffffff, &(0x7f0000000a00)="8b788cff963438c70bc06abe7cded86f52190a2924ee6ca3f091e5df3a2b227e32799955fdf748f56f41289cdf39acf398c0474fb7b707b917393d425c800b6e96057e975be25b53fb8a6101f0bc4bbf1f79dadaa3509355a0399d8a19076136b0aa868bd711cd174c81b89700c64242f5", 0x71, 0x0, &(0x7f0000000380)=@in6={0xa, 0x4e24, 0x4, @mcast1, 0x6}, 0x80) lsetxattr$security_evm(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02036a5128a60c4df6d605cdde8a748201ba"], 0x10, 0x1) geteuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000805}, 0x8000) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000400)={0x0, 0xb43945c755c92e71}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'timer0\x00', 0x0, 0x2}) r4 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) sendfile(r2, r4, 0x0, 0x401) 20:36:33 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) move_mount(r0, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x44) clone(0x1800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000080)={0x0, @aes128}) 20:36:33 executing program 5: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) msgget(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, &(0x7f0000000680)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = open(&(0x7f0000000080)='./bus\x00', 0x2000, 0xaa) socket$inet6_tcp(0xa, 0x1, 0x0) ftruncate(r1, 0x2008002) sendto(0xffffffffffffffff, &(0x7f0000000a00)="8b788cff963438c70bc06abe7cded86f52190a2924ee6ca3f091e5df3a2b227e32799955fdf748f56f41289cdf39acf398c0474fb7b707b917393d425c800b6e96057e975be25b53fb8a6101f0bc4bbf1f79dadaa3509355a0399d8a19076136b0aa868bd711cd174c81b89700c64242f5", 0x71, 0x0, &(0x7f0000000380)=@in6={0xa, 0x4e24, 0x4, @mcast1, 0x6}, 0x80) lsetxattr$security_evm(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="02036a5128a60c4df6d605cdde8a748201ba"], 0x10, 0x1) geteuid() sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000805}, 0x8000) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000400)={0x0, 0xb43945c755c92e71}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), 0x0) r2 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) r3 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'timer0\x00', 0x0, 0x2}) r4 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000140)={{0x1}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) sendfile(r2, r4, 0x0, 0x401) [ 941.497548][T10276] Unknown ioctl 1075883590 [ 941.532511][T10276] Unknown ioctl 1075883590 [ 941.567107][T10276] Unknown ioctl 1075883590 [ 941.599001][T10276] Unknown ioctl 1075883590 [ 941.634941][T10276] Unknown ioctl 1075883590 [ 941.660521][T10276] Unknown ioctl 1075883590 [ 941.689967][T10276] Unknown ioctl 1075883590 [ 941.718606][T10276] Unknown ioctl 1075883590 [ 941.744930][T10276] Unknown ioctl 1075883590 [ 941.782491][T10276] Unknown ioctl 1075883590 [ 941.806551][T10276] Unknown ioctl 1075883590 [ 941.825163][T10276] Unknown ioctl 1075883590 [ 941.865051][T10276] Unknown ioctl 1075883590 [ 941.879036][T10276] Unknown ioctl 1075883590 [ 941.886873][T10248] devpts: called with bogus options 20:36:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) [ 941.912004][T10276] Unknown ioctl 1075883590 [ 941.959385][T10276] Unknown ioctl 1075883590 [ 941.986982][T10276] Unknown ioctl 1075883590 [ 942.036489][T10276] Unknown ioctl 1075883590 [ 942.068994][T10276] Unknown ioctl 1075883590 [ 942.107902][T10276] Unknown ioctl 1075883590 [ 942.165554][T10276] Unknown ioctl 1075883590 [ 942.170591][T10276] Unknown ioctl 1075883590 20:36:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) clone3(&(0x7f0000000740)={0x40000, &(0x7f0000000340), &(0x7f0000000400)=0x0, &(0x7f0000000580), 0x4, 0x0, &(0x7f00000005c0)=""/208, 0xd0, &(0x7f00000006c0)=""/100}, 0x40) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000780)=r2) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x80, &(0x7f00000001c0)='/selinux/policy\x00') r3 = gettid() tkill(r3, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r4 = getpid() r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r6, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r7, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000007c0)={0xfffffffffffffeec, 0x2, 0x1, 0x0, 0x3, 0x0, 0x0, 0x10000000008be}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:34 executing program 5: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000003c0)="1fcc00e00107ffff7d3b54c012655b312588f08d0ed1136fc791", 0x1a) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpid() sched_setattr(r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) kcmp(r2, r3, 0x0, 0xffffffffffffffff, r1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000280)={0x0, 0x1a, 0x0, 0x0, 0xfffffffe, 0xff, 0x3, 0x6e}) recvfrom$x25(0xffffffffffffffff, 0x0, 0x4c, 0x0, 0x0, 0xfffffe65) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffd97, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f0000000300)='5\x80\xb89\xd1\x06\xf3h\xac\xc5a\x82hQk=\x83V\xda\x85\xb6\xac8n\x93\v\xd1\xdd\xb61\xe7G[N\xba\x83\x04\xa7\xb6\x1a]\xbfx\x8e\x19\x84\xd5w\x84L\xc0\xa5\xe3\xf9\xd4\x91\xd7]\xef5G\xb2\x1fW\x9cv\xd8\x03tp\xeb\fr\xce\xac\x8e\x93\x97\x981\x8e\xdf\b\xd8\xf4\xfcU\xe6b\x11%\xdd[\xde\x8e\xbf\x0e\xca\xfb\x1e\xf0QX\xc1\x10$\xde\v&\x9eWJ\x87\xc7\xb1P!\xdf@\t\x92\xfc\xda+&\xb6\xa6\x99\xeb Dr*W\xeewJ\x17\x80_\x87\xc4\x80\x03\xb4,\xa8\xccE\x05a\xde+\tA\x0f\xe7') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) [ 942.245885][T10276] Unknown ioctl 1075883590 [ 942.265105][T10276] Unknown ioctl 1075883590 [ 942.270769][T10276] Unknown ioctl 1075883590 20:36:34 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/video36\x00', 0x2, 0x0) mount$overlay(0x0, &(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)='overlay\x00', 0x8000, &(0x7f0000000900)={[{@default_permissions='default_permissions'}, {@xino_on='xino=on'}], [{@subj_role={'subj_role', 0x3d, '!{'}}, {@fscontext={'fscontext', 0x3d, 'root'}}]}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000940)=""/177, &(0x7f0000000a00)=0xb1) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000040)) [ 942.482795][T10496] autofs4:pid:10496:autofs_fill_super: called with bogus options [ 942.491608][T10499] overlayfs: unrecognized mount option "subj_role=!{" or missing value [ 942.628598][T10529] devpts: called with bogus options 20:36:34 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:34 executing program 5: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000003c0)="1fcc00e00107ffff7d3b54c012655b312588f08d0ed1136fc791", 0x1a) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpid() sched_setattr(r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) kcmp(r2, r3, 0x0, 0xffffffffffffffff, r1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000280)={0x0, 0x1a, 0x0, 0x0, 0xfffffffe, 0xff, 0x3, 0x6e}) recvfrom$x25(0xffffffffffffffff, 0x0, 0x4c, 0x0, 0x0, 0xfffffe65) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffd97, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f0000000300)='5\x80\xb89\xd1\x06\xf3h\xac\xc5a\x82hQk=\x83V\xda\x85\xb6\xac8n\x93\v\xd1\xdd\xb61\xe7G[N\xba\x83\x04\xa7\xb6\x1a]\xbfx\x8e\x19\x84\xd5w\x84L\xc0\xa5\xe3\xf9\xd4\x91\xd7]\xef5G\xb2\x1fW\x9cv\xd8\x03tp\xeb\fr\xce\xac\x8e\x93\x97\x981\x8e\xdf\b\xd8\xf4\xfcU\xe6b\x11%\xdd[\xde\x8e\xbf\x0e\xca\xfb\x1e\xf0QX\xc1\x10$\xde\v&\x9eWJ\x87\xc7\xb1P!\xdf@\t\x92\xfc\xda+&\xb6\xa6\x99\xeb Dr*W\xeewJ\x17\x80_\x87\xc4\x80\x03\xb4,\xa8\xccE\x05a\xde+\tA\x0f\xe7') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) 20:36:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r4, 0x0) r6 = getpgrp(0xffffffffffffffff) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r10, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r7, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=ANY=[@ANYBLOB='\x00\x00\x00\x00\v\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYRES32=r8, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32, @ANYRES32=r2, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0xc0880}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r15 = dup2(r14, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r12, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) getpgrp(0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)) r16 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r16, &(0x7f0000000080)=ANY=[@ANYBLOB="0a00000001a4aa6e02ef004825dc323f4f5b00"], 0x0) 20:36:34 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000140)={0x1, 0x2, 0x1000, 0x34, &(0x7f0000000080)="b90d35814d812f83b7c9be63743402c85a9181e84aec7f1a9366eed6436494b04d209ceaaf713ecc193e4b37b4fd5e693442db4f", 0x41, 0x0, &(0x7f00000000c0)="6cf6415c79406ddeed27249429fe66d707385bc1c25b2117f1909db4792e6493bcb1ec4532bf85d4a73b293be7bfa2c71e74c8dd89765df77dbb14d80f5a4050a2"}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) write$smack_current(r2, &(0x7f0000000200)='\x00', 0x1) execve(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000280)='/dev/full\x00', &(0x7f0000000300)='/dev/full\x00', &(0x7f0000000340)='/dev/full\x00', &(0x7f0000000380)='-@\x00'], &(0x7f00000004c0)=[&(0x7f0000000400)='\'\x00', &(0x7f0000000440)='\xe8bdev\x00', &(0x7f0000000480)='$)vboxnet0\\$vmnet1!4\x00']) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000040)=[{{0x0, 0x1, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x200002, 0x0, 0x1}}], 0x10) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 943.128556][T10760] devpts: called with bogus options 20:36:35 executing program 5: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000003c0)="1fcc00e00107ffff7d3b54c012655b312588f08d0ed1136fc791", 0x1a) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpid() sched_setattr(r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) kcmp(r2, r3, 0x0, 0xffffffffffffffff, r1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000280)={0x0, 0x1a, 0x0, 0x0, 0xfffffffe, 0xff, 0x3, 0x6e}) recvfrom$x25(0xffffffffffffffff, 0x0, 0x4c, 0x0, 0x0, 0xfffffe65) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffd97, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f0000000300)='5\x80\xb89\xd1\x06\xf3h\xac\xc5a\x82hQk=\x83V\xda\x85\xb6\xac8n\x93\v\xd1\xdd\xb61\xe7G[N\xba\x83\x04\xa7\xb6\x1a]\xbfx\x8e\x19\x84\xd5w\x84L\xc0\xa5\xe3\xf9\xd4\x91\xd7]\xef5G\xb2\x1fW\x9cv\xd8\x03tp\xeb\fr\xce\xac\x8e\x93\x97\x981\x8e\xdf\b\xd8\xf4\xfcU\xe6b\x11%\xdd[\xde\x8e\xbf\x0e\xca\xfb\x1e\xf0QX\xc1\x10$\xde\v&\x9eWJ\x87\xc7\xb1P!\xdf@\t\x92\xfc\xda+&\xb6\xa6\x99\xeb Dr*W\xeewJ\x17\x80_\x87\xc4\x80\x03\xb4,\xa8\xccE\x05a\xde+\tA\x0f\xe7') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) 20:36:35 executing program 1: r0 = semget$private(0x0, 0x1, 0x200) semctl$GETPID(r0, 0x5, 0xb, &(0x7f0000000180)=""/237) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x7f}, {0x1, 0x4812, 0x1000}, {0x0, 0xf880, 0x800}, {0x2, 0x1f, 0x1000}, {0x4, 0xdf6e, 0x800}, {0x4, 0x3ff, 0x800}, {0x3, 0x3, 0x800}, {0x1, 0x8001}, {0x3, 0x4, 0x1000}], 0x9, &(0x7f00000000c0)={0x77359400}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000000)=0x3, 0x2) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x8712e31ca370b2b0, 0x0, 0x0) r6 = semget(0x1, 0x0, 0x31) semctl$IPC_RMID(r6, 0x0, 0x0) [ 943.189545][T10822] autofs4:pid:10822:autofs_fill_super: called with bogus options 20:36:35 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='auuofs\x00', 0x0, 0x0) [ 943.584521][T10934] Unknown ioctl 1075883590 [ 943.603418][T10931] autofs4:pid:10931:autofs_fill_super: called with bogus options [ 943.613925][T10934] Unknown ioctl 1075883590 [ 943.637611][T10934] Unknown ioctl 1075883590 [ 943.658290][T10934] Unknown ioctl 1075883590 [ 943.682599][T10934] Unknown ioctl 1075883590 [ 943.702703][T10934] Unknown ioctl 1075883590 [ 943.731667][T10934] Unknown ioctl 1075883590 [ 943.750475][T10934] Unknown ioctl 1075883590 [ 943.770301][T10934] Unknown ioctl 1075883590 [ 943.783784][T10934] Unknown ioctl 1075883590 [ 943.799587][T10934] Unknown ioctl 1075883590 [ 943.816267][T10934] Unknown ioctl 1075883590 [ 943.828373][T10934] Unknown ioctl 1075883590 [ 943.839331][T10934] Unknown ioctl 1075883590 [ 943.851270][T10934] Unknown ioctl 1075883590 [ 943.862532][T10934] Unknown ioctl 1075883590 [ 943.876788][T10934] Unknown ioctl 1075883590 [ 943.884854][T10867] devpts: called with bogus options [ 943.897963][T10934] Unknown ioctl 1075883590 [ 943.920304][T10934] Unknown ioctl 1075883590 [ 943.939934][T10934] Unknown ioctl 1075883590 [ 943.956385][T10934] Unknown ioctl 1075883590 [ 943.984139][T10934] Unknown ioctl 1075883590 20:36:35 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000b3be01c8a0494ea1b993528a00", @ANYRES16=r5, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 944.006408][T10934] Unknown ioctl 1075883590 [ 944.032361][T10934] Unknown ioctl 1075883590 [ 944.054134][T10934] Unknown ioctl 1075883590 [ 944.246630][T11146] devpts: called with bogus options [ 944.999213][T11151] devpts: called with bogus options 20:36:37 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) timerfd_gettime(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff64) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(0xffffffffffffffff, 0xc0186419, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) lsetxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000100), 0x1063, 0x4008000, 0x0, 0xb4) dup2(r2, r1) 20:36:37 executing program 4: mkdir(&(0x7f0000000b00)='./file1\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:37 executing program 5: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000003c0)="1fcc00e00107ffff7d3b54c012655b312588f08d0ed1136fc791", 0x1a) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpid() sched_setattr(r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) kcmp(r2, r3, 0x0, 0xffffffffffffffff, r1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000280)={0x0, 0x1a, 0x0, 0x0, 0xfffffffe, 0xff, 0x3, 0x6e}) recvfrom$x25(0xffffffffffffffff, 0x0, 0x4c, 0x0, 0x0, 0xfffffe65) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffd97, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f0000000300)='5\x80\xb89\xd1\x06\xf3h\xac\xc5a\x82hQk=\x83V\xda\x85\xb6\xac8n\x93\v\xd1\xdd\xb61\xe7G[N\xba\x83\x04\xa7\xb6\x1a]\xbfx\x8e\x19\x84\xd5w\x84L\xc0\xa5\xe3\xf9\xd4\x91\xd7]\xef5G\xb2\x1fW\x9cv\xd8\x03tp\xeb\fr\xce\xac\x8e\x93\x97\x981\x8e\xdf\b\xd8\xf4\xfcU\xe6b\x11%\xdd[\xde\x8e\xbf\x0e\xca\xfb\x1e\xf0QX\xc1\x10$\xde\v&\x9eWJ\x87\xc7\xb1P!\xdf@\t\x92\xfc\xda+&\xb6\xa6\x99\xeb Dr*W\xeewJ\x17\x80_\x87\xc4\x80\x03\xb4,\xa8\xccE\x05a\xde+\tA\x0f\xe7') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) 20:36:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/da\x04/vsock\x00', 0x11f402, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:36:37 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 946.035913][T11163] devpts: called with bogus options 20:36:38 executing program 5: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0x0) write(r0, &(0x7f00000003c0)="1fcc00e00107ffff7d3b54c012655b312588f08d0ed1136fc791", 0x1a) socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = gettid() r3 = getpid() sched_setattr(r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') getpgid(0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) kcmp(r2, r3, 0x0, 0xffffffffffffffff, r1) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000280)={0x0, 0x1a, 0x0, 0x0, 0xfffffffe, 0xff, 0x3, 0x6e}) recvfrom$x25(0xffffffffffffffff, 0x0, 0x4c, 0x0, 0x0, 0xfffffe65) perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffd97, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x6, 0x12, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f0000000300)='5\x80\xb89\xd1\x06\xf3h\xac\xc5a\x82hQk=\x83V\xda\x85\xb6\xac8n\x93\v\xd1\xdd\xb61\xe7G[N\xba\x83\x04\xa7\xb6\x1a]\xbfx\x8e\x19\x84\xd5w\x84L\xc0\xa5\xe3\xf9\xd4\x91\xd7]\xef5G\xb2\x1fW\x9cv\xd8\x03tp\xeb\fr\xce\xac\x8e\x93\x97\x981\x8e\xdf\b\xd8\xf4\xfcU\xe6b\x11%\xdd[\xde\x8e\xbf\x0e\xca\xfb\x1e\xf0QX\xc1\x10$\xde\v&\x9eWJ\x87\xc7\xb1P!\xdf@\t\x92\xfc\xda+&\xb6\xa6\x99\xeb Dr*W\xeewJ\x17\x80_\x87\xc4\x80\x03\xb4,\xa8\xccE\x05a\xde+\tA\x0f\xe7') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) 20:36:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) rt_sigsuspend(&(0x7f0000000000), 0x8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:36:38 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x48400, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={0xfffffffffffffffc}, 0x0, 0x8) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x3b, 0x4, @tid=r1}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x9}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, r2+30000000}, {0x77359400}}, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000040)=0x1) 20:36:38 executing program 2: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x78) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="070100009200000e0000000000000000000000000000000008000000000000000529"], 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 946.563714][T11481] Unknown ioctl 1075883590 [ 946.582430][T11481] Unknown ioctl 1075883590 [ 946.603396][T11481] Unknown ioctl 1075883590 [ 946.630378][T11481] Unknown ioctl 1075883590 [ 946.649417][T11481] Unknown ioctl 1075883590 [ 946.667074][T11481] Unknown ioctl 1075883590 [ 946.685297][T11481] Unknown ioctl 1075883590 [ 946.695291][T11481] Unknown ioctl 1075883590 [ 946.700772][T11485] autofs4:pid:11485:autofs_fill_super: called with bogus options [ 946.723324][T11481] Unknown ioctl 1075883590 [ 946.732183][T11483] autofs4:pid:11483:autofs_fill_super: called with bogus options [ 946.748868][T11481] Unknown ioctl 1075883590 [ 946.772650][T11481] Unknown ioctl 1075883590 [ 946.803714][T11430] devpts: called with bogus options [ 946.817845][T11481] Unknown ioctl 1075883590 [ 946.848608][T11481] Unknown ioctl 1075883590 20:36:38 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) mount$9p_xen(&(0x7f0000000000)='keyring(#&proctrustedsecurity[\xd8\x9b,\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x1000000, &(0x7f00000000c0)={'trans=xen,', {[{@cache_loose='cache=loose'}, {@debug={'debug', 0x3d, 0xffffffff}}, {@cache_mmap='cache=mmap'}, {@version_L='version=9p2000.L'}, {@posixacl='posixacl'}, {@aname={'aname', 0x3d, 'vmnet0vboxnet0proc\\GPLcgroup#selinuxtrusted'}}, {@access_client='access=client'}]}}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000180)='aH6]\x81\x11\xf9', 0xa09004, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000240)={0x5}) [ 946.870246][T11481] Unknown ioctl 1075883590 20:36:38 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0xa, 0x800, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x165801) ioctl$LOOP_SET_STATUS64(r9, 0x127f, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000400)={0xe8bffff, 0x7, 0x5, [], &(0x7f0000000340)={0x980918, 0x1, [], @value64=0x2ce}}) [ 946.918561][T11481] Unknown ioctl 1075883590 [ 946.924967][T11481] Unknown ioctl 1075883590 [ 946.930190][T11481] Unknown ioctl 1075883590 [ 946.947975][T11481] Unknown ioctl 1075883590 [ 946.978953][T11481] Unknown ioctl 1075883590 20:36:38 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000000)=0x0) io_destroy(r0) [ 947.005129][T11481] Unknown ioctl 1075883590 [ 947.025279][T11481] Unknown ioctl 1075883590 [ 947.030407][T11481] Unknown ioctl 1075883590 [ 947.064971][T11481] Unknown ioctl 1075883590 [ 947.099473][T11481] Unknown ioctl 1075883590 [ 947.114703][T11481] Unknown ioctl 1075883590 [ 947.176419][T11798] devpts: called with bogus options [ 947.189225][T11799] 9pnet: Could not find request transport: xen [ 947.229862][T11799] 9pnet: Could not find request transport: xen 20:36:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0xfffffffffffffd5b) 20:36:39 executing program 2: getpid() openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xb, 0x10, 0xfa00, {&(0x7f0000000380)}}, 0x18) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c00000033001901000000000000000004000000ffd38d9b04000000d72c4b4dcb6d8e5b456ea4395ccb00d2ff404eeff004e70d618290675d57af116ec13e17a4010a186a57a5e036aa97d76311ed3544cd7abd1106acf92e921a3d5abc9129ef4146bd3aa590b54752d723d3f7c77691d93f7193beeac68792cc7fff39a3f3731564cd956d15bf9eec5397e479ba1d1db812b98a121328d6073d68da8461bd758464928e6a901c6dd28c"], 0x1c}, 0x1, 0xf0ffff}, 0x0) 20:36:39 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r2, 0x0) r4 = getpgrp(0xffffffffffffffff) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r7, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r8, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r5, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r6}}}, @rights={{0x20, 0x1, 0x1, [r7, r8, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, r2, r3}}}], 0x78, 0xc0880}, 0x0) r9 = getegid() r10 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r12, 0x0) r14 = getpgrp(0xffffffffffffffff) r15 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r17, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r18 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r18, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r15, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r16}}}, @rights={{0x20, 0x1, 0x1, [r17, r18, 0xffffffffffffffff, r10]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r12, r13}}}], 0x78, 0xc0880}, 0x0) r19 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r20 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r21, 0x0) r23 = getpgrp(0xffffffffffffffff) r24 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r26 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r26, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r27 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r27, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r24, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r25}}}, @rights={{0x20, 0x1, 0x1, [r26, r27, 0xffffffffffffffff, r19]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r23, r21, r22}}}], 0x78, 0xc0880}, 0x0) getgroups(0x1, &(0x7f0000000000)=[r25]) r29 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r30 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r31, 0x0) r33 = getpgrp(0xffffffffffffffff) r34 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r36 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r36, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r37 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r37, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r34, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r35}}}, @rights={{0x20, 0x1, 0x1, [r36, r37, 0xffffffffffffffff, r29]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r33, r31, r32}}}], 0x78, 0xc0880}, 0x0) getgroups(0x3, &(0x7f0000000040)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff]) getgroups(0x7, &(0x7f0000000080)=[r3, r9, r16, r28, r35, 0xee01, r38]) [ 947.779788][T12016] openvswitch: netlink: Flow set message rejected, Key attribute missing. [ 947.808723][T12017] autofs4:pid:12017:autofs_fill_super: called with bogus options [ 947.931680][T11970] devpts: called with bogus options 20:36:39 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000000180)={0x9, 0x8d}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x11, 0x800000003, 0x0) 20:36:40 executing program 5: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3f) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x6, 0xe, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x7, r1, 0x0, 0x0) 20:36:40 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r5, @in, 0xa9}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r5, 0x5}, 0x8) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r6, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="44002aa3212dca8cbdff0000", @ANYRES16=r7, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fdf000/0x18000)=nil, 0x0, 0xffffffffffffffd2, 0x9, 0x0, 0x305) 20:36:40 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) fspick(r0, &(0x7f0000000000)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10, 0x1c00) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) unlink(0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) [ 948.379375][T12337] devpts: called with bogus options 20:36:40 executing program 2: socket(0x200000000010, 0x5, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket(0x10, 0x0, 0xc) write(r0, &(0x7f00000003c0)="1fcc00e00107ffff7d3b54c012655b312588f08d0ed1136fc79196f82f8907112000", 0xffffffffffffffd7) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() sched_setattr(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip_vs_stats_percpu\x00') getpgid(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r2, &(0x7f00000017c0), 0x1b4, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000280)={0x0, 0x1a, 0x14, 0x0, 0xfffffffe, 0xff, 0x3}) recvfrom$x25(r2, 0x0, 0x4c, 0x0, 0x0, 0xfffffe65) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd97, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x30000, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') syz_open_dev$midi(0x0, 0x3, 0x1) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) ioctl$int_in(r3, 0x800000c004500a, &(0x7f0000000040)) mmap$binder(&(0x7f0000fff000/0x1000)=nil, 0x8, 0x2, 0x12, r3, 0x0) mmap$perf(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x110, r3, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f0000000300)='5\x80\xb89\xd1\x06\xf3h\xac\xc5a\x82hQk=\x83V\xda\x85\xb6\xac8n\x93\v\xd1\xdd\xb61\xe7G[N\xba\x83\x04\xa7\xb6\x1a]\xbfx\x8e\x19\x84\xd5w\x84L\xc0\xa5\xe3\xf9\xd4\x91\xd7]\xef5G\xb2\x1fW\x9cv\xd8\x03tp\xeb\fr\xce\xac\x8e\x93\x97\x981\x8e\xdf\b\xd8\xf4\xfcU\xe6b\x11%\xdd[\xde\x8e\xbf\x0e\xca\xfb\x1e\xf0QX\xc1\x10$\xde\v&\x9eWJ\x87\xc7\xb1P!\xdf@\t\x92\xfc\xda+&\xb6\xa6\x99\xeb Dr*W\xeewJ\x17\x80_\x87\xc4\x80\x03\xb4,\xa8\xccE\x05a\xde+\tA\x0f\xe7') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 20:36:40 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x29c6b5ec, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="acf6f069c5985322c32e7017072bf23d5f75f35587ea8341158308394990b62368183c61fa0074afbd3594", 0x2b, 0x2000000000}, {&(0x7f0000000100)="b2db3d4c77c537527e60b95fa2cb47dfafc406453a5ff797ee0ad7d0546d4e527333059f2cb663c030dfb0d28028329faf499dd464d7ee1d1edf580bd44035fd2ee1a1a03b650d27b1654f6d5c8ae49fc6b6d828241b4c125dfcd1cbd3dd0d484843efe30675a25aa68590e7dfa8e4a4b483d20515fd4e4228bf6db85e034a89affd1126cf0f2924c13bd3f023041858e08c589a386b2e4ea464dda157be0e23a45f1b035e83193fd0f1aebdb1d7c59daf9007ad47ce963045941482ef498642ad332b1f9e673ddf2ca2be3c", 0xcc, 0x8}, {&(0x7f0000000200)="bf2bc6ed2ddd5e780e6ff19c19e44853e5e70565c5cee79153648b42c2d92e019d03135fe3e2a9b764bb02e0783c1818ad337959dec3cfc690b419f33ea3e095b7803db6c09ce5ede99eb0afd0a96fc7a2af5d6925670590791df39d124d4dc57794fb06f41a9d6452ae4d815ba2a2b90fa969f85a2b7afc260050bc7a24861e2b65210f12884bffead53a4a47dbc8090574582cf52eecc278bc75bac6db1ce5e6447a3fbf90cad56497cd", 0xab, 0x1}], 0x808010, 0x0) ioctl$KVM_SMI(r0, 0xaeb7) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:40 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, 0x0) [ 949.117159][T12551] devpts: called with bogus options 20:36:41 executing program 4: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001008768000c00020008000200"], 0x3}}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x1d, r3}, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=@can={{0x1}, 0x6, 0x2, 0x0, 0x0, "fc1bb0b38337b3f7"}, 0x10}, 0x1, 0x0, 0x0, 0x41}, 0x44000) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000200)=0x5, 0x4) connect$bt_rfcomm(r4, &(0x7f00000001c0)={0x1f, {0x0, 0x81, 0x20, 0x81, 0x9e, 0x2}, 0x1}, 0xa) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000040)) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e1deb602496457288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x5, 0x1, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff010000e1ffff0300000000ff0300000800020001f8ffff07000200040000000800effffe0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x28, 0x28000) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:41 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000006000/0x2000)=nil, &(0x7f0000002000/0x2000)=nil], &(0x7f0000000040)=[0x1, 0x1], &(0x7f0000000180), 0x0) 20:36:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB="010067feffffe19838b2f2455a632bcb49abfdffffffffff5ff43310618bc0795d285a8b984390e94738377916583058c215af3c0f8a32af", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r6, &(0x7f0000000480)="0300cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e31a20d000000000000256ae8faaae5f59f840c029418a34c", 0xfffffffffffffcb8) pipe2(&(0x7f00000000c0), 0x3913b3427b554256) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x240, 0x0) ioctl$NS_GET_OWNER_UID(r8, 0xb704, &(0x7f00000001c0)) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r5, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000000)={r5, 0x0, 0xe853}, &(0x7f0000000080)=0x8) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r9, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 949.513288][T12892] devpts: called with bogus options 20:36:41 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') modify_ldt$read_default(0x2, 0xfffffffffffffffe, 0x0) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:41 executing program 5: [ 949.800315][T13089] Unknown ioctl 1075883590 20:36:41 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TCSETXW(r0, 0x5435, &(0x7f0000000140)={0x200, 0xea, [0x46, 0xff, 0xfff7, 0x1ff, 0x7fff], 0x8}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8201, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000040)=""/139) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$INOTIFY_IOC_SETNEXTWD(r3, 0x40044900, 0x8) [ 949.825092][T13089] Unknown ioctl 1075883590 [ 949.830158][T13089] Unknown ioctl 1075883590 [ 949.874542][T13089] Unknown ioctl 1075883590 20:36:41 executing program 5: [ 949.905167][T13089] Unknown ioctl 1075883590 [ 949.910202][T13089] Unknown ioctl 1075883590 [ 949.945558][T13117] devpts: called with bogus options [ 949.946195][T13089] Unknown ioctl 1075883590 20:36:41 executing program 2: [ 949.995507][T13194] autofs4:pid:13194:autofs_fill_super: called with bogus options [ 950.004031][T13089] Unknown ioctl 1075883590 [ 950.015020][T13089] Unknown ioctl 1075883590 [ 950.033802][T13089] Unknown ioctl 1075883590 [ 950.062802][T13089] Unknown ioctl 1075883590 [ 950.125655][T13089] Unknown ioctl 1075883590 [ 950.203602][T13089] Unknown ioctl 1075883590 [ 950.215070][T13089] Unknown ioctl 1075883590 [ 950.222364][T13089] Unknown ioctl 1075883590 [ 950.253418][T13089] Unknown ioctl 1075883590 [ 950.272738][T13089] Unknown ioctl 1075883590 20:36:42 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x2b, "8c37777064fe08cdb5f841d96d183f46bf5c5baad4ba0c2b992021ebae61729f02540c163f378e56d209ca"}, &(0x7f0000000100)=0x4f) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) write$P9_RVERSION(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="1500000065ff143c00000008003950323030302e4c"], 0x15) [ 950.299183][T13089] Unknown ioctl 1075883590 [ 950.360787][T13089] Unknown ioctl 1075883590 20:36:42 executing program 5: 20:36:42 executing program 2: [ 950.388677][T13089] Unknown ioctl 1075883590 [ 950.402882][T13089] Unknown ioctl 1075883590 [ 950.453415][T13089] Unknown ioctl 1075883590 [ 950.502869][T13089] Unknown ioctl 1075883590 [ 950.524819][T13089] Unknown ioctl 1075883590 [ 950.656118][T13256] devpts: called with bogus options 20:36:42 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/83, 0x53) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x40001) 20:36:42 executing program 5: 20:36:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x6, 0x0, [{0x40000107}]}) 20:36:42 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff07000008000300000000000800050002000000080002000900000008000500050000004d115638f67667deead3306e69b51fbf57f829f794da2008137886f567e5806c6e0740a4b01c599f80fb20ecf5cf5496b448ae7e28df05c0529037daf51c65bbaef81c2a03f9fb2bb7f425a93ad7c7755f209f77c3501ad8012c1f5dfabf58ae82e9f5d78aa463386d9701a840b1be556988014d02107fb0aac1f40f8c2d9bdd5270324078269f25800c93e8c2ecf220f7b5"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r6, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x81c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x40000) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r11 = getpid() sched_setattr(r11, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r11, &(0x7f0000000340)={0x30, 0x6, 0x0, 0x0, 0x813b, 0x7, 0x1c000000000, 0x2}, 0x0) [ 951.008472][T13422] devpts: called with bogus options [ 951.029103][T13421] autofs4:pid:13421:autofs_fill_super: called with bogus options 20:36:43 executing program 5: 20:36:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000180)="f63aa98c23818a661eb5679de1344baeb838aee1eab50bb4cd5aafaf4368c7d3eed4d6b9fdb7eb7ffbad85b2d118db7a699e27e8536ae8177790f3098e00dd066b34261a5abcde936342c0ba76d089325c231372132a69196bbfb40f49505c726e96410294637ddbf2d8e47783271205d279f8051240fd71985084a025cab720", 0x80}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r5 = socket$netlink(0x10, 0x3, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000100)) getsockopt$sock_timeval(r5, 0x1, 0x42, &(0x7f0000000000), &(0x7f0000000080)=0x10) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f00000000c0)=0x8) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r7, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x252) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f0000000000)={r10, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r8, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r10, 0x80000000}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r11, 0x10001}, &(0x7f00000002c0)=0x8) 20:36:43 executing program 2: 20:36:43 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r2, 0x0) r4 = getpgrp(0xffffffffffffffff) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r9, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r5, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r7}}}, @rights={{0x20, 0x1, 0x1, [r8, r9, 0xffffffffffffffff, r0]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r4, r2, r3}}}], 0x78, 0xc0880}, 0x0) r10 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r12, 0x0) r14 = getpgrp(0xffffffffffffffff) r15 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r17, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r18 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r18, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r15, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r16}}}, @rights={{0x20, 0x1, 0x1, [r17, r18, 0xffffffffffffffff, r10]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r14, r12, r13}}}], 0x78, 0xc0880}, 0x0) syz_mount_image$reiserfs(&(0x7f0000000000)='reiserfs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x2, &(0x7f0000000780)=[{&(0x7f0000000080)="bd7426e8bcacb92a9baaf2c5567e30b3b0827473494b1281ba2667155db4a7aafaf8c42bd3425c6aa21b2962b0e332f70e1517a0acef6f9fc1b1c853b6ccc59e2167a3ced4473a45b9b0d7e2647574b41f", 0x51, 0x1}, {&(0x7f0000000100)="6c3900669997025309aa399b18502577e4be0d4723ac4140757b79d9096988a2a2fbe8fc2f86a4cb65804d722b87d60d2eae35168515c68c801931dc78535c6c129b6c4fbad34490ff656dfa7cae6cd8a7f976b6452f0d5f1bc23114eb2309c5314af8cd76bdb18463f24c6c60d541668b0f0f719facf2411059c58d54350c2970e2e751a38a2709c1e24ddbb4701aabc1b98ec682905f0dd44033bb52d0a88f800d6f4706c36cdfdea7803b908dae1fc3ee77b1fde231fc10f9c0d065bec5b1bd55e513a62b825888", 0xc9, 0x2}], 0x10, &(0x7f0000000640)={[{@balloc_no_unhash_reloc='block-allocator=no_unhashed_relocation'}, {@balloc_test4='block-allocavor=test4'}, {@grpjquota='grpjquota'}], [{@uid_gt={'uid>', r2}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@fowner_lt={'fowner<', r12}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x35}}, {@smackfsroot={'smackfsroot'}}, {@smackfshat={'smackfshat', 0x3d, 'smackfstransmute'}}, {@dont_hash='dont_hash'}, {@pcr={'pcr', 0x3d, 0x39}}]}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r19, 0x407, 0x0) write(r19, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$VIDIOC_S_OUTPUT(r19, 0xc004562f, &(0x7f0000000240)=0xfffffff8) clone(0x10028003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:43 executing program 5: [ 951.507068][T13639] Unknown ioctl 1075883590 [ 951.521121][T13639] Unknown ioctl 1075883590 [ 951.535428][T13639] Unknown ioctl 1075883590 [ 951.555888][T13639] Unknown ioctl 1075883590 [ 951.579175][T13639] Unknown ioctl 1075883590 [ 951.598911][T13639] Unknown ioctl 1075883590 [ 951.616203][T13639] Unknown ioctl 1075883590 20:36:43 executing program 2: [ 951.632571][T13639] Unknown ioctl 1075883590 [ 951.651374][T13639] Unknown ioctl 1075883590 [ 951.669051][T13639] Unknown ioctl 1075883590 [ 951.704976][T13639] Unknown ioctl 1075883590 [ 951.709967][T13639] Unknown ioctl 1075883590 20:36:43 executing program 5: [ 951.761497][T13644] REISERFS warning (device loop4): super-6502 reiserfs_getopt: unknown mount option "block-allocavor=test4" [ 951.781107][T13574] devpts: called with bogus options [ 951.819124][T13639] Unknown ioctl 1075883590 [ 951.866789][T13639] Unknown ioctl 1075883590 [ 951.871791][T13639] Unknown ioctl 1075883590 [ 951.949247][T13639] Unknown ioctl 1075883590 20:36:43 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:43 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x200, 0x70bd28, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x21000}, 0x604808d) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 951.982940][T13639] Unknown ioctl 1075883590 [ 952.002713][T13639] Unknown ioctl 1075883590 [ 952.009014][T13639] Unknown ioctl 1075883590 [ 952.014052][T13639] Unknown ioctl 1075883590 [ 952.019295][T13639] Unknown ioctl 1075883590 [ 952.024704][T13639] Unknown ioctl 1075883590 20:36:43 executing program 2: [ 952.029713][T13639] Unknown ioctl 1075883590 [ 952.035064][T13639] Unknown ioctl 1075883590 [ 952.050680][T13639] Unknown ioctl 1075883590 20:36:44 executing program 5: 20:36:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x2, 0x3) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000000)=ANY=[@ANYBLOB="f800000000000000"]) 20:36:44 executing program 2: [ 952.310285][T13863] autofs4:pid:13863:autofs_fill_super: called with bogus options [ 952.366176][T13864] devpts: called with bogus options 20:36:44 executing program 5: [ 952.592711][T13978] Unknown ioctl 1075883590 20:36:44 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x0, &(0x7f0000000080)={0x8}, 0x8) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 952.637126][T13978] Unknown ioctl 1075883590 [ 952.648107][T13978] Unknown ioctl 1075883590 [ 952.663416][T13978] Unknown ioctl 1075883590 20:36:44 executing program 2: [ 952.684941][T13978] Unknown ioctl 1075883590 [ 952.693203][T13978] Unknown ioctl 1075883590 [ 952.716247][T13978] Unknown ioctl 1075883590 [ 952.739077][T13978] Unknown ioctl 1075883590 [ 952.761215][T13978] Unknown ioctl 1075883590 [ 952.795850][T13978] Unknown ioctl 1075883590 20:36:44 executing program 5: [ 952.819941][T13978] Unknown ioctl 1075883590 [ 952.835094][T13978] Unknown ioctl 1075883590 [ 952.843800][T13978] Unknown ioctl 1075883590 20:36:44 executing program 2: [ 952.890786][T13978] Unknown ioctl 1075883590 [ 952.911849][T13988] autofs4:pid:13988:autofs_fill_super: called with bogus options [ 952.933263][T13978] Unknown ioctl 1075883590 [ 952.959200][T13978] Unknown ioctl 1075883590 [ 952.969284][T13978] Unknown ioctl 1075883590 [ 952.995353][T13978] Unknown ioctl 1075883590 [ 953.008987][T13978] Unknown ioctl 1075883590 [ 953.028589][T13978] Unknown ioctl 1075883590 [ 953.033713][T13978] Unknown ioctl 1075883590 [ 953.052098][T13978] Unknown ioctl 1075883590 [ 953.063150][T13978] Unknown ioctl 1075883590 20:36:45 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) socket$xdp(0x2c, 0x3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000100)="c7c1c79a763f6ac1c477ca56031db6d7c815ba4fc9a1f60f4f3f41c1f5479c34f088dffc18c8ca2ed3b476c2558ef0bc1265825188af4cc33edd562e4f88ce2916e6b89031ce79eaf911b15c334d055e400686a18fb3b0eefc37d9b0caf99fb55e8298a83883e92cd40f37e56a04eb3dc0aeecaab5bbcc89d8006561a73a7a877f2a2b50b9909c13704adb7028e781281b30d156fa25a4f210cca9d1", &(0x7f0000000080)="461ba7df5611542c13a67438d82b7602ee"}, 0x20) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000000)={'ah\x00'}, &(0x7f00000000c0)=0xf8c4ef5fe02d4e3c) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 953.089213][T13975] devpts: called with bogus options [ 953.093672][T13978] Unknown ioctl 1075883590 [ 953.110168][T13978] Unknown ioctl 1075883590 20:36:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff03000008000200010000000800d9693f6b000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000f60eecfca7703f5df5adb0d4abcaf58d2a0e6fab73c3bb48b215d5a01133fcf3137372db7ffedbcb01dd29127ffe5ff03e0808f6c9a1c46fe1e50406874c8868c1819f7a1d8544532dcca017e1cb7fa8299a1baebb312b955a3238fce1e4dacac7feb7c3ea8bd32b8affa96d3e47fb782cb6fb2b6f4d9d97a627adde15dc296f78"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r9, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$EXT4_IOC_MIGRATE(r9, 0x6609) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:45 executing program 5: 20:36:45 executing program 2: 20:36:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r2, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1f, 0x600404) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r6, r5, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x29e, 0x0, 0x0, 0x0) 20:36:45 executing program 2: [ 953.546891][T14207] devpts: called with bogus options 20:36:45 executing program 5: 20:36:45 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000001, 0x200000) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0x61) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 953.697511][T14321] Unknown ioctl 1075883590 [ 953.702865][T14321] Unknown ioctl 1075883590 [ 953.742798][T14321] Unknown ioctl 1075883590 [ 953.765179][T14321] Unknown ioctl 1075883590 20:36:45 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=0x8, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x4000000000001ac, 0x2040, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, 0x0, 0x0, 0x20000001}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe9\xdc\x00', 0x200091}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x0, 0x0, &(0x7f0000000740)) sigaltstack(&(0x7f00004a4000/0x2000)=nil, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$EVIOCSKEYCODE_V2(r2, 0x40284504, &(0x7f0000000100)={0x0, 0x15, 0x9, 0x8, "96ad313717fa3bf3b2e52570530d4ae04416f781e419bff13d806fef4af8b557"}) tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002a488ed39f13b340283b3fca749ebce0080ff0300000800020001000000080002000400000008000200ff07000008000300"/73], 0x2}, 0x1, 0x0, 0x0, 0x24000060}, 0x24) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) [ 953.798128][T14321] Unknown ioctl 1075883590 [ 953.803137][T14321] Unknown ioctl 1075883590 [ 953.825029][T14321] Unknown ioctl 1075883590 20:36:45 executing program 2: [ 953.853783][T14321] Unknown ioctl 1075883590 [ 953.945007][T14321] Unknown ioctl 1075883590 [ 953.950122][T14321] Unknown ioctl 1075883590 [ 953.968566][T14321] Unknown ioctl 1075883590 [ 953.995378][T14321] Unknown ioctl 1075883590 20:36:45 executing program 5: [ 954.022140][T14327] autofs4:pid:14327:autofs_fill_super: called with bogus options [ 954.030869][T14321] Unknown ioctl 1075883590 [ 954.092826][T14321] Unknown ioctl 1075883590 [ 954.114978][T14321] Unknown ioctl 1075883590 [ 954.120057][T14321] Unknown ioctl 1075883590 [ 954.137518][T14321] Unknown ioctl 1075883590 [ 954.157208][T14321] Unknown ioctl 1075883590 [ 954.178140][T14321] Unknown ioctl 1075883590 [ 954.203217][T14321] Unknown ioctl 1075883590 20:36:46 executing program 2: [ 954.227253][T14321] Unknown ioctl 1075883590 [ 954.243756][T14321] Unknown ioctl 1075883590 [ 954.275125][T14321] Unknown ioctl 1075883590 [ 954.291678][T14321] Unknown ioctl 1075883590 [ 954.309047][T14321] Unknown ioctl 1075883590 20:36:46 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000000c0)=0x0) mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x2, &(0x7f0000000100)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@sq={'sq', 0x3d, 0x7}}, {@rq={'rq', 0x3d, 0x4}}, {@common=@version_9p2000='version=9p2000'}, {@rq={'rq', 0x3d, 0x2}}, {@timeout={'timeout', 0x3d, 0x3}}, {@timeout={'timeout', 0x3d, 0x7c}}, {@timeout={'timeout', 0x3d, 0x9}}], [{@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, 'autofs\x00'}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@dont_measure='dont_measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x32, 0x61, 0x30, 0x31, 0x30, 0x64, 0x35], 0x2d, [0x33, 0x37, 0x30, 0x5e], 0x2d, [0x39, 0xc4, 0x0, 0x64], 0x2d, [0x39, 0x35, 0x52, 0x64], 0x2d, [0x35, 0x33, 0x35, 0x6c, 0x34, 0x0, 0x3e85427cb08f5309, 0x35]}}}, {@euid_lt={'euid<', r0}}]}}) 20:36:46 executing program 5: 20:36:46 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c54000022b6984489e47a5b1a743d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) write(0xffffffffffffffff, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) write$binfmt_misc(r3, &(0x7f0000000080)={'syz1', "f042b73c0f689a3dd44940e25e80cf95b4e4a49b45a64682ba3dee934d66c694b31912212e16b140256a0120d7f9445d9e00b0d802620808d12e"}, 0x3e) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:36:46 executing program 2: [ 954.599624][T14443] autofs4:pid:14443:autofs_fill_super: called with bogus options [ 954.847790][T14554] Unknown ioctl 1075883590 [ 954.882790][T14554] Unknown ioctl 1075883590 [ 954.901026][T14553] devpts: called with bogus options [ 954.910454][T14554] Unknown ioctl 1075883590 [ 954.933486][T14554] Unknown ioctl 1075883590 20:36:46 executing program 5: [ 954.958354][T14554] Unknown ioctl 1075883590 [ 954.976992][T14554] Unknown ioctl 1075883590 [ 955.006317][T14554] Unknown ioctl 1075883590 [ 955.027518][T14554] Unknown ioctl 1075883590 20:36:46 executing program 2: [ 955.075222][T14554] Unknown ioctl 1075883590 [ 955.088739][T14554] Unknown ioctl 1075883590 [ 955.113013][T14554] Unknown ioctl 1075883590 20:36:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000680)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c50080000034d52cbd99ff7f0000b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc3acac03923942aee7244b26a9ab418848fc8287074144bb34ba58bfa0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) r6 = syz_open_dev$dspn(&(0x7f0000000340)='/dev/dsp#\x00', 0x80000000, 0x8f1fabab135f623c) setsockopt$packet_buf(r6, 0x107, 0x13, &(0x7f0000000580)="3f55c35564d84836dcac66cdc39fdfde26bd37a88115ac0b1614286acf0cc028f1ccdc89e1e864e073efc73c4a4f94945c6a2ee726b0aa39223bd27c1590da12b0dc664dd6a897492b44349928080eb83ce79fc9e37befb29df3de1ed96d669d5ee327fbf090a3affad575437955e2dae8e88dc70acac8540a99b74b9f3ea3565efd3966c0e90d8321a4604c3812d83765c1047081f103a0e6ad5dece31347b03c6bcaffc56b2267d39a37be8a2544b9d21788a9224eedd0449004390274caa878097ef603b8d2236fc7daf5acd707062c956ec33b680f400b5ef4763e34d1a6cb544a1a761a94758ecec63182bac5", 0xef) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xa6, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x2, @local}, 0x1c) [ 955.138845][T14554] Unknown ioctl 1075883590 [ 955.175886][T14554] Unknown ioctl 1075883590 20:36:47 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x6, 0x4) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x810, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@mmap}, {@noextend='noextend'}, {@mmap='mmap'}], [{@uid_gt={'uid>', r3}}, {@smackfsroot={'smackfsroot'}}, {@uid_lt={'uid<', r5}}, {@fowner_eq={'fowner'}}, {@fsuuid={'fsuuid', 0x3d, {[0x64, 0x65, 0x32, 0x38, 0x0, 0x9d32bbc700e991f9, 0x66, 0x31], 0x2d, [0x32, 0x66, 0x37, 0x37], 0x2d, [0x5290e1d13ae0e09f, 0x61, 0x36, 0x6b1cbce019cbd6ee], 0x2d, [0x34, 0x1e9b3cc7eadfb62f, 0x30, 0x69a65b8da87c98c6], 0x2d, [0x36, 0x62, 0x30, 0x36, 0x38, 0x36, 0xe, 0x36]}}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@obj_role={'obj_role', 0x3d, 'autofs\x00'}}, {@euid_lt={'euid<', r7}}, {@pcr={'pcr', 0x3d, 0x37}}, {@subj_role={'subj_role', 0x3d, 'autofs\x00'}}]}}) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:47 executing program 5: [ 955.208734][T14554] Unknown ioctl 1075883590 [ 955.222002][T14554] Unknown ioctl 1075883590 [ 955.281927][T14554] Unknown ioctl 1075883590 [ 955.297403][T14564] devpts: called with bogus options [ 955.304955][T14554] Unknown ioctl 1075883590 20:36:47 executing program 2: [ 955.332526][T14554] Unknown ioctl 1075883590 [ 955.369102][T14554] Unknown ioctl 1075883590 [ 955.404883][T14554] Unknown ioctl 1075883590 [ 955.430399][T14554] Unknown ioctl 1075883590 [ 955.470900][T14554] Unknown ioctl 1075883590 [ 955.500593][T14554] Unknown ioctl 1075883590 20:36:47 executing program 5: 20:36:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09ee7f7d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c7f0069a2ab418848dc8287074144bb34ba58bfa0"], 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000010000400ff3498000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r6, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000580), 0x10000324, 0x3) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 955.526468][T14554] Unknown ioctl 1075883590 [ 955.534932][T14554] Unknown ioctl 1075883590 20:36:47 executing program 2: [ 955.693775][T14554] Unknown ioctl 1075883590 [ 955.727833][T14680] devpts: called with bogus options [ 955.750696][T14554] Unknown ioctl 1075883590 20:36:47 executing program 5: 20:36:47 executing program 2: 20:36:47 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dlm-monitor\x00', 0x20000, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r12, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080002"], 0x3}}, 0x0) ioctl$HCIINQUIRY(r10, 0x800448f0, &(0x7f0000000400)={r12, 0x0, 0x36, 0x3, 0xfa, 0xf1, 0x7}) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:47 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0)=0x0) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r8, 0x0) r10 = getpgrp(0xffffffffffffffff) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r13, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r14, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r11, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r12}}}, @rights={{0x20, 0x1, 0x1, [r13, r14, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r8, r9}}}], 0x78, 0xc0880}, 0x0) r15 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r18, 0x0) r20 = getpgrp(r17) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r23, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r24 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r24, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r21, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r22}}}, @rights={{0x20, 0x1, 0x1, [r23, r24, 0xffffffffffffffff, r15]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r20, r18, r19}}}], 0x78, 0xc0880}, 0x0) r25 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r27, 0x0) r29 = getpgrp(0xffffffffffffffff) r30 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r32, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r33 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r33, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r30, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r31}}}, @rights={{0x20, 0x1, 0x1, [r32, r33, 0xffffffffffffffff, r25]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r29, r27, r28}}}], 0x78, 0xc0880}, 0x0) r34 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r35 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r36, 0x0) r38 = getpgrp(0xffffffffffffffff) r39 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r41, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r42 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r42, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r39, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r40}}}, @rights={{0x20, 0x1, 0x1, [r41, r42, 0xffffffffffffffff, r34]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r38, r36, r37}}}], 0x78, 0xc0880}, 0x0) r43 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r45, 0x0) r47 = getpgrp(0xffffffffffffffff) r48 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r50 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r50, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r51 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r51, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r48, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r49}}}, @rights={{0x20, 0x1, 0x1, [r50, r51, 0xffffffffffffffff, r43]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r47, r45, r46}}}], 0x78, 0xc0880}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x7, r0}, {0x2, 0x5, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r12}, {0x8, 0x4, r19}, {0x8, 0x1, r31}, {0x8, 0x0, r40}, {0x8, 0x0, r49}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x6) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:36:48 executing program 5: [ 956.099473][T14693] devpts: called with bogus options 20:36:48 executing program 2: request_key(0x0, &(0x7f0000000080)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) io_setup(0x5, &(0x7f0000000180)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x129202, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00\x00\xec\xff\xff\xff\x00\x00\t\xf2\x00', 0xd412}) io_submit(r0, 0x477, &(0x7f00000001c0)=[&(0x7f00000003c0)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000080), 0xff1a}]) [ 956.175729][T14696] autofs4:pid:14696:autofs_fill_super: called with bogus options 20:36:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042d000014000400ff0100000000000000800000ff0300000800020001000000080002000404000008000200ff07000008000300000000000800050091674ae90994549a09000000080005000500000057d86d2ae4b16541ded811503c8adb5e8f19c294b40e878bd4625fd3e5ec9101ea597a7cdc0cdca532f643270e7b56d82b7ab4d5e6afac4e8deb5c1c8fe4fd47d5da99"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000000000fedbdf250100000808000500050000000400040008000200ff0f00001200010400015abc3c5d71a2ac991700080005000300"/72], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r9, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fcntl$setstatus(r9, 0x4, 0x46200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x145cc2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) [ 956.412364][T14807] devpts: called with bogus options [ 956.516232][ T26] audit: type=1800 audit(1573245408.440:45): pid=14908 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16601 res=0 20:36:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x20, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x48b02, 0x0) perf_event_open(&(0x7f0000000640)={0x5, 0x70, 0x80, 0x2, 0x9, 0x40, 0x0, 0x8ede, 0x21008, 0x6, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1000, 0x6ad1f8e7f0a6e49, @perf_bp={&(0x7f0000000600)}, 0x2000, 0x8001, 0xffff4fdb, 0x0, 0x7, 0x7, 0x200}, 0xffffffffffffffff, 0xf, r1, 0x2) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4, 0x3, {0xa, 0x4e20, 0x7d1, @local, 0x20}}}, 0x80, &(0x7f0000000080)=[{&(0x7f00000001c0)="c74ac91aeb58d5afa74c546c5341ea042eb47ca71eb21c3bd24cab7c6a0918025f120b90531df977cd5386d2a8246204b885dbd3c20272aabdc8af64bf909cfd6142529cf573412b1ce53a6d42e669d5c7dccabb39382c166f5ec47854b3631e27496a13f986dc64669e2a40c6b63d9893b56fb4e39f272cfef7f081c8ae713f71db4149653ef000422c0f3ed83f3105812e0fbf9d2dcd34eff1fccf1267d2be0a395d2a3812fa2c34073c2d59d9f8c1072dda28138788ac1fededa232c620dd2924ea1ea66ffaab0cfab326f28229b274caa3ea0f913d105d8da405", 0xdc}], 0x1, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], 0x1610}, 0x20040084) fchdir(r0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) ioctl$USBDEVFS_GET_CAPABILITIES(r2, 0x8004551a, &(0x7f0000000380)) umount2(0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x14) ioctl$TCFLSH(r3, 0x5412, 0x400000) ioctl$KDMKTONE(r3, 0x4b30, 0x101) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000480)={r6, 0xc0000, r3}) r7 = getpid() sched_setattr(r7, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r7) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x2) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001a40)={&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff5000/0xb000)=nil, &(0x7f0000ff6000/0x4000)=nil, &(0x7f0000000300)="b89132700963090858cf5b94b43e03b53bbf99f58b8e4fe542399b5f2be3fa19d2422caef761abb57102ce7fbf3c4bcf9332c16d8d5f080afa74d704727176bce5bb954456ea74efcfbedae04e60a3556366", 0x52, r8}, 0x68) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000500)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x22) ioctl$TUNSETVNETLE(r5, 0x400454dc, &(0x7f00000005c0)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000580)={0x10, 0x30, 0xfa00, {&(0x7f00000004c0), 0x4, {0xa, 0x4e24, 0x1, @ipv4={[], [], @rand_addr=0x4}, 0x80000001}, r9}}, 0x38) 20:36:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x1, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r7, 0x81785501, &(0x7f0000000580)=""/245) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:48 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x2, 0x2, 0x73) sendmsg$kcm(r1, &(0x7f0000000480)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x0) 20:36:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x145cc2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 20:36:48 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x11019800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in=@broadcast, @in=@dev}}, {{@in6=@remote}}}, &(0x7f0000000200)=0xe8) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r5, 0x0) r7 = getpgrp(0xffffffffffffffff) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r11, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r8, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r9}}}, @rights={{0x20, 0x1, 0x1, [r10, r11, 0xffffffffffffffff, r3]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, r5, r6}}}], 0x78, 0xc0880}, 0x0) r12 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r14, 0x0) r16 = getpgrp(0xffffffffffffffff) r17 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r20, &(0x7f0000000700)=ANY=[@ANYBLOB="a145027cfe2ee278639a5d072c5ec31be84a"], 0x0) r21 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r21, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r17, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r19, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32, @ANYRES32=r12, @ANYBLOB="140000000000000001000000010000d7", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r16, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0xc0880}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r22, 0x407, 0x0) write(r22, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r23 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0xff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext={0x400, 0x1}, 0x0, 0x7f, 0x8, 0x5}, 0x0, 0x0, r22, 0x2) r24 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r25, 0x0) r27 = getpgrp(0xffffffffffffffff) r28 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r30 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r30, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r31 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r31, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r28, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r29}}}, @rights={{0x20, 0x1, 0x1, [r30, r31, 0xffffffffffffffff, r23]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r27, r25, r26}}}], 0x78, 0xc0880}, 0x0) getgroups(0x2, &(0x7f0000000240)=[0x0, 0x0]) r32 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r33 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r33, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r34, 0x0) r36 = getpgrp(0xffffffffffffffff) r37 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r39 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r39, &(0x7f0000000540)=ANY=[@ANYBLOB="0a0000000100a582e7cc6a876525b8d888ed48a9e17064eb702da81832b85d7fb86767c90a0052763a0e848b0b31b4581f789a04cec90bb999cbfab5f3f13b5f990a604d456b0136290848be0807dcec43"], 0x0) r40 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r40, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r37, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r38}}}, @rights={{0x20, 0x1, 0x1, [r39, r40, 0xffffffffffffffff, r32]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r36, r34, r35}}}], 0x78, 0xc0880}, 0x0) r41 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r42 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r42, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r43, 0x0) r45 = getpgrp(0xffffffffffffffff) r46 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r49 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r49, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r50 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) sendmsg$netlink(r46, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r48}}}, @rights={{0x20, 0x1, 0x1, [r49, r50, 0xffffffffffffffff, r41]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r45, r43, r44}}}], 0x78, 0xc0880}, 0x0) r51 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r52 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r52, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$sock_cred(r52, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x381) setreuid(r53, 0x0) r55 = getpgrp(0xffffffffffffffff) r56 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r58 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r58, &(0x7f0000000680)=ANY=[@ANYBLOB="0a0097760100bc339e3f6e0f36e8a2c173274c81e53597ea2b6c398e4a39c5b23f6c916b089a9f9d371b3d1405355c2e1c0d0860b6495d150800000060f2bcf069bf870bab000200000000000000"], 0x0) r59 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r59, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r56, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r57}}}, @rights={{0x20, 0x1, 0x1, [r58, r59, 0xffffffffffffffff, r51]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r55, r53, r54}}}], 0x78, 0xc0880}, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='stat\x00') r60 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r61 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r61, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r62, 0x0) r64 = getpgrp(0xffffffffffffffff) r65 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r67 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r67, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r68 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r68, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r65, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r66}}}, @rights={{0x20, 0x1, 0x1, [r67, r68, 0xffffffffffffffff, r60]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r64, r62, r63}}}], 0x78, 0xc0880}, 0x0) r69 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r70 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r71, 0x0) r73 = getpgrp(0xffffffffffffffff) r74 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r76 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r76, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r77 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r77, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r74, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r75}}}, @rights={{0x20, 0x1, 0x1, [r76, r77, 0xffffffffffffffff, r69]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r73, r71, r72}}}], 0x78, 0xc0880}, 0x0) r78 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r79 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r79, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r80, 0x0) r82 = getpgrp(0xffffffffffffffff) r83 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r85 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r85, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r86 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r86, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r83, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r84}}}, @rights={{0x20, 0x1, 0x1, [r85, r86, 0xffffffffffffffff, r78]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r82, r80, r81}}}], 0x78, 0xc0880}, 0x0) r87 = accept4$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000640)=0x14, 0x80000) r88 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r89 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r89, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r90, 0x0) r92 = getpgrp(0xffffffffffffffff) r93 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r95 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r95, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r96 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r96, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r93, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r94, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r95, @ANYRES32=r96, @ANYRES32, @ANYRES32=r88, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r92, @ANYRES32=r90, @ANYRES32=r91, @ANYBLOB="00a60000"], 0x78, 0xc0880}, 0x0) fsetxattr$system_posix_acl(r87, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x1}, [{0x2, 0x2, r18}, {0x2, 0x6, r90}, {0x2, 0x6, r47}], {0x4, 0x2}, [{0x8, 0x3, r19}, {0x8, 0x6, r26}, {0x8, 0x5, r75}, {0x8, 0x2, r54}, {0x8, 0xa, r48}], {0x10, 0x4}, {0x20, 0x4}}, 0x64, 0x3) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) [ 956.928967][T15228] devpts: called with bogus options 20:36:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xe9, 0xb43d7c4782cce955, 0x8, "0ad4fe89a9caf0fdc4d23029800c66e3", "8b57692aef783b706bae780ef70400d3e6325261148f57c42c281036df8941a840122da24123dce691b900e93cbf0ba49bc37b6a87e6e67c64c80ddbe0161751e6976145c9684a30d0268650ffb6ee8e3fe7773e47b229ae9bce7f404fb26902c6500b279ab36b2f82b5cbb16f26c8ea0e275293734f71463dcb6f2c462b3da1b161833347473f412de64725ca1da774d83af2202c1d4b9b9e3710e200983c0ded84b67b03d8bcadc69aa504c9929428eac0ef7dec17cc4c9af8e8d655d5e7696b6c4b17808f956816961549626760b8024af540"}, 0xe9, 0x1) 20:36:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x34, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x222a6d8102856fd9) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/ubi_ctrl\x00', 0x30000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, 0x0, 0x0) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f00000002c0)={r7, 0x4, 0x20}, &(0x7f00000000c0)=0x4) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000200)={0x20000000000001bb, &(0x7f0000000140)=[{0x0}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r6, 0xc010641d, &(0x7f0000000300)={r8, &(0x7f0000000480)=""/112}) ioctl$RTC_UIE_ON(r6, 0x7003) ioctl$DRM_IOCTL_GET_SAREA_CTX(r5, 0xc010641d, &(0x7f0000000180)={r8, &(0x7f0000000240)=""/75}) ioctl$DRM_IOCTL_RM_CTX(r4, 0xc0086421, &(0x7f0000000000)={r8, 0x4}) r9 = syz_open_dev$mouse(&(0x7f0000000400)='/dev/input/mouse#\x00', 0x400, 0x40c802) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000080)) setsockopt$CAN_RAW_FD_FRAMES(r9, 0x65, 0x5, &(0x7f0000000440), 0x4) 20:36:48 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept$alg(r1, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f00000008c0)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008ceb243e6ee31322de10da868b8f4fe188ee74f5f90f770ebad573792b2fccce22af5eda044d6f6e4d46c9335cd29fde80a3d174caf5de55f4e0c1557aed35167e88cb129319de8a1b13997d70c642150f3f9d346174c1e36e4f6ec57ab0063b1920189e91e117a39177e64067a97798f975e909c87b03ffb008cc89ea01735c69db72e548aa14344a6a8c9a59b2c6d8ad995fab118ed8381dcd612bf6e61b1602fe77761d56dc442fb88a59eddbefa5b3f336d794064664e74e8cb894e552ba6159ed9f9d262da67f4321c5cb49369c503fa6a5", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f0000120004000100010001040000090000000104000008000532e447d500cd44c54a8b0bc8f65144c48df0bf37ebc06501d34d8ccae8db5bc0bd6fb46ccc68bd959d02069821d383ff015992edc697a3ae6941b895ac1065d6dd5cda5cccf143a431231786b03823ed6787c32b2d5a0775fd038f77c9889386eead97eeb6b3f42cb98f"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) write(r1, &(0x7f0000000680)="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", 0xffffffffffffff80) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 957.046809][T15304] Unknown ioctl 1075883590 [ 957.060369][ T26] audit: type=1800 audit(1573245408.980:46): pid=15290 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16707 res=0 [ 957.095487][T15304] Unknown ioctl 1075883590 [ 957.145206][T15304] Unknown ioctl 1075883590 [ 957.191691][T15304] Unknown ioctl 1075883590 20:36:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0xa6, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 957.218161][T15304] Unknown ioctl 1075883590 [ 957.233191][T15304] Unknown ioctl 1075883590 [ 957.249209][T15635] devpts: called with bogus options 20:36:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x145cc2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) [ 957.301867][T15304] Unknown ioctl 1075883590 [ 957.314954][T15304] Unknown ioctl 1075883590 [ 957.354981][T15304] Unknown ioctl 1075883590 [ 957.360008][T15304] Unknown ioctl 1075883590 20:36:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r5, 0x0) r7 = getpgrp(0xffffffffffffffff) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r11, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r8, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r9}}}, @rights={{0x20, 0x1, 0x1, [r10, r11, 0xffffffffffffffff, r3]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, r5, r6}}}], 0x78, 0xc0880}, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000001640)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x1240, 0x7, 0x6, 0x20, 0x70bd2a, 0x25dfdbff, {0xd, 0x0, 0x4}, [@nested={0x11a8, 0x3a, [@generic="39402ede28edee904d84832b15771d87c42164b807a42603220f2e9db55bdc1b314df2ef10e5c9d7ad49a1e35ba0c2846e95886de76b710d8ae4596ad457dbff4b2e9738a496b81f2d3d7d7c392c0f97dbd65cc34789f301b1c1feb5c649011457573c881374d01ef2439d37ce2e8f27373dac3315cec1f54ae58989dc", @generic="893732b5004a7c3553e61f58a41d0e92f80d5d1d0acc6f59648c33adeb26a8f7dd21fdbaac50c09041d8c342c335f274a7f16291af381cfd7bbd7af61454cae58558073cfe1bac94f786f3eed64c7385713954ae86ad2e51e10ba0ca34fc8988e33a47c18687ef29", @generic="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", @generic="845b0729771c93e40f2f410fb9f6e8697f3e3f7cbfa2c30e5b87911a75b6f05a3142a658aa1525e95f0a19d6c6e32af4b8da06d88699bf737d80c052b9f65bdde1d5f685737449b32593d7f94788545b10eaef6043105a801ad45ccbd3d5452acfe1a618021d9c3ab6a3799710140b286ed8548b9cb87a41e93ef78357693e93a7f5f4d891702c69f5c3e91aed9e8a284248810f3068b0af6a8dbc3713ffc54788d1a0b3f98f89a7440005671b40a71cf4f70b96e8c34f", @typed={0x8, 0x3b, @uid=r5}]}, @generic="29fbcc8d0bb04b64cd8c10659806e5f0499559a095e8fc5551fa48083f979b31eea155adfa2c185a7ae18aace92f83dcd20e7fd2d4aa605d6e99117538a3fe521781070a0d39e98f191f2e8e67edf4445448d8aac63faa0b2c4f4a595f02aa833715578e4cc69b1461aef3095fb745031ecb20cd69526d6e4648656b", @typed={0x8, 0x85, @pid=0xffffffffffffffff}]}, 0x1240}, 0x1, 0x0, 0x0, 0x4008800}, 0x4) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x14) ioctl$TCFLSH(r2, 0x5412, 0x400000) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000000)={0xff, 0x2, 0xfffa, 0x100, 0x1000, 0x1}) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="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"], 0x11c}, 0x1, 0x0, 0x0, 0x8000}, 0x8010) [ 957.408670][T15304] Unknown ioctl 1075883590 [ 957.413773][T15304] Unknown ioctl 1075883590 [ 957.419236][T15304] Unknown ioctl 1075883590 [ 957.434886][T15304] Unknown ioctl 1075883590 [ 957.464963][T15304] Unknown ioctl 1075883590 [ 957.470319][T15304] Unknown ioctl 1075883590 20:36:49 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x6, 0x400000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34baa9d5b63d1bfaed99d0f5950a633c58bfa0"], 0x4e, 0x0) getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r5, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r4, {0x2, 0x0, @dev}, 0x4}}, 0x26) ioctl$PPPIOCGFLAGS(r5, 0x8004745a, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r7 = socket$inet6(0xa, 0x8, 0xfe) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r8, 0x13}, 0x10) [ 957.539641][T15304] Unknown ioctl 1075883590 [ 957.582993][T15304] Unknown ioctl 1075883590 20:36:49 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x74, 0x1) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0}) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @mss={0x2, 0x401}, @mss={0x2, 0x2}, @mss={0x2, 0x7}, @mss={0x2, 0x1}], 0x5) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="41d030115146d49a285889469011d6a3ffec018194656de19f3d3465d4c9ebb551d2876d0aee4638d93c06e17a57b410718780c3710be85576b58384d41b7c8e392557706e65ae7de0eb5134bdfbe02da8aac8bcd91144e2f9a8113a5ed4d263e88561c9a617af2e9768352f7763d0", @ANYRES16=r3, @ANYBLOB="eba500000000000000000300000008000800e0000002"], 0x1c}}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000600)=ANY=[@ANYBLOB="680000002e8cd5ea2f54ec935295d1f5a58b6c68ce5abf5755c86dfae98eeb087bd583953c14c92c9ec0f3033ce413f323638b80cb38d2c2925f74226ae7cd86236e4874d392272bcde6974ff174e4c9760e199069dc5b2ba3284a3cea3312a3e8aba0352206659e9ad7d8cd39838e34d587efdd95c38d791c127c03a282c4012b84cd552dc9670b72030e1623040f8c3f936811cf47faf93cbbbd5209bd421ff7684d66fa2c8c4e24a797beb269c177e5f55af65579bcaf31d6c3d7328eba1394afb9992ac6fd6e9319e18113f7e16bb93119af04f95595e72a83f308f7e34bc53e308d9b441b69327879217f50011b1311725c7db30a9da0ccb260c56d399270542d7c7e5e70d8c4f4ffcd36097ab5eb0981ec4b3a7629c4a81317e0a0e976daa9f6551a8bb2c80b3e47e7c68a4700e85cacccdf339fa8750dbfd2bd2601d8cbe45b0bff5ee11b1ff3f9d92a4d58894a6051a88b007a61986e2a78eda162d55466241db0db1897e0a7050685a648b35135ce38c289e4b7e88ee4999793a48273d4cb20cfa75d5a8b953bcb185d40aa203a47afaf68362d310451183a073bd99fbd4f516b0926c5f2661696758fc48ea860e836cecc82c6f34b6e50e729b75e3b137a", @ANYRES16=r5, @ANYBLOB="05000000000000000000010000000000000009410000004c00180000000065746800"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r5, 0x10, 0xffff, 0x25dfdbfe, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x3, 0x10b8, @l2={'eth', 0x3a, 'erspan0\x00'}}}}, ["", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x14000000}, 0x40040) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000b40)=""/4096, 0x1000) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 957.615200][T15304] Unknown ioctl 1075883590 [ 957.644848][T15304] Unknown ioctl 1075883590 [ 957.690359][T15304] Unknown ioctl 1075883590 [ 957.703998][ T26] audit: type=1800 audit(1573245409.620:47): pid=15858 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16693 res=0 [ 957.735391][T15304] Unknown ioctl 1075883590 20:36:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xe9, 0xb43d7c4782cce955, 0x8, "0ad4fe89a9caf0fdc4d23029800c66e3", "8b57692aef783b706bae780ef70400d3e6325261148f57c42c281036df8941a840122da24123dce691b900e93cbf0ba49bc37b6a87e6e67c64c80ddbe0161751e6976145c9684a30d0268650ffb6ee8e3fe7773e47b229ae9bce7f404fb26902c6500b279ab36b2f82b5cbb16f26c8ea0e275293734f71463dcb6f2c462b3da1b161833347473f412de64725ca1da774d83af2202c1d4b9b9e3710e200983c0ded84b67b03d8bcadc69aa504c9929428eac0ef7dec17cc4c9af8e8d655d5e7696b6c4b17808f956816961549626760b8024af540"}, 0xe9, 0x1) [ 957.744961][T15304] Unknown ioctl 1075883590 [ 957.755286][T15304] Unknown ioctl 1075883590 [ 957.770386][T15304] Unknown ioctl 1075883590 [ 957.784639][T15918] devpts: called with bogus options 20:36:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) getsockopt$IP6T_SO_GET_INFO(r4, 0x29, 0x40, &(0x7f0000000340)={'mangle\x00'}, &(0x7f0000000400)=0x54) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:49 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0xfff}, {0x0, 0x4}]}, 0x14, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)=0x0) capget(&(0x7f0000000440)={0x19980330, r0}, &(0x7f0000000540)={0xffff, 0x4c, 0x0, 0x2000400, 0x9, 0x1}) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x80, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000300)={'security\x00', 0x4c, "5936e14c6674f576ee0caeb1dc62848c691c0d5bdd2353a94626d911d2962243d29cec69d75b05a9c998eabd78c2b6d65de49381118d20b1bb71f71c5f0e904777404e85c4908efde9add3d4"}, &(0x7f0000000280)=0x70) fsetxattr$security_capability(r1, &(0x7f0000000240)='security.capability\x00', &(0x7f00000002c0)=@v2={0x2000000, [{0x0, 0xffff0001}, {0x3f, 0x81}]}, 0x14, 0x5) write$UHID_GET_REPORT_REPLY(r2, &(0x7f00000003c0)={0xa, 0x3, 0x0, 0x9}, 0xa) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000380)={0x30, 0x4, 0x0, {0x3, 0x401, 0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x30) move_mount(0xffffffffffffffff, &(0x7f00000000c0)='./file2\x00', r1, &(0x7f0000000100)='./file1\x00', 0x22) 20:36:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x743, 0x3ff, 0x7a}, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) write$P9_ROPEN(r4, &(0x7f0000000000)={0xa, 0x71, 0x1, {{0x10, 0x4, 0x8}, 0x7}}, 0x18) syz_kvm_setup_cpu$x86(r3, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x9) 20:36:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x145cc2, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000300)=0x100000001) ftruncate(r3, 0x200004) sendfile(r1, r3, 0x0, 0x80001d00c0d0) 20:36:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fcntl$getflags(r0, 0xb) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) [ 958.193541][T16172] devpts: called with bogus options [ 958.269391][T16284] autofs4:pid:16284:autofs_fill_super: called with bogus options [ 958.336092][ T26] audit: type=1800 audit(1573245410.260:48): pid=16270 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16995 res=0 [ 958.359261][T16515] Unknown ioctl 1075883590 [ 958.374685][T16515] Unknown ioctl 1075883590 20:36:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xe9, 0xb43d7c4782cce955, 0x8, "0ad4fe89a9caf0fdc4d23029800c66e3", "8b57692aef783b706bae780ef70400d3e6325261148f57c42c281036df8941a840122da24123dce691b900e93cbf0ba49bc37b6a87e6e67c64c80ddbe0161751e6976145c9684a30d0268650ffb6ee8e3fe7773e47b229ae9bce7f404fb26902c6500b279ab36b2f82b5cbb16f26c8ea0e275293734f71463dcb6f2c462b3da1b161833347473f412de64725ca1da774d83af2202c1d4b9b9e3710e200983c0ded84b67b03d8bcadc69aa504c9929428eac0ef7dec17cc4c9af8e8d655d5e7696b6c4b17808f956816961549626760b8024af540"}, 0xe9, 0x1) [ 958.400325][T16515] Unknown ioctl 1075883590 20:36:50 executing program 3: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8298074144bb34ba58bfa0"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x881, 0x0) sendfile(r7, r0, &(0x7f0000000400), 0x100000001) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="44000e0c", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) open(&(0x7f0000000040)='.\x00', 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getdents64(r1, &(0x7f00000000c0)=""/71, 0x47) umount2(0x0, 0x0) [ 958.439306][T16515] Unknown ioctl 1075883590 [ 958.447427][T16515] Unknown ioctl 1075883590 [ 958.519472][T16515] Unknown ioctl 1075883590 [ 958.538565][T16515] Unknown ioctl 1075883590 [ 958.558610][T16515] Unknown ioctl 1075883590 [ 958.563693][T16515] Unknown ioctl 1075883590 20:36:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r5, 0x0) r7 = getpgrp(0xffffffffffffffff) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r11, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r8, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r9}}}, @rights={{0x20, 0x1, 0x1, [r10, r11, 0xffffffffffffffff, r3]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r7, r5, r6}}}], 0x78, 0xc0880}, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000001640)={&(0x7f0000000340), 0xc, &(0x7f0000000380)={&(0x7f0000000400)={0x1240, 0x7, 0x6, 0x20, 0x70bd2a, 0x25dfdbff, {0xd, 0x0, 0x4}, [@nested={0x11a8, 0x3a, [@generic="39402ede28edee904d84832b15771d87c42164b807a42603220f2e9db55bdc1b314df2ef10e5c9d7ad49a1e35ba0c2846e95886de76b710d8ae4596ad457dbff4b2e9738a496b81f2d3d7d7c392c0f97dbd65cc34789f301b1c1feb5c649011457573c881374d01ef2439d37ce2e8f27373dac3315cec1f54ae58989dc", @generic="893732b5004a7c3553e61f58a41d0e92f80d5d1d0acc6f59648c33adeb26a8f7dd21fdbaac50c09041d8c342c335f274a7f16291af381cfd7bbd7af61454cae58558073cfe1bac94f786f3eed64c7385713954ae86ad2e51e10ba0ca34fc8988e33a47c18687ef29", @generic="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", @generic="845b0729771c93e40f2f410fb9f6e8697f3e3f7cbfa2c30e5b87911a75b6f05a3142a658aa1525e95f0a19d6c6e32af4b8da06d88699bf737d80c052b9f65bdde1d5f685737449b32593d7f94788545b10eaef6043105a801ad45ccbd3d5452acfe1a618021d9c3ab6a3799710140b286ed8548b9cb87a41e93ef78357693e93a7f5f4d891702c69f5c3e91aed9e8a284248810f3068b0af6a8dbc3713ffc54788d1a0b3f98f89a7440005671b40a71cf4f70b96e8c34f", @typed={0x8, 0x3b, @uid=r5}]}, @generic="29fbcc8d0bb04b64cd8c10659806e5f0499559a095e8fc5551fa48083f979b31eea155adfa2c185a7ae18aace92f83dcd20e7fd2d4aa605d6e99117538a3fe521781070a0d39e98f191f2e8e67edf4445448d8aac63faa0b2c4f4a595f02aa833715578e4cc69b1461aef3095fb745031ecb20cd69526d6e4648656b", @typed={0x8, 0x85, @pid=0xffffffffffffffff}]}, 0x1240}, 0x1, 0x0, 0x0, 0x4008800}, 0x4) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x14) ioctl$TCFLSH(r2, 0x5412, 0x400000) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000000000)={0xff, 0x2, 0xfffa, 0x100, 0x1000, 0x1}) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) r12 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16=r12, @ANYBLOB="040028bd700023000000160000003000060004000200040002000800010020000000080001000100000004000200040002000800010001000000040002000c0009000800020062090000cc00010024000200080002001d19801708000400f33200000800020000040000080001000e00000038000400200001000a004e230000004000000000000000000000000000000000050000001400020002004e24e00000020000000000000000380004001400010002004e20ffffffff0000000000000000200002000a004e22ffffffbffe8000000000000000000000000000bb060000000800030001fcffff2c0004001400010002004e23ffffffff00000000000000001400020002004e24ffffffff0000000000000000"], 0x11c}, 0x1, 0x0, 0x0, 0x8000}, 0x8010) 20:36:50 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x3, 0x2) fspick(r0, &(0x7f0000000180)='./file0\x00', 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x127, 0x40000) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x800, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0xad, 0x7, 0x40000000000000, 0x101}, 0x0) capset(&(0x7f0000000080)={0x20071026, r2}, &(0x7f00000000c0)={0x7ff, 0x2, 0x7, 0x1f, 0x100, 0xfff}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) [ 958.615129][T16515] Unknown ioctl 1075883590 [ 958.641026][T16515] Unknown ioctl 1075883590 [ 958.651605][T16695] devpts: called with bogus options [ 958.681996][T16515] Unknown ioctl 1075883590 [ 958.704979][T16515] Unknown ioctl 1075883590 20:36:50 executing program 2: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0)=0x0) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r8, 0x0) r10 = getpgrp(0xffffffffffffffff) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r13, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r14, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r11, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r12}}}, @rights={{0x20, 0x1, 0x1, [r13, r14, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r8, r9}}}], 0x78, 0xc0880}, 0x0) r15 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r18, 0x0) r20 = getpgrp(r17) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r23, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r24 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r24, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r21, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r22}}}, @rights={{0x20, 0x1, 0x1, [r23, r24, 0xffffffffffffffff, r15]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r20, r18, r19}}}], 0x78, 0xc0880}, 0x0) r25 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r27, 0x0) r29 = getpgrp(0xffffffffffffffff) r30 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r32, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r33 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r33, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r30, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r31}}}, @rights={{0x20, 0x1, 0x1, [r32, r33, 0xffffffffffffffff, r25]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r29, r27, r28}}}], 0x78, 0xc0880}, 0x0) r34 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r35 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r36, 0x0) r38 = getpgrp(0xffffffffffffffff) r39 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r41, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r42 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r42, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r39, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r40}}}, @rights={{0x20, 0x1, 0x1, [r41, r42, 0xffffffffffffffff, r34]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r38, r36, r37}}}], 0x78, 0xc0880}, 0x0) r43 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r45, 0x0) r47 = getpgrp(0xffffffffffffffff) r48 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r50 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r50, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r51 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r51, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r48, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r49}}}, @rights={{0x20, 0x1, 0x1, [r50, r51, 0xffffffffffffffff, r43]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r47, r45, r46}}}], 0x78, 0xc0880}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x7, r0}, {0x2, 0x5, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r12}, {0x8, 0x4, r19}, {0x8, 0x1, r31}, {0x8, 0x0, r40}, {0x8, 0x0, r49}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x6) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 958.733117][T16515] Unknown ioctl 1075883590 [ 958.822203][T16515] Unknown ioctl 1075883590 [ 958.861131][T16515] Unknown ioctl 1075883590 [ 958.874637][T16902] autofs4:pid:16902:autofs_fill_super: called with bogus options [ 958.893315][T16515] Unknown ioctl 1075883590 20:36:50 executing program 0: fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$rxrpc(r1, &(0x7f0000000540)="ac2bfe893600625856b368b1d647118b7d9845a41c03b3034171d985bb0ae4e49219f79f26b1250de9cc4e8f26bd6f0c036a007c3471229c64fdc3c9d618e8abdbf5dce380e40f07427107765388f8924fa531aafad47b526e92235916b5a3a518aec6a434a5e6c2b0d9a449a20307b4a285c47578151783813be1f50096d0d78a0106891a7e5a5f8005e3db790c738b00dcb95eb1a0df799790ab7ab4b37781f00ad75bd51964de281d3efcb4849a76f044538a91d1164c5979b1351edd6e2809579d11931f7c21fd4d3bf1a4ba5c2132c0c178c967b45d972167a40cedaec6b9e75b08b006283b6a5c5883f2303d4d276fffdbeabbe7fb7fb25d1f4ab041a4f4e5476ae776c9f2fe6f4b745bf3ad8390937e246e2700a8652e84fcc20255586ecdc592d795daa999c40da4d44719c91ef1a85f5ab71bfb019acb546777fbc501ed5a89a61c83149d1e801f26c10c76e80402dcfdff933d547dcfc51d3b69dd9aa8512ff7c92e06638881cbe2f848badec6b8d7b31abb749d7ff9e00ebb22eeb2f29a0ea7c67a8d03b451f3a5dfe46f1b1345fd3a9b423529a4548490117a904ac7219dc8dfc16f8e7bbaa4017f1ca15ffec3e14a7e7568ee359bfa498757e245ebc61571fe33ea596ccd2a27e59b50dd8c4dfd93dcb6d9c999a285a79b4104dcce74bbce55fb7550eb31f1cea6c618c81212aa93d7e6528e9d6d774b41dc066c93b9babb86a7f03db40dc2714e3047b210777fd69371a4d5af81836255e18c7ccbe80988fc6ab3e9066c77d39ec7d0704519e6396930201998cbc6bd1b42201b53050899475cfc534841b0985b9878e1b28b7f5a41767cc9676a30b9044ab8a1e78e39dc6058eaf0bc2fa50d2fc6e675df4c6d33abcd6f783c0d3dd6c6dcdbd4d565df88d928a540eb0e209d7dc72558b26ecf7fc963df8ac77d280c8d8bbf64f7f6c6e249a385a7301aa80d89a4ca357c711b7243312f02b1d5d15aa425345025a3f88630402541937f3dfe513bfa680a613f2b8882b5263a62cdc0f8bc2651e315687bee3b37deac751b911a2641e1962c255badce9206fb65e5a44627b7229f6ee8c4f8b60f6fcc9a21fbe6b8cc4bbf1e4b8cd2d20069efea2ba0e076399e50220a9e52b46ef210a0253ebe77144c3d43b1703c5a02d551ab7864816580b8cc4ec9ec61a59a7d721bbef6fb6969901b2ef0c38043dcaeb0688b60d9008d5d281d73f6233475ec15dcc6246688da4b200cfd60dd08bd1975b8f1a8628734b33b7123030d55663485e1e184f090fbcc7c35c096a3d42a3f0c4075979843c913b33c15ec03de00fd0be6a3e9180374c467d3f4c57687f80276f637e376663e7287ac69e5a04a94b8837db7c9a35f03fb09fc561342a5dea43b738df9203feded03180806a6158669782e07ada567d73996e05004be2365db3230052d0cab71080234f4041c1d5d0ec0a06765c0e886b6e681b8663960a5440bc7e4a853c8feb811d58f49bfbd2c6d371a11113b3053c6ec4db5e7552b7d08949647c17fc354e2c1f811066cb1aaee0642791f2b9a2d92ca77e1a1d3b43338eae966ffd202d6fd49d5ea766b708191bc73dada9121b29dd5a8f30667c70a246d983e1c05f204a5342a94f9cb90f2c485ed8c906f33f87acc21aa8d332e6ffe004b9efdc610ab4ed285ce07f3a0287280bcd9d13011247c9e3296576280a867673c9fa833d1a55b53a0b0541e6077b4311b0366a95ddb1dbff4df15b310c2d1c5c0537da67e33d961e884303be7e6cab35b110bc14698a05cd397d26985a04de6a03a943965cccf305cc399a843cb95f5da3e8ed1d6e1ee7a1ea638364c200fe391fa0c8af539ac59de07e9a75fa238c349c635e44e310819500017cc74e467cf05da0acd628237dc54c9a3228c0a2a7db02862e7c0a4ea0fe654bfd5ffb8a654ebe7c046e3bdcd00b23bd957e22400d20ce44cb89f4d951c9462bc496bda707be814ba51cac002c0df4645bbd6ba1bc493d6fc93193f42e9e59bd153cd664370fe520ef5efebc4c9960e0b32ceace11abe429a6730a1c67cc2494f4ad04fd9da0c1cb3d1bd6e4d991128ba8cd76cbd442e6006300e1dc66850008d5ddc79ed6d23c366edde11168fe2f7ed6a1a4547b2a745430ea14baf0e217f28046526f20b29f2aa4e8a5a4bdd72bf9bb06983ac338a8a5398ad2933a324223921a046418b2cbdb5f41049689ae3044782cb04a38c9a5b9e6b8ef042a9b0f1498e8603ddac5043e775d23b34202157a72d53dd5c95d7b37f71a59b19182c5887c788673c5b82dd340d59c8a71e04eb70dd320e7847bb50a7a8cd99a34eb919753afc262fc8b6b53815b6575e6aabde217a75d9128a8df950eba491ac5076c69c7138df4eb10b5455c0e7fc003bfbec0782febb6c86e91d7da82281b63caa37e1c0660797ca80be159c3d2eea9c6739b4c0cb610b4cb5e6add4845b43f58c18908296fcda55824a66f935b451f0fc49cb1e4fa0ffdaf9b33299e658de3839702b1cd919459351a50c54b9ef1d35dd2973c92dd8a7aee4fa23bb7306f97d74ca211b58d1eae8d332be243e097dd4537940999854785d8f936712cf2e085c7af8b758459cc964e018011c9e68512b2ee02d307550b738bd5c042d0d729807b8f4c02ccea0c4fdd06bece43d74cb76dbc600ca921d5d179911af0bee4842c6c53c22bdfd41f20a42c8db9de17af28255a2c1d4dc35ea798eec9a8646bf71af6bc3ab965edca9176597c7b26ddc6e01191ae9287b625cffd96d3c1665d20ce78fbac2073ba510586daa646065f0826877848ec4e467d9a4aecd77b4ead24a7efe2482209b3cdcf4616f377894871b233cd2d3663cb1c06d2c7fdd8038779d378bcd9d99849311fd2c07a92285aa21744645a2fac8ba3304d6eb0c3df5806ce07e2d74431806b3b3ca97cce029c09f0aa52e56f98715151948da63cc420471cdd4e1d61c1386c19b21f5814524e6bdeb546863d29d8c4f71aa2426a2684e7773aa57e49257675be02b67ab8e8858500ac653a42ab07bd44e872304990e7117f09814e7a110d4a989d54e05c05456e226ca0dbfedc1a1ce8d65e0336a8d2423a2749f3147d8b9e13abc75626cc27bdf930612f1fe73ba7280cae4096c4e87f59a5aa0e17190b8bedfdd0d7a95de0cf110d20098f415b3eccba9155331fa083e3b82edbf8beb13309059e7e32d0c483df65c209ef8f9adc76aeeb15bdc0a41d791ead8430c458b63ccc1823fc57c39b2992393509b55f11afb1baaafcca43be6ccab280509016084b4c2eb88496be01dd31932ee40a424536899786c503b6db62c2335b0edf5626b9863aed3988193f46e16a00025bd1260ba4f548f679e021ef75b80843debe320a016b678e0928583549d1e20126bfe1540da4e231f9581d6c4d4e86ffdfb9b63a781464742a28b456b69d9ae80f58831381d3d61d5ee5cb25d1f8265048a8b06aea566fcd1d2df505282a1d0a6988ff19f97c0a370de5a829887c73fc09e37b742ecb6c947e019fdd0615b6b748fedd057f08c1868de21d3b64df4bd953607be2e9384b235abed8b93de43c19bc0d58dbe7df36d29ed7df8a8ba08b6fcd5a3c42c02b563c9b97842f0abd401bf6fa28a3c3afd98a59788204254e59a8c41654988a57f0b14bc26a45e513aede970db0433813aa0721cb65e1cf89c52897d8119b4d8d1f000d85691f3fef69ced9fb6cf9817412e0c101fca803cb33a84b8ce108cc2f8761412c076653dfe7a4df71ee8f68c22f46e61fe660182116139181eb2e0d8a72e4cdf358c7bf22be2f71311b4ac82e413894614581a4c3ff6c106b724532d9e8285bbac4707c583550391d9fcb0d2cc09651f4952fba96734270df36f1c06434f2bc92e6548ec2bf1ef3b72863f65f050d8b9f80a96e549fc7b493877a6a6f64c6cbfc1489ec30de27f370594230ec7ee405acf90ff330f8b9955a2104934e05f2fa4cd10ffbaab062ab647238f110b22b150ae129c918d4692782d82674ab49377b28999f342ecdab03f2d31f29df8b1051dfa62274b10c6d8fda06c5d1a6468acbb59acbb3d96944c3644ec076533aefb42afe87bcc4202e2780282901b5707ab45c2b8ee148c4f8f76d3c92c3672c41a50f98d228e43077cad7cd2abe2146c5f4e7fd27f347052065e6b864c5944f869ba9661afb1a319d7597fa9185a557d941d3b826fba4d64b3d4677273a7bd062187d9a3a3874ac040e7b27a12674bad9beaa39eef19ca799f2623344a6a2a62e4ac9ff33a315b29ec8a9e1a0786ad32f363fe63736f93c9f2047a7195e307cb3bc9721e682129116c0a3db43a8a0b98c11faa2112a003b523294641a709d8503e89276597c6fa6ca4626e8a1046da5302cb4e7e74f7fc02d57f488473f3631d7199853fe6e8008111b8fe5bc577502e5df2a88e406a0dac86ad8a5fea51888e5529b30266c3f3926aeffb71eebdc9fd6773849f944fcd027184023fbc8eb3fc9f3465050cd4ae1890f4bf5b6fac41878141f558de5d7b2d7858b1b053e582878815ad9bca1b86f9cf88771f5f1d4a45d0c04b8960a54d90b88e2817c05989628db3e8bcbe23f5d21d82e5f3346c1dd118e1fe3fe0a10197b75ecfa807355bba0e9951a420017a0492bdd9040cf199764119381be56513533cfd3e4a9cec99377907bc18b0b26554d0a929cd9e33658d86e71079e4eb762da34507ed87079370b80a72a5cb7ad42bc317986348ea5904196def7052c3b7e9a717e8aef00097b30cfad5e463bdf4784b0ef7ee2a6940d0dd32e22303f4ca7fb9164d226a8c6590882c82a8c14ff6a70128bed494cab1b733223ab3bd12c91e49b2138b82fadf7b4e1586213022955f7a9e07698971212bae28cd5947f8af5f58be26b2f8675d47a47ba31ca3ef23532a18c40fcab84d2e42e2c268d861b0d33014747f8592cb45877fa9c655a2a82f09bb11b932186135a7506cd6d04b738448f14b112aa7303822116e20cd24a97e4534317b8b1ba1ba088d6cd0d891538162fd44255d50e90331d87be8cc897eebacbba656a5f2692d55b5892cd3fd171929371b9c755b3a8615608bb4002fabb61455c01a54d2b42e5b5ba861be95f47352e74be2ce724d3db1b86029a1adeca4744631f0349e328a170b5e4954f687e67cc67f8cd232357c994f514a442d053689f6ca88ac752526af324d9548c40519d0486966de6d1af0415a88d179b77e6e80b83c23d15d4ee2479c93fa192d246bdfc3237a5dec8f93c53467b441477ac0175619eb294996ba3a4d09e487b19caa01b578ae615246a258f6e4292cccf31ac32c85623c4e9032b80b1f3e1623a419b40bface47e61500690d5578ab7f640479084cbbbd6c2eb27a17694d7e485121d6f7e484600da22ad0b52937ec5f8a2309d91da343a796b9c37c62db8d191a3779d5d367b02f55f7e13d714750c8cf359b0e2b5008922d5268139f6c5502c76315e4fec74fb08cc3c8ac00c963399986312beb57d367e98f57e9d3468eb50029a2b391cedccdd6ac91d3240efbb94b588fa5941ec037c0bc63aac83635bb5aa97c90e3528f40e6dd3122d719101defc83068acb2513771335d30cada9531a1268569662d2468105adc1c80f7b80da57079d6b24ee49ebc6cc6a7576ba80bc733d7657884778ed91ee7bcf5ca347d589ed2c0890c78120a79c593a9a13bf6ea3ccdd7b7075d1bc9de483e2d5060ab831eb8bb7583406911c32837679d715adebcc29fba45231bb4d32d1e340d3ca19c7b3a9b06af3dad3ce50c931e", 0x1000, 0x2008c104, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x20, @mcast2, 0x7}}, 0x24) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000000), 0x10) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) [ 958.911932][T16902] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure [ 958.917261][T16515] Unknown ioctl 1075883590 20:36:50 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000000)={r4, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000340)={r4, 0x48, &(0x7f0000000580)=[@in6={0xa, 0x4e21, 0x3e259c84, @remote, 0x6f8}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e21, 0xa2e, @rand_addr="43b66314525f9db0638573df0e2fc14a", 0x8}]}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000600)={r5, 0x9, 0x10, 0x0, 0x6}, &(0x7f0000000640)=0x18) r6 = getpid() r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket(0x400000000000010, 0x802, 0x0) write(r8, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="8a9293863c2649ec49060000008c000000000000000000000000000000005b66ed26cade78643bc7e2be18c8ae45a79650ab11", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r8, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r9, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r10, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r12, &(0x7f0000000340), 0x41395527) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r13, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r13, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 958.974910][T16515] Unknown ioctl 1075883590 [ 958.993420][T16515] Unknown ioctl 1075883590 [ 959.053861][T16515] Unknown ioctl 1075883590 [ 959.114842][T16515] Unknown ioctl 1075883590 [ 959.119829][T16515] Unknown ioctl 1075883590 [ 959.137302][T17016] devpts: called with bogus options 20:36:51 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000040)=""/166, 0x52768436b2e8d82d) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000140)='viTtcofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={r3, @in, 0xa9}, 0x90) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000300)={0x3, 0xd, 0x0, 0x5}, 0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000000)={r3, 0x871}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e21, 0x5, @rand_addr="c0bf1183e3bba092ab7ea188f036720a", 0x5}}, 0x2, 0x6}, &(0x7f00000002c0)=0x90) chdir(&(0x7f0000000180)='./file0\x00') [ 959.203752][T16515] Unknown ioctl 1075883590 20:36:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000000000)=[@in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e20, @remote}], 0x30) 20:36:51 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8298074144bb34ba58bfa0"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x881, 0x0) sendfile(r7, r0, &(0x7f0000000400), 0x100000001) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="44000e0c", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 959.425262][T16907] autofs4:pid:16907:autofs_fill_super: called with bogus options 20:36:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000000, 0x6, &(0x7f0000000500)=[{&(0x7f0000000140)="0937c146fb2b611b00f80c13d2758fab420979fabed61cee5ec965e0716eff3cab3824446f4139da8496ae059041af7b4a7a249e7522ecbe596c8882d5156db7599bcb57f327663b", 0x48, 0xad0}, {&(0x7f00000001c0)="811a1a56bc17f19c98ae425029a2ed25f99cb5895035523e8f399628e63c26677993024cd44d652359ba646af509fb8865abfd117adc39467d841662e2dc36d26fcffcd7f790eca8e5eb1af613dc8ae38eb9d5ee213702bbbfd94b9e31b2496802835095dbf1bc4bce8bb8f6e7bce095f1c641a52958ab5adb224ffd2eec59d5ec9511ce", 0x84, 0x3d}, {&(0x7f0000000280)="72a2ddc226eb4568ce24b2b4e11f57047ccabf97861b3b4a7b6c6939e5dac4d6", 0x20, 0x401}, {&(0x7f00000002c0)="ae5fbae9451a82b7b0ba66163edd69d26250c1db486e83bbfc4b9ca74c27e9bc5bb4cc2c448653fd04fae9b10837ee3aa3e7cf488bc26d9bd21ee20d2dcc0cc004e82189ab77c8fe863668a10385fb8a49618e3a9883c8ca1623bb41d67e00844e2757f358bee10df47c66e07ae7ab284e625b7f02c69193ee779eebc7607c9f27fa54fae1ead45b371ff17506da2dfbd3f15322f49039942a1b712c3cc27e4ffb95b3ac1ff25b8c60027267d7bdaa1602363817771e5ebabfc27a0dfd15288493f741b9c885cd9ec4", 0xc9, 0xff}, {&(0x7f0000000400)="055e4108b9a46f993efe59", 0xb, 0x8}, {&(0x7f0000000440)="b38a66dab8c5f877f919639cdb6154515d5af20a2c086dd36b28ce697d04066ca112412f434ea3dc5bb09bdb822c95030c37a510bd30cccb13862a7d14f5140ef36e56a311f48567f7b1fe1e29ebb24d39dcccb287e7ec54475a6c6b13fe9e8a441037bee37bdc4d27949fde60d4f6c23690c0d236477c64cd64a0fc82557461af272f0ad3901d7a18f36d5f4eb308c96257fb8c4619c1d522b4c12fbefd67", 0x9f, 0xe36}], 0xf2022b1ee2bf4e1e, &(0x7f00000005c0)={[], [{@obj_user={'obj_user', 0x3d, './cgroup\x00'}}, {@dont_appraise='dont_appraise'}, {@obj_user={'obj_user', 0x3d, '\'!cpuset'}}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type', 0x3d, './cgroup\x00'}}, {@subj_type={'subj_type', 0x3d, './cgroup\x00'}}, {@dont_appraise='dont_appraise'}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@subj_role={'subj_role', 0x3d, './cgroup\x00'}}]}) umount2(0x0, 0x0) [ 959.668307][T17281] Unknown ioctl 1075883590 20:36:51 executing program 2: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0)=0x0) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r8, 0x0) r10 = getpgrp(0xffffffffffffffff) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r13, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r14, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r11, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r12}}}, @rights={{0x20, 0x1, 0x1, [r13, r14, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r8, r9}}}], 0x78, 0xc0880}, 0x0) r15 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r18, 0x0) r20 = getpgrp(r17) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r23, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r24 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r24, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r21, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r22}}}, @rights={{0x20, 0x1, 0x1, [r23, r24, 0xffffffffffffffff, r15]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r20, r18, r19}}}], 0x78, 0xc0880}, 0x0) r25 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r27, 0x0) r29 = getpgrp(0xffffffffffffffff) r30 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r32, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r33 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r33, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r30, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r31}}}, @rights={{0x20, 0x1, 0x1, [r32, r33, 0xffffffffffffffff, r25]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r29, r27, r28}}}], 0x78, 0xc0880}, 0x0) r34 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r35 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r36, 0x0) r38 = getpgrp(0xffffffffffffffff) r39 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r41, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r42 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r42, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r39, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r40}}}, @rights={{0x20, 0x1, 0x1, [r41, r42, 0xffffffffffffffff, r34]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r38, r36, r37}}}], 0x78, 0xc0880}, 0x0) r43 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r45, 0x0) r47 = getpgrp(0xffffffffffffffff) r48 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r50 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r50, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r51 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r51, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r48, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r49}}}, @rights={{0x20, 0x1, 0x1, [r50, r51, 0xffffffffffffffff, r43]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r47, r45, r46}}}], 0x78, 0xc0880}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x7, r0}, {0x2, 0x5, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r12}, {0x8, 0x4, r19}, {0x8, 0x1, r31}, {0x8, 0x0, r40}, {0x8, 0x0, r49}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x6) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 959.710551][T17281] Unknown ioctl 1075883590 [ 959.736932][T17281] Unknown ioctl 1075883590 20:36:51 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02a1005fa028bcac7264d88f13e90bf19ec4f728bfb85965a9d465397d2d859cc47960797755484c345213532aba555876cc5450643f8b72c3b7ecaeb32c584dad2537874b497bf8513d6b41c2d4b66bf88682bd70d18a72074542948ae262fc04b263de7937a5aceeac4a4d052c6192d9"], 0x1, 0x2) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='ext2\x00', 0x800, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) [ 959.765868][T17281] Unknown ioctl 1075883590 20:36:51 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8298074144bb34ba58bfa0"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x881, 0x0) sendfile(r7, r0, &(0x7f0000000400), 0x100000001) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="44000e0c", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 959.852350][T17281] Unknown ioctl 1075883590 [ 959.896239][T17281] Unknown ioctl 1075883590 [ 959.922592][T17281] Unknown ioctl 1075883590 [ 959.953177][T17281] Unknown ioctl 1075883590 [ 959.982987][T17281] Unknown ioctl 1075883590 [ 960.011915][T17281] Unknown ioctl 1075883590 [ 960.047249][T17281] Unknown ioctl 1075883590 20:36:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r0 = open(&(0x7f0000000040)='.\x00', 0x20a01, 0xa4) getdents64(r0, &(0x7f00000000c0)=""/79, 0xffa0) getrlimit(0x7, &(0x7f0000000000)) umount2(0x0, 0x0) [ 960.080034][T17281] Unknown ioctl 1075883590 [ 960.105433][T17281] Unknown ioctl 1075883590 [ 960.133095][T17281] Unknown ioctl 1075883590 [ 960.143080][T17550] devpts: called with bogus options [ 960.162873][T17281] Unknown ioctl 1075883590 [ 960.191703][T17281] Unknown ioctl 1075883590 20:36:52 executing program 2: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = geteuid() r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0)=0x0) r6 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r8, 0x0) r10 = getpgrp(0xffffffffffffffff) r11 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r13, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r14, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r11, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r12}}}, @rights={{0x20, 0x1, 0x1, [r13, r14, 0xffffffffffffffff, r6]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r10, r8, r9}}}], 0x78, 0xc0880}, 0x0) r15 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r18, 0x0) r20 = getpgrp(r17) r21 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r23 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r23, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r24 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r24, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r21, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r22}}}, @rights={{0x20, 0x1, 0x1, [r23, r24, 0xffffffffffffffff, r15]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r20, r18, r19}}}], 0x78, 0xc0880}, 0x0) r25 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r27, 0x0) r29 = getpgrp(0xffffffffffffffff) r30 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r32, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r33 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r33, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r30, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r31}}}, @rights={{0x20, 0x1, 0x1, [r32, r33, 0xffffffffffffffff, r25]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r29, r27, r28}}}], 0x78, 0xc0880}, 0x0) r34 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r35 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r36, 0x0) r38 = getpgrp(0xffffffffffffffff) r39 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r41 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r41, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r42 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r42, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r39, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r40}}}, @rights={{0x20, 0x1, 0x1, [r41, r42, 0xffffffffffffffff, r34]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r38, r36, r37}}}], 0x78, 0xc0880}, 0x0) r43 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r44, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r45, 0x0) r47 = getpgrp(0xffffffffffffffff) r48 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r50 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r50, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r51 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r51, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r48, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r49}}}, @rights={{0x20, 0x1, 0x1, [r50, r51, 0xffffffffffffffff, r43]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r47, r45, r46}}}], 0x78, 0xc0880}, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x2}, [{0x2, 0x7, r0}, {0x2, 0x5, r2}], {0x4, 0x1}, [{0x8, 0x4, r3}, {0x8, 0x4, r4}, {0x8, 0x4, r5}, {0x8, 0x2, r12}, {0x8, 0x4, r19}, {0x8, 0x1, r31}, {0x8, 0x0, r40}, {0x8, 0x0, r49}], {0x10, 0x2}, {0x20, 0x2}}, 0x74, 0x6) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 960.215138][T17281] Unknown ioctl 1075883590 [ 960.245033][T17281] Unknown ioctl 1075883590 [ 960.250113][T17281] Unknown ioctl 1075883590 20:36:52 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x101000) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000080)={0x389f}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 960.483570][T17281] Unknown ioctl 1075883590 20:36:52 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8298074144bb34ba58bfa0"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) r7 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0x881, 0x0) sendfile(r7, r0, &(0x7f0000000400), 0x100000001) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="44000e0c", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 960.515143][T17759] Unknown ioctl 1075883590 [ 960.572233][T17760] autofs4:pid:17760:autofs_fill_super: called with bogus options [ 960.587445][T17759] Unknown ioctl 1075883590 20:36:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) [ 960.623742][T17281] Unknown ioctl 1075883590 [ 960.826835][T17804] devpts: called with bogus options 20:36:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000fe9000/0x4000)=nil, 0x4000, 0x1000004, 0x10, r3, 0x9b929000) [ 960.907824][T17680] autofs4:pid:17680:autofs_fill_super: called with bogus options 20:36:52 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x79, 0x1, 0x6, "f2fdca1f6fb4c11225194c2ff51a5152", "65853125c4aa7a130033e1a40ab6ca8d6be77166823c9da399493559675d708cc58da8f88e015bbd7197da4a87e010c0e801e04918b863ee5bb672d3dcdabacec7eeeaeb50879a97ce08c5528c560778ed3ddb3b6d3d7711f892b96a4b8a493aee2d0d57"}, 0x79, 0x2) 20:36:53 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 961.156098][T17971] Unknown ioctl 1075883590 20:36:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff07000008000300000000000800050002000000080002000900000008000500050000004d115638f67667deead3306e69b51fbf57f829f794da2008137886f567e5806c6e0740a4b01c599f80fb20ecf5cf5496b448ae7e28df05c0529037daf51c65bbaef81c2a03f9fb2bb7f425a93ad7c7755f209f77c3501ad8012c1f5dfabf58ae82e9f5d78aa463386d9701a840b1be556988014d02107fb0aac1f40f8c2d9bdd5270324078269f25800c93e8c2ecf220f7b5"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r6, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x81c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x40000) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r11 = getpid() sched_setattr(r11, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r11, &(0x7f0000000340)={0x30, 0x6, 0x0, 0x0, 0x813b, 0x7, 0x1c000000000, 0x2}, 0x0) [ 961.195364][T17971] Unknown ioctl 1075883590 [ 961.243780][T17971] Unknown ioctl 1075883590 20:36:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000080)={0xb0, 0x7fff, 0x4, 0x6}, 0x8) getdents64(r3, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) [ 961.293033][T17971] Unknown ioctl 1075883590 [ 961.314951][T17971] Unknown ioctl 1075883590 [ 961.320017][T17971] Unknown ioctl 1075883590 [ 961.379844][T17971] Unknown ioctl 1075883590 [ 961.432182][T17971] Unknown ioctl 1075883590 [ 961.460869][T17971] Unknown ioctl 1075883590 [ 961.468861][T17997] devpts: called with bogus options [ 961.488135][T17971] Unknown ioctl 1075883590 [ 961.513352][T17971] Unknown ioctl 1075883590 [ 961.549965][T17971] Unknown ioctl 1075883590 [ 961.577168][T18129] devpts: called with bogus options 20:36:53 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x1a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) r2 = socket(0x1e, 0x4, 0x0) r3 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x100, 0x2) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r3, 0xc0305302, &(0x7f0000000100)={0x4000, 0x8, 0xff, 0x6, 0x800, 0xff}) r4 = getpid() sched_setattr(r4, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x4, 0x9, 0x8, 0x9, 0x0, 0x20704d61, 0x18042, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xffff, 0x5, @perf_config_ext={0x3, 0x2}, 0x4001, 0x6, 0x1, 0x9, 0x8000, 0x2, 0x2}, r4, 0xa, r5, 0x8) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r2, &(0x7f0000000a40), 0x800000000000028, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000040)='a\b\x00tofs', 0x201500e, 0x0) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x101002, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fcntl$dupfd(r6, 0x0, r7) r8 = syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SG_GET_LOW_DMA(r8, 0x227a, &(0x7f0000000080)) [ 961.604820][T17971] Unknown ioctl 1075883590 [ 961.628710][T17971] Unknown ioctl 1075883590 [ 961.636475][T17971] Unknown ioctl 1075883590 [ 961.662626][T17971] Unknown ioctl 1075883590 20:36:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x402f50161f1a1359, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet6_dccp_buf(r2, 0x21, 0x80, &(0x7f0000000140)=""/147, &(0x7f0000000000)=0x93) [ 961.692156][T17971] Unknown ioctl 1075883590 [ 961.724934][T17971] Unknown ioctl 1075883590 [ 961.749739][T17971] Unknown ioctl 1075883590 20:36:53 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 961.796517][T17971] Unknown ioctl 1075883590 [ 961.832146][T17971] Unknown ioctl 1075883590 [ 961.894942][T17971] Unknown ioctl 1075883590 20:36:53 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff07000008000300000000000800050002000000080002000900000008000500050000004d115638f67667deead3306e69b51fbf57f829f794da2008137886f567e5806c6e0740a4b01c599f80fb20ecf5cf5496b448ae7e28df05c0529037daf51c65bbaef81c2a03f9fb2bb7f425a93ad7c7755f209f77c3501ad8012c1f5dfabf58ae82e9f5d78aa463386d9701a840b1be556988014d02107fb0aac1f40f8c2d9bdd5270324078269f25800c93e8c2ecf220f7b5"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r6, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x81c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x40000) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r11 = getpid() sched_setattr(r11, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r11, &(0x7f0000000340)={0x30, 0x6, 0x0, 0x0, 0x813b, 0x7, 0x1c000000000, 0x2}, 0x0) [ 962.016681][T17971] Unknown ioctl 1075883590 [ 962.080096][T17971] Unknown ioctl 1075883590 [ 962.087118][T18467] devpts: called with bogus options [ 962.110506][T17971] Unknown ioctl 1075883590 [ 962.271685][T18600] devpts: called with bogus options 20:36:54 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:54 executing program 0: perf_event_open(&(0x7f0000000140)={0x3823adfaa13d746a, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xd41a0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:36:54 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x1, 0x4) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={r3, @in, 0xa9}, 0x90) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000040)={r3, @in6={{0xa, 0x4e23, 0x8000, @local, 0x81}}}, 0x84) 20:36:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x8000, 0x0) getsockopt$netrom_NETROM_T1(r4, 0x103, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$BLKBSZGET(r3, 0x80081270, &(0x7f0000000000)) 20:36:54 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000640)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff07000008000300000000000800050002000000080002000900000008000500050000004d115638f67667deead3306e69b51fbf57f829f794da2008137886f567e5806c6e0740a4b01c599f80fb20ecf5cf5496b448ae7e28df05c0529037daf51c65bbaef81c2a03f9fb2bb7f425a93ad7c7755f209f77c3501ad8012c1f5dfabf58ae82e9f5d78aa463386d9701a840b1be556988014d02107fb0aac1f40f8c2d9bdd5270324078269f25800c93e8c2ecf220f7b5"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r6, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x81c41}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x40000) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r11 = getpid() sched_setattr(r11, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) sched_setattr(r11, &(0x7f0000000340)={0x30, 0x6, 0x0, 0x0, 0x813b, 0x7, 0x1c000000000, 0x2}, 0x0) [ 962.562613][T18606] devpts: called with bogus options [ 962.607234][T18617] Unknown ioctl 1075883590 [ 962.682690][T18617] Unknown ioctl 1075883590 [ 962.719451][T18819] Unknown ioctl -2146954640 [ 962.753547][T18617] Unknown ioctl 1075883590 [ 962.789955][T18617] Unknown ioctl 1075883590 [ 962.848419][T18617] Unknown ioctl 1075883590 20:36:54 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = semget$private(0x0, 0x4, 0x20) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000000)=""/50) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 962.874917][T18617] Unknown ioctl 1075883590 [ 962.879916][T18617] Unknown ioctl 1075883590 20:36:54 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r5, @in, 0xa9}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r5, 0x5}, 0x8) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r6, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="44002aa3212dca8cbdff0000", @ANYRES16=r7, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:54 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') modify_ldt$read_default(0x2, 0xfffffffffffffffe, 0x0) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 963.014929][T18617] Unknown ioctl 1075883590 [ 963.097299][T18617] Unknown ioctl 1075883590 [ 963.122815][T18925] autofs4:pid:18925:autofs_fill_super: called with bogus options [ 963.133597][T18923] devpts: called with bogus options 20:36:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000180)=0x0) r5 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r7, 0x0) r9 = getpgrp(0xffffffffffffffff) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r12, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r13, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r10, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r11}}}, @rights={{0x20, 0x1, 0x1, [r12, r13, 0xffffffffffffffff, r5]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r9, r7, r8}}}], 0x78, 0xc0880}, 0x0) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x48032, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r11}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@smackfsdef={'smackfsdef', 0x3d, ',%'}}, {@permit_directio='permit_directio'}]}}) umount2(0x0, 0x0) [ 963.184887][T18617] Unknown ioctl 1075883590 [ 963.189966][T18617] Unknown ioctl 1075883590 [ 963.249867][T18617] Unknown ioctl 1075883590 [ 963.269851][T18617] Unknown ioctl 1075883590 [ 963.308530][T18617] Unknown ioctl 1075883590 20:36:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') modify_ldt$read_default(0x2, 0xfffffffffffffffe, 0x0) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 963.330883][T18935] devpts: called with bogus options [ 963.407224][T18617] Unknown ioctl 1075883590 [ 963.447612][T18617] Unknown ioctl 1075883590 20:36:55 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='nilfs2\x00', 0x40800, &(0x7f00000000c0)='+eth1em1trusted\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='f2fs\x00', 0x200000, 0x0) [ 963.484881][T18617] Unknown ioctl 1075883590 [ 963.593200][T19238] devpts: called with bogus options [ 963.610589][T18617] Unknown ioctl -2146954640 20:36:55 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r5, @in, 0xa9}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r5, 0x5}, 0x8) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r6, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="44002aa3212dca8cbdff0000", @ANYRES16=r7, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00()\x91\xc9\xcb\x9b\xd8\xddb/\x9e\xb1\xa8 j\xda\xb6\xb8E\xbb<\v5\"\x89\"\xe3g\xe5\xd4\xc9\xe9\xfd\n\xff:\xbe\x06~\xed\xb4f\x99\xff\xff\xff\x7f\x00\x00\x00\x00\xd2\xc1\x1bu\x90#\xac\x84\xe6\x1bA\xb3\x95(\x18\xff\xcb@\xce\xe3\xf9\x1e\x9f\xb5\x17\x9c\xd51iO\x13\x8cz\x10\xf4\xb8\xadJ!\xc37\xa0\xe3E\f\x8fDF\xef\x97\x04\x99j\xd7\x89\xfe\xa8\xbcU\xe5i2\xb8\xa0\xedK\xe4\xc3_{k\xc0\xa5s+\xe4\xc9=\xf9I\xe3U\xd3\x9e;\x91\xc9\xdd\xcb&Q\xd7%\xc3g\xc9\xd4q\x1c\xf4\x9d\xd3U{\xf2\xe5\x95\x8c<\x1f*\x1f\xec~\xdf\xfb\xe3\xd1&l\xc2\xd8\xa5\x02\x93\xa5b\xf3&\xb19a\xa1t\xb3\x176\x1e\xff\xe2\x1c\x00\\O\xb6\xfdK\aj\xc4f\xdd\xe5\x85\xc0m\xb5\x98\xf6\x90j\\U)\x18\xccfPG\xd2)\x1aHL2\'b\xf69\xe9\xd1C\x9bZ\x89cw%\xf4l\xd9\x10\xcbv\x8bw\x8f\x8d\xc1<\x03\xd3\xe6\xe67\xad_\x9d\xaf\x13\am\x96\x91\x96\x14\xcd\x02-\x89\x81&\xa6\n\x1d\xb1\x15\xe5S\xef?\xbd,z\x19\xbf!\xd6\xfa\xbd\r\xf6\xd8\x18Q\xba\xa9\vU^\x89\xb7o\xf7S\xde$\x8emd\xde,\xabI3\t\x90\xa7\x95\xad\x93\xbe*\xf7n\bg?\xdfw\r\x00\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) 20:36:55 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') modify_ldt$read_default(0x2, 0xfffffffffffffffe, 0x0) r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 963.978591][T19265] devpts: called with bogus options 20:36:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x39c02e243e1af4a3) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getpeername(r0, &(0x7f0000000040)=@caif=@rfm, &(0x7f00000000c0)=0x80) [ 964.158217][T19406] devpts: called with bogus options [ 964.195245][T19462] Unknown ioctl 1075883590 [ 964.200376][T19462] Unknown ioctl 1075883590 20:36:56 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r5, @in, 0xa9}, 0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000340)={r5, 0x5}, 0x8) r6 = socket(0x400000000000010, 0x802, 0x0) write(r6, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r6, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="44002aa3212dca8cbdff0000", @ANYRES16=r7, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r8, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r10, &(0x7f0000000340), 0x41395527) vmsplice(r9, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r11, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r11, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 964.286614][T19462] Unknown ioctl 1075883590 [ 964.313948][T19462] Unknown ioctl 1075883590 [ 964.347116][T19466] autofs4:pid:19466:autofs_fill_super: called with bogus options [ 964.359601][T19462] Unknown ioctl 1075883590 20:36:56 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0xa, 0x800, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x165801) ioctl$LOOP_SET_STATUS64(r9, 0x127f, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000400)={0xe8bffff, 0x7, 0x5, [], &(0x7f0000000340)={0x980918, 0x1, [], @value64=0x2ce}}) 20:36:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0xffff8dec, 0x0, 0x0, 0xce35}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x2}, 0x10) fchdir(r0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) [ 964.412823][T19462] Unknown ioctl 1075883590 [ 964.450530][T19462] Unknown ioctl 1075883590 [ 964.504991][T19462] Unknown ioctl 1075883590 [ 964.534118][T19495] devpts: called with bogus options [ 964.551157][T19462] Unknown ioctl 1075883590 [ 964.586755][T19462] Unknown ioctl 1075883590 [ 964.610409][T19462] Unknown ioctl 1075883590 [ 964.647350][T19462] Unknown ioctl 1075883590 [ 964.676058][T19462] Unknown ioctl 1075883590 [ 964.687002][T19579] devpts: called with bogus options [ 964.715340][T19462] Unknown ioctl 1075883590 20:36:56 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x4000b00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 964.737307][T19462] Unknown ioctl 1075883590 [ 964.757190][T19462] Unknown ioctl 1075883590 20:36:56 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 964.813122][T19462] Unknown ioctl 1075883590 [ 964.845208][T19462] Unknown ioctl 1075883590 20:36:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) fchdir(r0) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) [ 964.904951][T19462] Unknown ioctl 1075883590 [ 964.909932][T19462] Unknown ioctl 1075883590 20:36:56 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0xa, 0x800, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x165801) ioctl$LOOP_SET_STATUS64(r9, 0x127f, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000400)={0xe8bffff, 0x7, 0x5, [], &(0x7f0000000340)={0x980918, 0x1, [], @value64=0x2ce}}) [ 964.991358][T19686] autofs4:pid:19686:autofs_fill_super: called with bogus options [ 965.025006][T19462] Unknown ioctl 1075883590 [ 965.030012][T19462] Unknown ioctl 1075883590 [ 965.153464][T19691] devpts: called with bogus options 20:36:57 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) acct(0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 965.326397][T19808] devpts: called with bogus options 20:36:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000100)={r6, 0x1, 0x1, 0x5, 0x6, 0x6}, &(0x7f0000000180)=0x14) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:36:57 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) 20:36:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000000)={&(0x7f0000000140)=""/250, 0x12000, 0x400, 0x70000}, 0x18) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:36:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0xa, 0x800, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r9 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x165801) ioctl$LOOP_SET_STATUS64(r9, 0x127f, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000400)={0xe8bffff, 0x7, 0x5, [], &(0x7f0000000340)={0x980918, 0x1, [], @value64=0x2ce}}) [ 965.631056][T19915] devpts: called with bogus options [ 965.653156][T19919] autofs4:pid:19919:autofs_fill_super: called with bogus options [ 965.754518][T19963] Unknown ioctl 1075883590 [ 965.761023][T19963] Unknown ioctl 1075883590 20:36:57 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 965.810631][T19963] Unknown ioctl 1075883590 [ 965.838462][T19963] Unknown ioctl 1075883590 [ 965.867113][T19963] Unknown ioctl 1075883590 [ 965.899013][T19963] Unknown ioctl 1075883590 [ 965.910179][T20084] devpts: called with bogus options [ 965.924929][T19963] Unknown ioctl 1075883590 [ 965.929917][T19963] Unknown ioctl 1075883590 20:36:57 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000280)='./file0\x00') syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x6, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="f7dc5a7dc966bcaa97fd649ae4bc98d955ad6acfedfb9fa1d6139f186dde9cc8ba01b634e609a6539fbbc237c5fbd78d5a8915f200b3a2051aa6caf27d012b9cd9ac50f823efc1b54a42a78a5f37bf43802732921e6ec6bb3887ea1430d60aa0a2b1235a89b614a8d2b86fc20b382761a783cb", 0x73, 0x101}, {&(0x7f0000000100)="678ccfb14163a314c952e550c632fb9e5a56b15c0eb2e9af19ceaf0f0aa963810642e4481a112167e9d6e51768e270e1ecd91878f59aa7b815b9b2ac8781e31ecb2a159d4f6c04bac78c0d9ab1dc51f64e6b2cb88704b163601adbbf61b748edd96808e6eb19d079d0cfdc1c", 0x6c, 0x1ff}], 0x8450, &(0x7f00000001c0)={[{@umask={'umask', 0x3d, 0x6}}, {@integrity='integrity'}, {@grpquota='grpquota'}, {@nointegrity='nointegrity'}, {@uid={'uid', 0x3d, 0xee01}}, {@discard='discard'}, {@errors_continue='errors=continue'}, {@discard='discard'}, {@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'autofs\x00'}}]}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x48002, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={0x0, r0, 0xc}, 0x10) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x10, 0x0) [ 965.983120][T19963] Unknown ioctl 1075883590 20:36:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) write$sndseq(r1, &(0x7f0000000240)=[{0x6c, 0x1, 0xaa, 0x5, @tick=0x8, {0xcc, 0x10}, {0x72, 0x20}, @ext={0xe2, &(0x7f0000000140)="032f1f60ae8a8b014e629835a78fc956dc2453973930b3a1e14f40ec4cc3d11fb192b3dfe5aba0471745860afa67ae2093e592184cfda913d9f7a1d5f62367494f05dfdd1c8f7a7241dea61e7390b9806bd908037216322a4f0d293acead0f05e353afa7a6a4b9ba8aab29288b3f2e81ca9cb44c4897c5d4f53c2b90e2ed0491ce81063ea913ce97d38f5dadc68fcba5ff92e2eccb8c550e509710900120c2015c7049a70aa2c791572f12577393820fb26871c42fceb981627c7f9c46f0d7758e1f5da48c1c8b5a628272b84a1b2513a6f62357c52d314f3b46835c92ba40ca696d"}}, {0x3f, 0x3, 0x80, 0x0, @time, {0x9b, 0x4}, {0x0, 0x5}, @addr={0x2, 0x4}}], 0x60) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f0000001580)=""/67, 0x43) r3 = shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmdt(r3) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x800c6613, &(0x7f0000000400)=@v1={0x0, @aes256, 0x3, "81573a162c71588d"}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000000)={r6, @in, 0xa9}, 0x90) ioctl$sock_TIOCOUTQ(r5, 0x5411, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000002c0)={r6, @in={{0x2, 0x4e21, @rand_addr=0x401}}, 0x4, 0x4, 0x6, 0x7, 0x4}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000540)={r8, 0x1000, "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"}, &(0x7f0000000080)=0x1008) umount2(0x0, 0x0) [ 966.010704][T20138] devpts: called with bogus options [ 966.025015][T19963] Unknown ioctl 1075883590 [ 966.030202][T19963] Unknown ioctl 1075883590 [ 966.074985][T19963] Unknown ioctl 1075883590 [ 966.104949][T19963] Unknown ioctl 1075883590 20:36:58 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 966.137278][T19963] Unknown ioctl 1075883590 [ 966.147251][T19963] Unknown ioctl 1075883590 [ 966.174063][T19963] Unknown ioctl 1075883590 [ 966.206236][T19963] Unknown ioctl 1075883590 20:36:58 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 966.242109][T19963] Unknown ioctl 1075883590 [ 966.259053][T19963] Unknown ioctl 1075883590 [ 966.276255][T19963] Unknown ioctl 1075883590 [ 966.315361][T19963] Unknown ioctl 1075883590 [ 966.336981][T19963] Unknown ioctl 1075883590 [ 966.384958][T19963] Unknown ioctl 1075883590 [ 966.477142][T20395] devpts: called with bogus options 20:36:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept$ax25(r1, &(0x7f0000000140)={{0x3, @rose}, [@null, @netrom, @remote, @null, @default, @remote, @remote, @default]}, &(0x7f0000000080)=0x48) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:36:58 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = userfaultfd(0x80800) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000)="20b22a8b188d705ec722146ce55e6d9d0e6eed0a0c584ef011c25ffa9ba075c4ee3d230d068b1d58639e447a01c02ecb1fb30570ff695af90474ff6d384e3e441e5e152f3bc5c93524f654a51b70faf6dede", 0x52, r0}, 0x68) 20:36:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x80a00) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0xd, &(0x7f00000001c0)=0x0) r6 = socket$vsock_stream(0x28, 0x1, 0x0) io_submit(r5, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000200)="05", 0x1}]) io_submit(r5, 0x2000019e, &(0x7f0000000080)) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) io_submit(r5, 0x1, &(0x7f00000000c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x8000, r2, &(0x7f0000000180)="b2b63a9c4869c2752ab2dc792541fc0ca2c7345c037ade091f80a446791e4697f0d3d6010bb63ecefb99e2ca3e6b6da9a740fcd08082a886fdfbf5d59d3e4f5ec8e2fb577e5d08d3cb386ec912a3114f72ca6fca8fa97a2df16415f8c7cf06286c116f150ca2eabd3909c700758bb84a12130106ca9f1475b2c0b56c590a3695d00ba168a5fef2fbf3f434c56bef8d1702caaf7ef00dbff641cd1e5616b0cca34d5af4a031b94662ebccad3a3b75bbb9d0ffc40e5a63c4b6fd8310b22e4399354b63a897e29e6a3ba9d38bfa531afdd12038", 0xd2, 0xd15, 0x0, 0x2efcf1feef8358ef, r7}]) [ 966.640923][T20456] devpts: called with bogus options 20:36:58 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) 20:36:58 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 966.825157][T20534] autofs4:pid:20534:autofs_fill_super: called with bogus options [ 966.916492][T20568] Unknown ioctl 1075883590 [ 966.935193][T20569] devpts: called with bogus options 20:36:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 966.962223][T20568] Unknown ioctl 1075883590 [ 967.005093][T20568] Unknown ioctl 1075883590 [ 967.025153][T20568] Unknown ioctl 1075883590 20:36:59 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x40, &(0x7f0000000080)={0x3, 0x87, 0x8001, 0x4d4b6adb, 0x28d, 0x6, 0x8, 0x7}, &(0x7f00000000c0)={0x9, 0x1, 0x7, 0x1, 0x6, 0x6, 0x25, 0x2}, &(0x7f0000000100)={0x3630, 0x7fff, 0x7ff, 0x6, 0x7, 0x9, 0x8, 0x3}, &(0x7f0000000140)={0x77359400}, &(0x7f00000001c0)={&(0x7f0000000180)={0x1}, 0x8}) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 967.054820][T20568] Unknown ioctl 1075883590 [ 967.071589][T20568] Unknown ioctl 1075883590 20:36:59 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 967.105055][T20568] Unknown ioctl 1075883590 [ 967.124518][T20568] Unknown ioctl 1075883590 [ 967.134915][T20568] Unknown ioctl 1075883590 [ 967.141189][T20677] devpts: called with bogus options [ 967.150376][T20679] devpts: called with bogus options [ 967.195244][T20568] Unknown ioctl 1075883590 [ 967.219412][T20568] Unknown ioctl 1075883590 [ 967.275168][T20568] Unknown ioctl 1075883590 [ 967.280968][T20808] autofs4:pid:20808:autofs_fill_super: called with bogus options 20:36:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 967.324938][T20568] Unknown ioctl 1075883590 [ 967.335131][T20568] Unknown ioctl 1075883590 [ 967.364934][T20568] Unknown ioctl 1075883590 [ 967.369980][T20568] Unknown ioctl 1075883590 20:36:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) [ 967.391509][T20568] Unknown ioctl 1075883590 [ 967.414965][T20568] Unknown ioctl 1075883590 [ 967.425078][T20568] Unknown ioctl 1075883590 [ 967.448961][T20568] Unknown ioctl 1075883590 [ 967.456356][T20904] devpts: called with bogus options [ 967.484954][T20568] Unknown ioctl 1075883590 [ 967.505886][T20568] Unknown ioctl 1075883590 [ 967.525110][T20568] Unknown ioctl 1075883590 [ 967.541586][T21018] devpts: called with bogus options [ 967.546074][T20568] Unknown ioctl 1075883590 20:36:59 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) socket$inet6(0xa, 0xa, 0x5) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 967.565983][T20568] Unknown ioctl 1075883590 [ 967.643283][T21062] devpts: called with bogus options 20:36:59 executing program 5: r0 = semget$private(0x0, 0x1, 0x200) semctl$GETPID(r0, 0x5, 0xb, &(0x7f0000000180)=""/237) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x7f}, {0x1, 0x4812, 0x1000}, {0x0, 0xf880, 0x800}, {0x2, 0x1f, 0x1000}, {0x4, 0xdf6e, 0x800}, {0x4, 0x3ff, 0x800}, {0x3, 0x3, 0x800}, {0x1, 0x8001}, {0x3, 0x4, 0x1000}], 0x9, &(0x7f00000000c0)={0x77359400}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000000)=0x3, 0x2) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x8712e31ca370b2b0, 0x0, 0x0) r6 = semget(0x1, 0x0, 0x31) semctl$IPC_RMID(r6, 0x0, 0x0) [ 967.680233][T20568] Unknown ioctl 1075883590 [ 967.723105][T20568] Unknown ioctl 1075883590 20:36:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e02bf7eed9b2d4532104da05595a009946ecf244700074d7fe4c557a09e6834d52cbd999fd7862b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0e04d77c10e21a4df6efef01800cee17ec40280b9ae6e9c34411fd78e98e17d91a1c589b277cb6467cd0a5775cfa4f1eeaea55db9b853b58a8831c19b527f88cb3961d17c624430ae253ebf71165d2cc963dccb50613ea9d31ca9a0d935fa2046c90a7173d0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) socket$vsock_dgram(0x28, 0x2, 0x0) 20:36:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd99b8d786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc828707dcbc084ea500a10f826f432fff00000000000000ed6644e982d10000000000000000fadb3004269cb89a59b9658972c6b161d913e99db2959a28e43aca6771a46323292fa600a240064a0675b44fd84afe45bf0691ad507f461c598f701ed86a8a769eb3128297fc4aab03a67e2439b3463e3a52ef7bc02e0992b62d03dbe98a3687eb99b1ab116f3d883c7b381cbfe95140b662219dafd834f2e2c97623de39805871aff1aa59dd731b279fe84127bbb43913ba6744aeb58c766d36c42c415abe6d7754447e3f7f6648b1be65d6be85518a5fb899d1f2e74ce9f723399f5d6906ead0d016513b34e9a364ef3d62043e7e8dc3"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:36:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x40000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) 20:36:59 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0xf9, 0x7) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 968.112478][T21252] devpts: called with bogus options [ 968.172294][T21340] devpts: called with bogus options [ 968.201814][T21364] Unknown ioctl 1075883590 [ 968.214970][T21364] Unknown ioctl 1075883590 [ 968.220009][T21364] Unknown ioctl 1075883590 20:37:00 executing program 5: r0 = semget$private(0x0, 0x1, 0x200) semctl$GETPID(r0, 0x5, 0xb, &(0x7f0000000180)=""/237) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x7f}, {0x1, 0x4812, 0x1000}, {0x0, 0xf880, 0x800}, {0x2, 0x1f, 0x1000}, {0x4, 0xdf6e, 0x800}, {0x4, 0x3ff, 0x800}, {0x3, 0x3, 0x800}, {0x1, 0x8001}, {0x3, 0x4, 0x1000}], 0x9, &(0x7f00000000c0)={0x77359400}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000000)=0x3, 0x2) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x8712e31ca370b2b0, 0x0, 0x0) r6 = semget(0x1, 0x0, 0x31) semctl$IPC_RMID(r6, 0x0, 0x0) [ 968.264968][T21364] Unknown ioctl 1075883590 [ 968.276676][T21368] autofs4:pid:21368:autofs_fill_super: called with bogus options [ 968.288040][T21364] Unknown ioctl 1075883590 20:37:00 executing program 0: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000140)={0x1, 0x2, 0x1000, 0x34, &(0x7f0000000080)="b90d35814d812f83b7c9be63743402c85a9181e84aec7f1a9366eed6436494b04d209ceaaf713ecc193e4b37b4fd5e693442db4f", 0x41, 0x0, &(0x7f00000000c0)="6cf6415c79406ddeed27249429fe66d707385bc1c25b2117f1909db4792e6493bcb1ec4532bf85d4a73b293be7bfa2c71e74c8dd89765df77dbb14d80f5a4050a2"}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x1, 0x2) write$smack_current(r2, &(0x7f0000000200)='\x00', 0x1) execve(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000280)='/dev/full\x00', &(0x7f0000000300)='/dev/full\x00', &(0x7f0000000340)='/dev/full\x00', &(0x7f0000000380)='-@\x00'], &(0x7f00000004c0)=[&(0x7f0000000400)='\'\x00', &(0x7f0000000440)='\xe8bdev\x00', &(0x7f0000000480)='$)vboxnet0\\$vmnet1!4\x00']) setsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000040)=[{{0x0, 0x1, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x1, 0x0, 0x0, 0x1}, {0x200002, 0x0, 0x1}}], 0x10) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:00 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd99b8d786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc828707dcbc084ea500a10f826f432fff00000000000000ed6644e982d10000000000000000fadb3004269cb89a59b9658972c6b161d913e99db2959a28e43aca6771a46323292fa600a240064a0675b44fd84afe45bf0691ad507f461c598f701ed86a8a769eb3128297fc4aab03a67e2439b3463e3a52ef7bc02e0992b62d03dbe98a3687eb99b1ab116f3d883c7b381cbfe95140b662219dafd834f2e2c97623de39805871aff1aa59dd731b279fe84127bbb43913ba6744aeb58c766d36c42c415abe6d7754447e3f7f6648b1be65d6be85518a5fb899d1f2e74ce9f723399f5d6906ead0d016513b34e9a364ef3d62043e7e8dc3"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 968.315172][T21364] Unknown ioctl 1075883590 [ 968.332693][T21364] Unknown ioctl 1075883590 [ 968.384957][T21364] Unknown ioctl 1075883590 [ 968.406079][T21364] Unknown ioctl 1075883590 [ 968.430213][T21364] Unknown ioctl 1075883590 20:37:00 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="efed9341e885989527f4de460ee68f91113d3c774235d3", 0x17}], 0x1, 0x10) pipe(&(0x7f0000000340)={0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000300)={0x0, 0xa6471f8a0836cc5d, r1}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000180)={'nat\x00', 0x0, 0x3, 0xb2, [], 0x5, &(0x7f0000000040)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)=""/178}, &(0x7f0000000200)=0x78) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$sock_rose_SIOCADDRT(r3, 0x890b, &(0x7f0000000400)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xef, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x0, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 968.458692][T21364] Unknown ioctl 1075883590 [ 968.499279][T21364] Unknown ioctl 1075883590 [ 968.517664][T21364] Unknown ioctl 1075883590 [ 968.544992][T21364] Unknown ioctl 1075883590 [ 968.558322][T21588] devpts: called with bogus options [ 968.570352][T21364] Unknown ioctl 1075883590 20:37:00 executing program 5: r0 = semget$private(0x0, 0x1, 0x200) semctl$GETPID(r0, 0x5, 0xb, &(0x7f0000000180)=""/237) semtimedop(r0, &(0x7f0000000080)=[{0x3, 0x7f}, {0x1, 0x4812, 0x1000}, {0x0, 0xf880, 0x800}, {0x2, 0x1f, 0x1000}, {0x4, 0xdf6e, 0x800}, {0x4, 0x3ff, 0x800}, {0x3, 0x3, 0x800}, {0x1, 0x8001}, {0x3, 0x4, 0x1000}], 0x9, &(0x7f00000000c0)={0x77359400}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000000)=0x3, 0x2) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x8712e31ca370b2b0, 0x0, 0x0) r6 = semget(0x1, 0x0, 0x31) semctl$IPC_RMID(r6, 0x0, 0x0) [ 968.600252][T21364] Unknown ioctl 1075883590 [ 968.613383][T21589] autofs4:pid:21589:autofs_fill_super: called with bogus options [ 968.627513][T21364] Unknown ioctl 1075883590 [ 968.657654][T21364] Unknown ioctl 1075883590 [ 968.675405][T21364] Unknown ioctl 1075883590 20:37:00 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 968.697944][T21364] Unknown ioctl 1075883590 [ 968.741251][T21364] Unknown ioctl 1075883590 [ 968.779570][T21364] Unknown ioctl 1075883590 [ 968.791919][T21364] Unknown ioctl 1075883590 [ 968.810021][T21364] Unknown ioctl 1075883590 [ 968.830747][T21364] Unknown ioctl 1075883590 20:37:00 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2001c03}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0xa08b55f814e745fc, 0x0, 0x25dfdbfe}, 0xffffffffffffff44}, 0x1, 0x0, 0x0, 0x40844}, 0x20016) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 968.880731][T21700] devpts: called with bogus options [ 969.059744][T21806] devpts: called with bogus options 20:37:01 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d80)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000e80)=0xe8) lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001040)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001140)=0xe8) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000001180)={{{@in6=@ipv4, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000001280)=0xe8) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r6, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000012c0)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@empty}}, &(0x7f00000013c0)=0xe8) getresgid(&(0x7f0000001400)=0x0, &(0x7f0000001440), &(0x7f0000001480)) r9 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r11, 0x0) r13 = getpgrp(0xffffffffffffffff) r14 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r16 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r16, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r17 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r17, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r14, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r15}}}, @rights={{0x20, 0x1, 0x1, [r16, r17, 0xffffffffffffffff, r9]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r13, r11, r12}}}], 0x78, 0xc0880}, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='system.posix_acl_default\x00', &(0x7f00000014c0)={{}, {0x1, 0x4}, [{0x2, 0x3, r0}, {0x2, 0x2b56e0336a4abf11, r1}, {0x2, 0x4, r2}, {0x2, 0x1, r3}, {0x2, 0xf, r5}, {0x2, 0x1, r7}], {0x4, 0x2}, [{0x8, 0x0, r8}, {0x8, 0x1, r12}], {}, {0x20, 0x2}}, 0x64, 0x1) r18 = socket$nl_generic(0x10, 0x3, 0x10) r19 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r18, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001540)={0x14, r19, 0x4}, 0x14}}, 0x0) r20 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') r21 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r21, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r22, 0x407, 0x0) write(r22, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$DRM_IOCTL_IRQ_BUSID(r22, 0xc0106403, &(0x7f0000000b40)={0x400, 0x401, 0x1ff, 0x80}) r23 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r23, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) sendmmsg$sock(r21, &(0x7f0000000c00)=[{{&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r23, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4, 0x1, 0x3}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000200)="8ceea9ebe0166e76ca190e6539b31922d5e7069e4da6bc73ae2a33de5606d00cecbdd745a9dddf585d83d797dbd3657e0b8bb96a41c5aeba9d01c39220cdeee2b930970b05382249d867c8f11bcdc2dafb35fbf15eceeeb5d3caf6a97ccc89110ff2af41e0de32fdedefb9a51eccadca8f050a01f6bad48beab1cd84784f1e62dc5d61e55a52ed76793a06ab89e73b43d3f0219ee76812bde31a2ec7b4be07", 0x9f}], 0x1, &(0x7f0000000380)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000003c0)="01c3e2eba1f911b58379b8063fce9be3ec812a93a1fb161706381e396030a7a0bea4c017094ec488c4c74a68cf20a55ca44a19f74ffdd3584565353dd30ad34fee42c65560ee542151f10b880b7a9e522ebf8815649100987e9c9a37dfdda76c7e7b4d0735a9156fa41154738e9eadec06e42d3934ed7f47bdd3e87f2a44931c0627077f4c975422ae7e1726b8bebcffb23aaa33eb49c0ef3205069800c0c5ce4c7be49e64a5a6524db3fa3963b7a7233aaca7e41eb7a6451e045a1b", 0xbc}, {&(0x7f0000000480)="26afaae36582916a9b8e0a8a4bd5b34e67c1d4e7b35e1be54dd35ef2940d0d2a497295b3c6e11cab07dac55ab1893e2014a3827c9a8c939cef3f13f706decb1eae171d0822876cef2851b2f09f76b4f43be248c66824c6ea4602", 0x5a}, {&(0x7f0000000540)="b18c2c1449b47c71", 0x8}, {&(0x7f0000000580)="1e6325a23b4ddc1f179a779ac12732d9359a827d9dc2ace02a7159398f37e8f13e8b99c5e6fab227b9b5190a6f4524f17f29cf91bbf5d47ac7da1ba263f50d841a93d3ba1fb4477b68fb1d4f8b974443cb62202c049bbad082dd358831181f55119ca866d58c0df235367573fe26dd63dc5e4351d8409070ef6cf0576526bf209d0b510b3c91b2bcb4e9eb08d3485085bdc0c37d1447c8f05b", 0x99}], 0x4, &(0x7f0000000680)=[@timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0x3f}}], 0x30}}, {{&(0x7f00000006c0)=@ax25={{0x3, @bcast, 0x4}, [@bcast, @null, @default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast]}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000740)="fb8efbf3589f2ef838544ee45eec22e32a239ec1797a5aedd77e7db1957ef16bddf4e7c1fc8748eb38292dfbd1c94ccd5a4f9fe0581bd2c1e8acd8cb7326bda51a8d3492d535057b32ac90dad3debbec0cd99edc41f9650753dd4a8be2c6194148586598cb89619e320e99544c2d4d155de36bcda6cc6e287d9704ab6857da74f8e2d6d18990b8674904ae445f0b258b53b10d1b4f5be73a0cbb3558da5ccc0792ac88fc25401675ccf62c", 0xab}, {&(0x7f0000000800)="789b76d1e53adf5f5de177fccad4ed7afeb5ce69cb5c52dee39eaef506bbf727579f39a688ea1a381f3b3036f23e7d5dbf29ce14370cb2f5b5f63f6997b67c6a04c321ea11ddcae2ca4388fe3ce33991eae9c6920d20ccdf6c425c7774cbbc2eb78fb00226fcb41d6e7a741cf2b38a043e6f97255c0178219d959a7f629b693bc30f6f380fb6a756aef8961c8eaf8c3c64dbd7e59a7494a6839495d06036e6597490030d22429f007e7710e57372f77ee695b1668b271b610e0889cf77d71e7fb559553f5e4463ea3879bb3b3121c13b559ec74e83e2819a07507143002972529ddcbed9ea875db5a4021b", 0xeb}, {&(0x7f0000000900)="a4f82a88b0f5ec5af76f7281b1a67c5d8ab4916789104a4ba8056b88cf068663bf202a04343bb7e0ec061813fb816c10f9defa28855f25c030cda6beba5058fbc97b41eb72f4c53d3195a01b597fc28a82c028214afb19d2c68377922cc89bafd6d17ba06b87bf9debbc1700b8fcfc62c09d6d492c176b4eb13cced932b4dd9a8bddccc3e0bb3eb8af71d257657cef3b0310c2ff331539a4c9687cdaf31c0e4e586e88c5a122", 0xa6}, {&(0x7f00000009c0)="e3b7a4b42dbecb77c784dfc33ff3bde223c850d57543ceff42046f1fff017ae1cef8b6cb5fcad15e196210b94f2804a2754fe58707800d550fea934e3c005acbacd671a2e83603ea0d09afed662fdbfd545ceffd490e73502ff7b86af36cbfbc6230d7ae", 0x64}], 0x4}}, {{&(0x7f0000000a80)=@in={0x2, 0x4e22, @multicast2}, 0x80, &(0x7f0000000b40), 0x0, &(0x7f0000000b80)=[@txtime={{0x18, 0x1, 0x3d, 0x401}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x30d6}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x3e0}}], 0x78}}], 0x4, 0x81) sendmsg$DEVLINK_CMD_PORT_SET(r18, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="acb243d4", @ANYRES16=r20, @ANYBLOB="100028bd7000fbdbdf2506000000100001006e657464657673696d000000100002006e657464657673696d30000008000300030000000800040000000000080001007063690014000200303030303a30303a31302e300000000008000300030000000800040002000000"], 0x70}}, 0x80000) 20:37:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x6, 0x3, 0x9, 0xc8f7, 0xfffffffffffff9d4, 0x1, 0xc, 0x14}}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:37:01 executing program 2: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) r1 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @default}, [@null, @bcast, @null, @null, @bcast, @rose, @netrom, @default]}, &(0x7f00000000c0)=0x48, 0x40c00) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000440)=0x0) r3 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r5, 0x0) r7 = getpgrp(0xffffffffffffffff) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r10, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r11, 0x541e, &(0x7f0000000100)={0x0, 0x0}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r12, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_G_AUDOUT(r12, 0x80345631, &(0x7f00000004c0)) sendmsg$netlink(r8, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32, @ANYRES32=r9, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r10, @ANYRES32=r11, @ANYRES32, @ANYRES32=r3, @ANYBLOB="970000d19ec61663920c0d000033b893373f00000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0xc0880}, 0x0) lchown(&(0x7f0000000400)='./file0\x00', r2, r9) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000100)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x1, 0x1, 0x0, {0xa, 0x4e21, 0x3ff, @mcast1, 0x6}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)="0fccaf4d26ac043a39ffd159760937aaec383827a9998ddbe5f4903046", 0x1d}, {&(0x7f00000001c0)="f2b27a614da8411c760cb58f8379840d27c2950047c9f2ca2b3aa14fbe39aa73dd0e5fb638078e36479070b72302ba1e954f83122c2124d98accdd3cb74a07863f86d300057c205fee61df8dfbb54d77fa717d86890a78b1184fa03877bebc58c286efc3a60c8ea5afe321e97b8f2dbb5d0a08496c7479458b4f7cc3a3f808663448613a830ac3d70a9a78cf43f34907eae804568649cac1a754854fa77e431da9968423a3bf", 0xa6}, {&(0x7f0000000300)="c04e28c0e6ba4bffe28064113917e053119c88781c543ba9e1152822ad9e6af114cc7fb79ca50c310ff91c55fd63ee77025b3f1e00b918ab58382ad86719f12e59b2b01cad3e666e4f1a9de942d1b20a75e73d2fd891dfab65bcb162a44645db7a5ca98901e0bffef632a2af233e4e2fade3709e7c4fabbb729a7117f817f82c3ef95944a07440cefe24409fc53d789558a68739d392d97a2c91bd958002642de2d97ed1f2b43e7491f69d1d06457f72ca05ffd0", 0xb4}], 0x3, &(0x7f0000000b40)=[{0x3f6, 0x11, 0x0, "38ada2f0ba84b3dd08da01a5fc7ea37bffbc"}, {0x1010, 0x149bc1fc9aafe1ff, 0x1, "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"}, {0x18, 0x107, 0x80000000, "76e70e76"}, {0xf8, 0x29, 0xffffffff, "a44895291185363c8a170ff6946ade53500fed05689b934ade1786704cc49673ae6df51e3f03a030b1fff6ff2f123633c7757d1b2c1a431145313108e86b5b8eccbce97685496ae8dadbd57c1db24e4dff2b8a3e9888d9e23dc16a21363b2cd06a2fecb260c11b6af5f9966eaa06431ae486ed1c80d9475a7acc22011b8892dd96553f47951d2ed0fe646c770a80d9cbb50deed4ff8db3ca8ff5e442d4ce4066979f2eecc1085d2cdd6802d3b1c67d18c62372fbf3e9c9b48d4482003a742406c8d7162a1ab32b7857374664a3b7176dc1adb0096779787704af5a1d168cc72da6eb21c5724031"}, {0x70, 0x0, 0x0, "40c43fc3db219fa1afb254665c6f6c7190d547ee95c4d0dc2316a19a53e0b92587ec4c98c1ba0e38c95e7bbde1619647088659898883ee92ef5c24b42e40c3390d8304984da3a43936ca51c7aea6a525b8927f4623df50896d805725e0672508"}, {0xf8, 0x100, 0x1, "ce62711a52bd05b92be919b531d7e57cf07e2ae6e4e19eeaf7270097760b2284460eac2f23cfecac62bce063e0b121d9ba1373addf2a82cec56da1d94eea29173f4331359ef3b10db08db391f4c2566bfd5d1d1db8a6f2ec2154b2d73d5fdbacbb09508caf5123c3d6111dd7eae9c999ad62a5641b5917fbea7145f3a733f76f46f978b4003bccc379f6cb7026c054e5a5c9f1ba03813b0c26671c79f50f3083c16510ec34f7a695055e5970f11af501851bf8676e662bff2badcf320defaf83c43ef97f460cddf2f9eaaa8e1a35144f9626e04387f60ccaaf9e08d05071700c2c7760"}, {0x100, 0x103, 0x6, "30b38975cb248eb39c6cd74f2635689189f1293eca29fc4e19ddf5328140df99d63ec222b380085726a04c75c8303ca124aa12632d98db0220a18b28d9ff8e753b35ba79d521ac3ffb07ef74021194e8998c3449df309756b0cc38ad487cafcb07db668c425cbfdc8c39e792ca75fb16f99197cec84c096a06b3088c4aab6eac09e1f0d5edd679ccd1fd0a318ceaf9ec04512c8bf8faa463ee3429ba6faa5f1e3e784812af85a2d53a59774385c155699523250b6191e9f04343695245857bc8c0f700da2b345e30eb8f5ebaec9ef2f15469258be4cf7d9981de2aa30506797292679a32ffa7304f73566a71"}, {0x60, 0x118, 0x235d, "fb98d657d05948ddbf26b446c29dd2d843382a6d81249e8519e6e538961e89e35b6c14f7128ca82a8b7d1f844e833b6676b6ed9078a9f751fca38349c811de802ad4f9b6c32bfe485f40a4f0d1"}, {0x110, 0x108, 0x10001, "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"}], 0x1520}, 0x40) r13 = socket$vsock_dgram(0x28, 0x2, 0x0) recvmmsg(r13, &(0x7f0000002600)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f00000008c0)=""/84, 0xffffff5c}, {&(0x7f0000000940)=""/244, 0xf4}], 0x2, &(0x7f0000002080)=""/169, 0xa9}, 0xc0}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000002140)=""/191, 0xbf}], 0x1}, 0x6}, {{&(0x7f0000002200)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000002500)=[{&(0x7f0000002280)=""/161, 0xa1}, {&(0x7f0000000ac0)=""/30, 0x1e}, {&(0x7f0000002340)=""/244, 0xf4}, {&(0x7f0000002440)=""/142, 0x8e}], 0x4, &(0x7f0000002540)=""/151, 0x97}, 0x7}], 0x3, 0x40010100, &(0x7f00000026c0)={0x0, 0x989680}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 969.235459][T21812] autofs4:pid:21812:autofs_fill_super: called with bogus options 20:37:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2001c03}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0xa08b55f814e745fc, 0x0, 0x25dfdbfe}, 0xffffffffffffff44}, 0x1, 0x0, 0x0, 0x40844}, 0x20016) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$EVIOCREVOKE(r3, 0x40044591, &(0x7f0000000000)=0x6) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)=ANY=[@ANYBLOB="03000000000000000b000000080000000200000000800000690000007f000000010000000000000000000000000000000d000000ffff000002000000010000000000002044e50000060000000000000000000000000000000d0000000104000002000000ff0100000700000004f300000200"/128]) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000100)=[r6, r5, r2, r7], 0x4) [ 969.411339][T21817] Unknown ioctl 1075883590 [ 969.462406][T21817] Unknown ioctl 1075883590 [ 969.490197][T21817] Unknown ioctl 1075883590 20:37:01 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x20000000000000db, &(0x7f0000000a40)={0x0, 0x1c9c380}, &(0x7f0000000240), 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:01 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000000000fedbdf2501000000080005000500000004000400b5ff0200ffbd30bdb5dc7336de0f00000000060081000000f7ff04000300000003f677f7578ccfaf3100cdc4175d99e393644e88b6be1bd0c683d59e1fe61e133a2adfb642b848"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 969.521179][T21817] Unknown ioctl 1075883590 [ 969.522167][T22029] Unknown ioctl 1075883590 [ 969.540432][T21817] Unknown ioctl 1075883590 [ 969.541804][T22029] Unknown ioctl 1075883590 [ 969.551111][T21817] Unknown ioctl 1075883590 [ 969.563612][T21817] Unknown ioctl 1075883590 [ 969.568994][T21817] Unknown ioctl 1075883590 [ 969.574212][T22029] Unknown ioctl 1075883590 [ 969.580550][T21817] Unknown ioctl 1075883590 [ 969.583684][T22028] devpts: called with bogus options [ 969.585974][T21817] Unknown ioctl 1075883590 [ 969.600196][T21817] Unknown ioctl 1075883590 [ 969.605527][T22029] Unknown ioctl 1075883590 [ 969.648023][T22029] Unknown ioctl 1075883590 [ 969.653203][T21817] Unknown ioctl 1075883590 [ 969.672691][T22029] Unknown ioctl 1075883590 [ 969.687827][T21817] Unknown ioctl 1075883590 [ 969.699983][T22029] Unknown ioctl 1075883590 [ 969.728651][T21817] Unknown ioctl 1075883590 [ 969.740949][T22029] Unknown ioctl 1075883590 [ 969.752443][T21817] Unknown ioctl 1075883590 [ 969.762239][T22029] Unknown ioctl 1075883590 [ 969.770946][T21817] Unknown ioctl 1075883590 20:37:01 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2001c03}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0xa08b55f814e745fc, 0x0, 0x25dfdbfe}, 0xffffffffffffff44}, 0x1, 0x0, 0x0, 0x40844}, 0x20016) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 969.780169][T22029] Unknown ioctl 1075883590 [ 969.786742][T22037] autofs4:pid:22037:autofs_fill_super: called with bogus options [ 969.791116][T22029] Unknown ioctl 1075883590 [ 969.809173][T21817] Unknown ioctl 1075883590 [ 969.819128][T22029] Unknown ioctl 1075883590 [ 969.831796][T21817] Unknown ioctl 1075883590 [ 969.837742][T22036] devpts: called with bogus options [ 969.848415][T22029] Unknown ioctl 1075883590 [ 969.854697][T21817] Unknown ioctl 1075883590 [ 969.864078][T22029] Unknown ioctl 1075883590 [ 969.877217][T21817] Unknown ioctl 1075883590 [ 969.887000][T22029] Unknown ioctl 1075883590 [ 969.898551][T21817] Unknown ioctl 1075883590 [ 969.910696][T22029] Unknown ioctl 1075883590 [ 969.923185][T21817] Unknown ioctl 1075883590 [ 969.939318][T22029] Unknown ioctl 1075883590 [ 969.946936][T21817] Unknown ioctl 1075883590 [ 969.960387][T22029] Unknown ioctl 1075883590 [ 969.969005][T21817] Unknown ioctl 1075883590 [ 969.983636][T22029] Unknown ioctl 1075883590 20:37:01 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000000000fedbdf2501000000080005000500000004000400b5ff0200ffbd30bdb5dc7336de0f00000000060081000000f7ff04000300000003f677f7578ccfaf3100cdc4175d99e393644e88b6be1bd0c683d59e1fe61e133a2adfb642b848"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 969.993369][T22029] Unknown ioctl 1075883590 [ 970.003705][T21817] Unknown ioctl 1075883590 [ 970.009754][T22029] Unknown ioctl 1075883590 20:37:01 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)=""/186, 0xba) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r1 = dup2(0xffffffffffffffff, r0) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f0000000140)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 970.053227][T22141] devpts: called with bogus options [ 970.059282][T22029] Unknown ioctl 1075883590 [ 970.078634][T22029] Unknown ioctl 1075883590 [ 970.100617][T22029] Unknown ioctl 1075883590 [ 970.153768][T22029] Unknown ioctl 1075883590 [ 970.181591][T22145] devpts: called with bogus options 20:37:02 executing program 0: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) unshare(0x20600) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ppoll(&(0x7f00000001c0)=[{}, {}, {}, {}, {}], 0x20000000000000db, &(0x7f0000000a40)={0x0, 0x1c9c380}, &(0x7f0000000240), 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:02 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r6, 0x227a, &(0x7f0000000200)) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1000005, 0x82013, r7, 0x58cc000) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 970.297237][T22149] autofs4:pid:22149:autofs_fill_super: called with bogus options 20:37:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000000000fedbdf2501000000080005000500000004000400b5ff0200ffbd30bdb5dc7336de0f00000000060081000000f7ff04000300000003f677f7578ccfaf3100cdc4175d99e393644e88b6be1bd0c683d59e1fe61e133a2adfb642b848"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x1) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 970.453270][T22202] devpts: called with bogus options [ 970.478257][T22181] autofs4:pid:22181:autofs_fill_super: called with bogus options 20:37:02 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = geteuid() mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x14000, &(0x7f00000000c0)={[{@index_off='index=off'}], [{@obj_role={'obj_role', 0x3d, 'autofs\x00'}}, {@fowner_gt={'fowner>', r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'autofs\x00'}}, {@fsname={'fsname', 0x3d, 'autofs\x00'}}]}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:02 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r6, 0x227a, &(0x7f0000000200)) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1000005, 0x82013, r7, 0x58cc000) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 970.579018][T22264] devpts: called with bogus options [ 970.590723][T22265] Unknown ioctl 1075883590 [ 970.604976][T22265] Unknown ioctl 1075883590 [ 970.610967][T22265] Unknown ioctl 1075883590 [ 970.689604][T22265] Unknown ioctl 1075883590 20:37:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80141, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000080000fedbdf2501000000080008000500000080470400040008000200ff0f00001200040001000100010400000000000000aa6f000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 970.732205][T22265] Unknown ioctl 1075883590 [ 970.741083][T22270] devpts: called with bogus options [ 970.770694][T22265] Unknown ioctl 1075883590 [ 970.781165][T22273] overlayfs: unrecognized mount option "obj_role=autofs" or missing value [ 970.804122][T22265] Unknown ioctl 1075883590 20:37:02 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80141, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000080000fedbdf2501000000080008000500000080470400040008000200ff0f00001200040001000100010400000000000000aa6f000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 970.837550][T22265] Unknown ioctl 1075883590 20:37:02 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) r1 = getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x41395527) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r6, 0x227a, &(0x7f0000000200)) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1000005, 0x82013, r7, 0x58cc000) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) [ 970.872067][T22265] Unknown ioctl 1075883590 [ 970.882244][T22265] Unknown ioctl 1075883590 [ 970.896873][T22276] devpts: called with bogus options [ 970.922388][T22265] Unknown ioctl 1075883590 [ 970.944172][T22265] Unknown ioctl 1075883590 [ 970.972135][T22265] Unknown ioctl 1075883590 [ 971.000216][T22265] Unknown ioctl 1075883590 [ 971.022611][T22265] Unknown ioctl 1075883590 20:37:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80141, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000080000fedbdf2501000000080008000500000080470400040008000200ff0f00001200040001000100010400000000000000aa6f000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.044910][T22265] Unknown ioctl 1075883590 [ 971.049924][T22265] Unknown ioctl 1075883590 [ 971.053152][T22382] devpts: called with bogus options 20:37:03 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='autofs\x00', 0x0, 0x0) [ 971.109166][T22265] Unknown ioctl 1075883590 [ 971.119424][T22265] Unknown ioctl 1075883590 [ 971.120444][T22387] devpts: called with bogus options [ 971.139588][T22265] Unknown ioctl 1075883590 [ 971.157113][T22265] Unknown ioctl 1075883590 [ 971.176838][T22265] Unknown ioctl 1075883590 [ 971.195155][T22265] Unknown ioctl 1075883590 [ 971.217080][T22265] Unknown ioctl 1075883590 [ 971.239770][T22265] Unknown ioctl 1075883590 20:37:03 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80141, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000080000fedbdf2501000000080008000500000080470400040008000200ff0f00001200040001000100010400000000000000aa6f000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.265683][T22394] devpts: called with bogus options [ 971.297352][T22497] autofs4:pid:22497:autofs_fill_super: called with bogus options 20:37:03 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_udp_int(r4, 0x11, 0x551537af588b58e3, &(0x7f0000000340)=0x3, 0x4) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.354999][T22265] Unknown ioctl 1075883590 [ 971.360005][T22265] Unknown ioctl 1075883590 20:37:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80141, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000080000fedbdf2501000000080008000500000080470400040008000200ff0f00001200040001000100010400000000000000aa6f000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.444993][T22265] Unknown ioctl 1075883590 [ 971.474499][T22525] devpts: called with bogus options 20:37:03 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000040)='nfsd\x00', 0xa80010, 0x0) [ 971.544891][T22608] devpts: called with bogus options 20:37:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, &(0x7f00000000c0), 0x4) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) 20:37:03 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0x80141, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="020000080000fedbdf2501000000080008000500000080470400040008000200ff0f00001200040001000100010400000000000000aa6f000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.669183][T22611] devpts: called with bogus options 20:37:03 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_udp_int(r4, 0x11, 0x551537af588b58e3, &(0x7f0000000340)=0x3, 0x4) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.793204][T22635] devpts: called with bogus options 20:37:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x800, 0x20002) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:03 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x4, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="682a9c8146683f98a61ba68734a8f1c66533bf65e8809e526d2a277b7bde4bfdc485482f980c144a1b125778417870879c198e29bde2cf26c8affcf4c5f3fca9e0345a9cbcbe45a4694e6a9a94813c3cd6c1e61d340155ceed4131b898396d305446e72a541be2f13bf5e6ff306cc18d890328fc7bfb7d9d13725ebbbfdc998ca4e0845c8eaad99d5e0000a48c80cf789ed4dbaa4238355d27141d85e7e44c9ad4e4ddbea862950fb99291164c1ad00036c36777d50e95db3401b0b3a90ee03aebbcea2e3d1ef92776d79b977ba5396d801d3e41ebe6884ed6135697081c963ed097d3", 0xe3, 0xbd5a}], 0x0, &(0x7f0000000300)={[{@discard='discard'}, {@quota='quota'}, {@quota='quota'}, {@nodiscard='nodiscard'}, {@discard_size={'discard', 0x3d, 0x1}}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'ppp1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'autofs\x00'}}, {@uid_lt={'uid<', r0}}, {@subj_role={'subj_role', 0x3d, 'autofs\x00'}}, {@permit_directio='permit_directio'}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x35, 0x63, 0xe, 0x38, 0x31, 0x0, 0x66], 0x2d, [0x66, 0x66, 0x33, 0x34], 0x2d, [0x33, 0x32, 0xaf46bfa45230e373, 0x65], 0x2d, [0x0, 0xc8, 0x33, 0x35], 0x2d, [0x63, 0x0, 0x35, 0x0, 0x18, 0x62, 0x0, 0x32]}}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'cpuset#!\\'}}]}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 971.884498][T22724] Unknown ioctl 1075883590 [ 971.894896][T22724] Unknown ioctl 1075883590 [ 971.900034][T22724] Unknown ioctl 1075883590 20:37:03 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875418848dc8287074144bb34ba58bfa000"/78], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x7) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49061300008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)={0x48, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xa9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 971.937269][T22724] Unknown ioctl 1075883590 [ 971.950199][T22724] Unknown ioctl 1075883590 [ 971.956721][T22728] devpts: called with bogus options [ 971.994986][T22724] Unknown ioctl 1075883590 [ 972.016200][T22731] devpts: called with bogus options [ 972.022274][T22724] Unknown ioctl 1075883590 [ 972.047207][T22724] Unknown ioctl 1075883590 [ 972.062885][T22724] Unknown ioctl 1075883590 20:37:04 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet_udp_int(r4, 0x11, 0x551537af588b58e3, &(0x7f0000000340)=0x3, 0x4) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 972.088454][T22724] Unknown ioctl 1075883590 [ 972.105707][T22724] Unknown ioctl 1075883590 [ 972.122752][T22737] devpts: called with bogus options [ 972.132119][T22724] Unknown ioctl 1075883590 [ 972.152665][T22724] Unknown ioctl 1075883590 [ 972.170269][T22740] JFS: discard option not supported on device [ 972.175033][T22724] Unknown ioctl 1075883590 20:37:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x800, 0x20002) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 972.204454][T22740] JFS: discard option not supported on device [ 972.210812][T22740] jfs: Unrecognized mount option "defcontext=sysadm_u" or missing value [ 972.220914][T22724] Unknown ioctl 1075883590 [ 972.239059][T22724] Unknown ioctl 1075883590 [ 972.257718][T22744] devpts: called with bogus options [ 972.273655][T22724] Unknown ioctl 1075883590 [ 972.288881][T22724] Unknown ioctl 1075883590 [ 972.320031][T22724] Unknown ioctl 1075883590 [ 972.326219][T22906] devpts: called with bogus options [ 972.348254][T22724] Unknown ioctl 1075883590 20:37:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875418848dc8287074144bb34ba58bfa000"/78], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x7) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49061300008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)={0x48, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xa9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:04 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d99f84db6954b385b9385a59c520dd022b6994489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"], 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) readahead(r7, 0x10000, 0x7fffffff) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 972.381497][T22724] Unknown ioctl 1075883590 [ 972.400564][T22724] Unknown ioctl 1075883590 [ 972.412633][T22724] Unknown ioctl 1075883590 20:37:04 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x4}, 0x10) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000080)=0x9, 0x4) [ 972.428855][T22724] Unknown ioctl 1075883590 20:37:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x800, 0x20002) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r4, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r5, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x2}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 972.485107][T22724] Unknown ioctl 1075883590 [ 972.527126][T22967] devpts: called with bogus options [ 972.582539][T22969] devpts: called with bogus options [ 972.615896][T22973] devpts: called with bogus options [ 972.652192][T22732] Unknown ioctl 1075883590 [ 972.661951][T22976] autofs4:pid:22976:autofs_fill_super: called with bogus options [ 972.686982][T22732] Unknown ioctl 1075883590 [ 972.707841][T22732] Unknown ioctl 1075883590 20:37:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x6, 0xfffc}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r3, 0x6}, 0x8) umount2(0x0, 0x0) 20:37:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x10001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:37:04 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r7, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:04 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875418848dc8287074144bb34ba58bfa000"/78], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x7) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49061300008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)={0x48, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xa9}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:04 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x80) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7fffffff, 0x7, &(0x7f0000000600)=[{&(0x7f0000000080)="6e7fb5d0b8a1c14b0cd4c9a67554bc54f29c44ea4e1d94ee6f0378aecae3b77a1c3b436acc6e0d41c90f36aa3999e1d68810acfc6dbc7b150ea8a6b21c8afb07dbafcb7353922953eba2c29eeb1515587ed44f7c8ccd8deec530b9c0163b1eb165e9f4b738ede43a64c931d7c403211a759d9087852e07b055a592a25b975b8ed336a13151cea692d7be8c584767ddc1ec4c1ab4be6786b05fc4bf88a8f19001e86042dbf70a57ac6201f817b8e704", 0xaf, 0xf7f6}, {&(0x7f0000000140)="1ec87f2bb63d23a952f585377569e6557bd67e4a2d6748daf12e035e913a154feb368afa01018967fc3025196f4e73ebe83469cb0c457ec5ad102250df9d3cffe51ec2bdbd97998db3bece7a10e1681c9d7d6669c5172beb51683dce150b80f57ed7f6a9c5312c7de3e78ec6e5bdb73df8307b9c28174db4de37aae1de01fed09792e4661f4122f0de010243398e25594c8860ea6e78f6f7b07d87371847e4a400a3aa5a0a7c3c", 0xa7, 0x6}, {&(0x7f0000000200)="ad60b7e9f895588deff46586e891bf69a4ea8ba6fed79146936a116bbf841c7458c3d861aa62ce0470977b04349ea14e60b1b0ec36cc5b26989e037e599176c07e9313af5ae4e71b6819ae4c1434a5ea3fd1e97b618ec9b666fb948ec30c2d61cfbf804fc9dec8fbd815ac18be2cc010b2ef21995394ee982089ad13ffd6c1dd095d0f757a0b33a097954749d9e6648a77fd3f01403ae649a80b489336", 0x9d, 0x3d}, {&(0x7f0000000300)="0b08db12a7972d9118c1ec2ab74901b6c3205bfd45e1af09fae387bfd0c4bceb9c3e9578bdded802a2bbc10f45b1529d92bafb4b2e80c36524264e32429b79f53005110722cc8b8d8967c71d4fdb0ffb9addf8abc8691e48", 0x58, 0x5}, {&(0x7f0000000380)="66affd188124ecad083fefa0260f82cdb01075c8335f32f4f6d38979da94c53fdfad1a5640667e283a9a2a1cff76f5eca66aaab33b0acf975df18df0224f9c014b24d9fae71b8f4ce6803bf137542aeb78954d055cd1e739f86e0ab370a8ad7f82a83e54f68219bdcabc83066261dbe6256d9b327a46fde764bf98cf3e4768003155dae53b3e6b7b868621a2c8e6b7660b0c1b01d9703e533192c68b7015f7e844cb73d1131762b7df6110281489261eee952eb22d072ccfa2fbff17670136932f1e0bfb4c2c494041440f3272f55bbebdec25a592a9e3f7485116a6a944ae7c5fe21180a85b50d0a202602533510459378dca92c4c5f1", 0xf7, 0x7}, {&(0x7f0000000540)="b544d513c6c8491405373453021a9a86421fbd97db7bfc68b3b293c5f72d98568b1ff5c75d29a76b0913d3f8d15a106d792b5f20d00a344169c262c8bf846987d6e05b1e60a164b99206afa4d632f1c5f9f70cc7611499778fe1cc832d9ca8214dbf440584416be2ba79f96213f43e17a78410c83ca86562429dd93f1447dfc30c3eb52add32ad7f7b9c89b31f49802b7d345c57ee79e8ba97fdf1", 0x9b, 0x100000001}, {&(0x7f0000000480)="7435b0258572f91bd29874eb7785b1fb316e65a1da6ee54030cfa8635204e6ea6d435e46c659", 0x26, 0x9}], 0x4, &(0x7f0000000740)={[{@spectator='spectator'}], [{@pcr={'pcr', 0x3d, 0x6}}, {@smackfsfloor={'smackfsfloor'}}, {@uid_eq={'uid', 0x3d, r0}}, {@context={'context', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 972.945317][T23085] devpts: called with bogus options [ 973.016382][T23090] devpts: called with bogus options 20:37:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 973.088303][T23095] gfs2: Unknown parameter 'pcr' 20:37:05 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:05 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r7, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:05 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='rootf{\x00\b\xf5n\xc3\x0e*\xc4\x0f2\x18\xdb\xc2\xeb_B-\xbc\xfb-T9\xdaA\xb5UN\x87\arJ\xa8(\xb1\xb0\xc2\xa8W(.n8\xfaF\x03\x9c\xab\xe6o\\u2\xd7-\x00\xcd\xf6K\xca\x8f\xdd\xd3E\x97\xd2', 0x0, 0x0) [ 973.301114][T23201] devpts: called with bogus options [ 973.325151][T23204] devpts: called with bogus options 20:37:05 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r7, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 973.433077][T23209] devpts: called with bogus options 20:37:05 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file1\x00', 0x0, 0x8}, 0x10) [ 973.614006][T23320] devpts: called with bogus options [ 973.695568][T23323] devpts: called with bogus options [ 973.714094][T23326] autofs4:pid:23326:autofs_fill_super: called with bogus options 20:37:05 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x538, 0x0) perf_event_open(0x0, r0, 0xfffffffffffffffe, r1, 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1}, 0x0) fstat(0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000100)=0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e645f0cec2fd8c9c384c124caf3ac306834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2faf75dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa00f05421148062ef9bd9de1d348d33f3a4e45f96a2390ca0456893dd6635f92e4024c2c9bbe9a1c2d780d9d9d83e2aa8c022f362c91eacb0cc61b5fc107000000a2a0512fbca4dec14e7503db4dbcbd4d7ec3ce7b45a4736f7877c6c5b6c8f80c6053970a4621a593688b3e8e46b6ddb8e3b0c6f724960c7cbd1d18372f0f8eb08b18410d2826aa0cff72a37e1cdced20139ef5421988361cc842ea95f16371d56f54a0772e47fc429bee6af39e22c6074f4a882b0070bfa7b7fa0468f2baeb110b78f066d4e2729c8a608bac798a39d45ea68537a903b0e0824f8da25ad38d556510c94655f5b88d0273914e031da7a53bd693e2eb55abbbdf8a46f9ca62b5b9466e6c85ad773b306b13098ddbc5b1bc"], 0x4e, 0x0) r4 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f0000000a40)="30000000a00099f0003be90000ed190e0200020000aa408a513c4c2c24ba6d0800196be0da1a83b15c716bb15344154592e2fed4dab41007c3654b43dc6276e6d8dbc608bc437588982275416f0def70518f5945dd25cea71349eb6468d55b5ffb6ae9d0f0e8eed5e23dce680bd1daac33a9ebd3ae69d45b222a744d32e1f851456892b6ba8fa0fa68ae8d47e2a0fe268d554e5b2e76464cda9e839017", 0xd9) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002001000000008000200ff070000000200000000000408040500020046b033dc0000080002000900000008000500a178b5964068a46cdd33888c63ffeffe120711f313ea196a988bef9182559b03e3bf7ee053a14ca59027fbe6a8dedcba8abf"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000500)=""/119, 0x77}, {&(0x7f0000000580)=""/110, 0x6e}, {&(0x7f0000000600)=""/191, 0xbf}], 0x3, &(0x7f0000000480)=""/28, 0x1c}, 0xcb}, {{&(0x7f0000000900)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/23, 0x17}, {&(0x7f00000009c0)=""/63, 0x3f}], 0x2}, 0x4}, {{0x0, 0x0, &(0x7f0000000e40), 0x0, &(0x7f0000000ec0)=""/56, 0xfffffffffffffe69}, 0x7f}, {{&(0x7f0000000f00)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000f80)=""/214, 0xd6}, {&(0x7f0000001080)=""/18, 0x12}, {&(0x7f00000010c0)=""/137, 0x89}], 0x3, &(0x7f00000011c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f00000021c0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002240)=""/224, 0xe0}, {&(0x7f0000002340)=""/110, 0x6e}], 0x2}, 0x8}], 0x5, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66050be328f32556, @perf_config_ext, 0x810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000000400)="1c20f11f4dc3942bf4726bf07c3a6adb2b031aa5d47abb972b04445d90a4f6fc4fade8c03a7dbce65b120f30815c5b47f393038bbe26142f19e6ec9803809f2cc080a220f943bdfb0112d34b5553a49fce02fbd98001a5cca93d8950544d7db39f07af729a205f2ad98dc3b1218a0dd4e5", 0x71, 0x2005, &(0x7f00000004c0)={0xa, 0x2, 0x0, @rand_addr="00000000000000002021000001e000", 0xfffffffe}, 0x1c) 20:37:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0x4, 0x7, 0x0, 0x0, 0xa1d6, 0x10000, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x3}, 0x20800, 0x1, 0x8001, 0x0, 0x1, 0xa5fc, 0x336}, r3, 0x3, 0xffffffffffffffff, 0x9) umount2(0x0, 0x0) 20:37:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f0000000000)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 20:37:05 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:05 executing program 4: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000000)={'erspan0\x00', @random="1014dfe86785"}) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 974.042271][T23540] devpts: called with bogus options 20:37:06 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x538, 0x0) perf_event_open(0x0, r0, 0xfffffffffffffffe, r1, 0x9) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') gettid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1}, 0x0) fstat(0xffffffffffffffff, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000100)=0xffffffffffffffff) fsetxattr$trusted_overlay_upper(r2, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x4e, 0x0) r4 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f0000000a40)="30000000a00099f0003be90000ed190e0200020000aa408a513c4c2c24ba6d0800196be0da1a83b15c716bb15344154592e2fed4dab41007c3654b43dc6276e6d8dbc608bc437588982275416f0def70518f5945dd25cea71349eb6468d55b5ffb6ae9d0f0e8eed5e23dce680bd1daac33a9ebd3ae69d45b222a744d32e1f851456892b6ba8fa0fa68ae8d47e2a0fe268d554e5b2e76464cda9e839017", 0xd9) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002001000000008000200ff070000000200000000000408040500020046b033dc0000080002000900000008000500a178b5964068a46cdd33888c63ffeffe120711f313ea196a988bef9182559b03e3bf7ee053a14ca59027fbe6a8dedcba8abf"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000500)=""/119, 0x77}, {&(0x7f0000000580)=""/110, 0x6e}, {&(0x7f0000000600)=""/191, 0xbf}], 0x3, &(0x7f0000000480)=""/28, 0x1c}, 0xcb}, {{&(0x7f0000000900)=@ethernet={0x0, @link_local}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000980)=""/23, 0x17}, {&(0x7f00000009c0)=""/63, 0x3f}], 0x2}, 0x4}, {{0x0, 0x0, &(0x7f0000000e40), 0x0, &(0x7f0000000ec0)=""/56, 0xfffffffffffffe69}, 0x7f}, {{&(0x7f0000000f00)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000f80)=""/214, 0xd6}, {&(0x7f0000001080)=""/18, 0x12}, {&(0x7f00000010c0)=""/137, 0x89}], 0x3, &(0x7f00000011c0)=""/4096, 0x1000}, 0x5}, {{&(0x7f00000021c0)=@ethernet={0x0, @random}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000002240)=""/224, 0xe0}, {&(0x7f0000002340)=""/110, 0x6e}], 0x2}, 0x8}], 0x5, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f0000000340), 0x41395527) vmsplice(r6, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66050be328f32556, @perf_config_ext, 0x810}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r8, &(0x7f0000000400)="1c20f11f4dc3942bf4726bf07c3a6adb2b031aa5d47abb972b04445d90a4f6fc4fade8c03a7dbce65b120f30815c5b47f393038bbe26142f19e6ec9803809f2cc080a220f943bdfb0112d34b5553a49fce02fbd98001a5cca93d8950544d7db39f07af729a205f2ad98dc3b1218a0dd4e5", 0x71, 0x2005, &(0x7f00000004c0)={0xa, 0x2, 0x0, @rand_addr="00000000000000002021000001e000", 0xfffffffe}, 0x1c) [ 974.069496][T23542] devpts: called with bogus options 20:37:06 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40854}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3c, &(0x7f0000000580)={0x11, 0x101, 0xeae}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:06 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40854}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3c, &(0x7f0000000580)={0x11, 0x101, 0xeae}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f0000000000)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 974.349258][T23860] devpts: called with bogus options [ 974.411911][T23864] devpts: called with bogus options [ 974.449118][T23868] devpts: called with bogus options 20:37:06 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40854}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3c, &(0x7f0000000580)={0x11, 0x101, 0xeae}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:06 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40854}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3c, &(0x7f0000000580)={0x11, 0x101, 0xeae}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$MON_IOCG_STATS(r3, 0x80089203, &(0x7f0000000000)) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) [ 974.729852][T23982] devpts: called with bogus options 20:37:06 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000400)={0x3, &(0x7f0000000340)=[{0x5, 0x6, 0x1f, 0x8}, {0x2, 0x9, 0x1, 0x10001}, {0x6fb, 0x3, 0x8, 0xfff}]}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=ANY=[@ANYBLOB="8a921f3318399de4f3568c49a0c70a03353ddf6433eb2096be81f289828b224500"/43, @ANYBLOB="00042dbd70000020000200000014000400ff010000000000000080530000ff03000008000200010000000800020004000000a1000200ff0700000800030000000000080005000200000008080200090000000800050005000000749d282cc5f6763e313affde4fcb4cc91e6f5772c8db671d39105045dbd2c17ba86f17a14aa967e2a7e46dc1c82dd7efae53de390b5371bccdb9c3766952acc3551e353084c0ed105e93e182d7039124b679eb2e8f"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r8, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr="000000000000000000008000"}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 974.772707][T23985] devpts: called with bogus options 20:37:06 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r1, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r3, 0x3, 0x0, 0x0, {}, [{{@nsim={{0x10}, {0x10}}, {0x8}}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, r3, 0x4, 0x70bd25, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) 20:37:06 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40854}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3c, &(0x7f0000000580)={0x11, 0x101, 0xeae}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:06 executing program 5: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES64=r0, @ANYRES16=0x0], 0x2}, 0x1, 0x0, 0x0, 0x40854}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3c, &(0x7f0000000580)={0x11, 0x101, 0xeae}, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 975.015943][T24088] devpts: called with bogus options [ 975.036030][T23992] devpts: called with bogus options [ 975.044065][T24102] devpts: called with bogus options [ 975.065736][T24104] autofs4:pid:24104:autofs_fill_super: called with bogus options 20:37:07 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unlink(&(0x7f0000000280)='./file0\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x3300, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x400, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f00000001c0)={0x90000007}) 20:37:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x3, 0x1000, 0x2000, &(0x7f0000ff5000/0x2000)=nil}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r6 = getpid() sched_setattr(r6, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getsig(0x4202, r6, 0x3, &(0x7f0000000180)) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000240)=""/77) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r7, 0x800c6613, &(0x7f0000000200)=@v2={0x2, @aes256, 0x3, [], "dac8c106edc7c1d0a322ce39d3677c1c"}) 20:37:07 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000600)={{0x2, 0x1, 0x1, 0x400, 'syz0\x00', 0x5}, 0x6, 0x10, 0x9, r1, 0x6, 0x6, 'syz1\x00', &(0x7f0000000580)=['trusted.overlay.upper\x00', 'posix_acl_accessmd5sumppp1\x00', ',*\x00', '\x00', ')keyringmd5sumsystem\x00', 'trusted.overlay.upper\x00'], 0x60, [], [0xd434, 0xf9, 0x2, 0xf4c]}) tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r6, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:07 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000000)='./file0\x00', 0x8c) [ 975.395600][T24222] devpts: called with bogus options 20:37:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) pipe2(&(0x7f0000000000), 0x4000) 20:37:07 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000600)={{0x2, 0x1, 0x1, 0x400, 'syz0\x00', 0x5}, 0x6, 0x10, 0x9, r1, 0x6, 0x6, 'syz1\x00', &(0x7f0000000580)=['trusted.overlay.upper\x00', 'posix_acl_accessmd5sumppp1\x00', ',*\x00', '\x00', ')keyringmd5sumsystem\x00', 'trusted.overlay.upper\x00'], 0x60, [], [0xd434, 0xf9, 0x2, 0xf4c]}) tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r6, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000340)) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="c65e0f6cee7ec727a7239019c7401fa056da25a2780792d1", @ANYRES16=r5, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:37:07 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200802, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) bind$unix(r0, &(0x7f0000000000)=@abs={0x3, 0x0, 0x4e21}, 0x6e) r2 = getpid() sched_setattr(r2, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$poke(0x5, r2, &(0x7f00000000c0), 0x20) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x3, 0x1000, 0x2000, &(0x7f0000ff5000/0x2000)=nil}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r6 = getpid() sched_setattr(r6, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getsig(0x4202, r6, 0x3, &(0x7f0000000180)) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000240)=""/77) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r7, 0x800c6613, &(0x7f0000000200)=@v2={0x2, @aes256, 0x3, [], "dac8c106edc7c1d0a322ce39d3677c1c"}) [ 975.803677][T24438] devpts: called with bogus options [ 975.977630][T24442] devpts: called with bogus options 20:37:08 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000600)={{0x2, 0x1, 0x1, 0x400, 'syz0\x00', 0x5}, 0x6, 0x10, 0x9, r1, 0x6, 0x6, 'syz1\x00', &(0x7f0000000580)=['trusted.overlay.upper\x00', 'posix_acl_accessmd5sumppp1\x00', ',*\x00', '\x00', ')keyringmd5sumsystem\x00', 'trusted.overlay.upper\x00'], 0x60, [], [0xd434, 0xf9, 0x2, 0xf4c]}) tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r6, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) 20:37:08 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0xfffffffffffffff5, 0x1, {0x609}}, 0x18) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) prctl$PR_SVE_SET_VL(0x32, 0x362e0) vmsplice(r1, &(0x7f0000000200), 0x0, 0x3) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000000)=""/191) 20:37:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000340)) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="c65e0f6cee7ec727a7239019c7401fa056da25a2780792d1", @ANYRES16=r5, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 976.260939][T24556] devpts: called with bogus options [ 976.305262][T24622] autofs4:pid:24622:autofs_fill_super: called with bogus options 20:37:08 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x14, r5, 0x2, 0x0, 0x25dfdbfe}, 0xffffffffffffffed}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:08 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x14, r5, 0x2, 0x0, 0x25dfdbfe}, 0xffffffffffffffed}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 976.417322][T24702] devpts: called with bogus options 20:37:08 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x22d000, 0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 976.609449][T24769] devpts: called with bogus options 20:37:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000340)) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="c65e0f6cee7ec727a7239019c7401fa056da25a2780792d1", @ANYRES16=r5, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r2, 0x89e8) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1ff, 0x3, 0x1000, 0x2000, &(0x7f0000ff5000/0x2000)=nil}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r5, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r6 = getpid() sched_setattr(r6, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ptrace$getsig(0x4202, r6, 0x3, &(0x7f0000000180)) ioctl$EVIOCGUNIQ(r4, 0x80404508, &(0x7f0000000240)=""/77) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r7, 0x800c6613, &(0x7f0000000200)=@v2={0x2, @aes256, 0x3, [], "dac8c106edc7c1d0a322ce39d3677c1c"}) [ 976.675042][T24776] autofs4:pid:24776:autofs_fill_super: called with bogus options [ 976.729742][T24775] devpts: called with bogus options 20:37:08 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc0386106, &(0x7f0000000000)) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) set_mempolicy(0x8001, &(0x7f0000000040)=0x2000000000000, 0x100000000) 20:37:08 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x14, r5, 0x2, 0x0, 0x25dfdbfe}, 0xffffffffffffffed}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 976.936958][T24890] devpts: called with bogus options 20:37:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES32=r6, @ANYRESDEC, @ANYRES32, @ANYBLOB="1e9b73375c167eccc36076f7ca0639cd55b729bdb0c2f576fc0faddea05c1118560d507c9eb91597b697228f14fd6765e798bc5d5a3465b373cfbd982bfdf29d3aaccb474c8a561dead06d627349b62dee6eb840e1d2d611ad2265f59539abba81a0e17faacb41e4d31f4bce3fba4e0a25af8d2fa71bee0878901d522d01cc5f15c472589bd0af28b90a860c96b8ae84ae63781de7d86bc85f1442bf1f5877c44c83e0474f4a8188c85a8f140e912d5f40e39270e203e73b47f32b69db0e0e90cb7306c877a2e5d01473a8c058320c91b68e524faf2a2221111eb4b6822a8c32786483edce5000bfffb98608cff6c31c59a8b4029c", @ANYRES16=r7, @ANYRESDEC=r5, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32, @ANYPTR64], @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000400)=ANY=[]], @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x20000800) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r9, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r11, &(0x7f0000000340), 0x41395527) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r12, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r12, &(0x7f0000f6f000), 0x323, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @mcast1}, 0xfffffffffffffc85) [ 977.127808][T24964] devpts: called with bogus options 20:37:09 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x14, r5, 0x2, 0x0, 0x25dfdbfe}, 0xffffffffffffffed}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 977.294548][T25102] devpts: called with bogus options 20:37:09 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x24000, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000440)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000140)={0x1e, 0x37, 0x1, {0x0, 0x4, 0x6, r1}}, 0x1e) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x7f, 0xffffffe3, 0x9, 0x5, 0xdea, 0x100, 0x9, 0x1}}) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f00000001c0), &(0x7f0000000380)=0x4) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r6, 0x0) r8 = getpgrp(0xffffffffffffffff) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r9, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fallocate(r9, 0x4, 0xff800, 0x6) r10 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setns(r3, 0x2000000) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r12, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r13, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r10, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r11}}}, @rights={{0x20, 0x1, 0x1, [r12, r13, 0xffffffffffffffff, r4]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r8, r6, r7}}}], 0x78, 0xc0880}, 0x0) quotactl(0x4, &(0x7f0000000180)='./file1\x00', r6, &(0x7f0000000b40)="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") 20:37:09 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)=ANY=[@ANYBLOB="8a9293863c266433eb20be000000008b2da672221d67020000000000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff030000ccb309bc59802d3b0800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0xfffffe67, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x28b, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r10, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) ioctl$FS_IOC_GETFLAGS(r10, 0x80086601, &(0x7f0000000340)) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:09 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002000000144d82daea0100000000000000800000ff0300000800020001000000080002000400000008000200ff070000080003000000000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES32=r6, @ANYRESDEC, @ANYRES32, @ANYBLOB="1e9b73375c167eccc36076f7ca0639cd55b729bdb0c2f576fc0faddea05c1118560d507c9eb91597b697228f14fd6765e798bc5d5a3465b373cfbd982bfdf29d3aaccb474c8a561dead06d627349b62dee6eb840e1d2d611ad2265f59539abba81a0e17faacb41e4d31f4bce3fba4e0a25af8d2fa71bee0878901d522d01cc5f15c472589bd0af28b90a860c96b8ae84ae63781de7d86bc85f1442bf1f5877c44c83e0474f4a8188c85a8f140e912d5f40e39270e203e73b47f32b69db0e0e90cb7306c877a2e5d01473a8c058320c91b68e524faf2a2221111eb4b6822a8c32786483edce5000bfffb98608cff6c31c59a8b4029c", @ANYRES16=r7, @ANYRESDEC=r5, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32, @ANYPTR64], @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000400)=ANY=[]], @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x20000800) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r9, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r11, &(0x7f0000000340), 0x41395527) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r12, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r12, &(0x7f0000f6f000), 0x323, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @mcast1}, 0xfffffffffffffc85) [ 977.447254][T25108] devpts: called with bogus options 20:37:09 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002000000144d82daea0100000000000000800000ff0300000800020001000000080002000400000008000200ff070000080003000000000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 977.619795][T25214] devpts: called with bogus options 20:37:09 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = semget(0x1, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r2 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r4, 0x0) r6 = getpgrp(0xffffffffffffffff) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r9, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r10 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r10, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r7, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r8}}}, @rights={{0x20, 0x1, 0x1, [r9, r10, 0xffffffffffffffff, r2]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r6, r4, r5}}}], 0x78, 0xc0880}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r11, 0x407, 0x0) write(r11, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) getsockopt$inet_IP_XFRM_POLICY(r11, 0x0, 0x11, &(0x7f0000000080)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @initdev}}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000180)=0xe8) r13 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r15, 0x0) r17 = getpgrp(0xffffffffffffffff) r18 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r20, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r21 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r21, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r18, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r19}}}, @rights={{0x20, 0x1, 0x1, [r20, r21, 0xffffffffffffffff, r13]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r17, r15, r16}}}], 0x78, 0xc0880}, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000001c0)={{0x5, r1, r8, r12, r19, 0x160, 0x401}, 0x8, 0x5, 0x27}) [ 977.660368][T25216] devpts: called with bogus options [ 977.696403][T25220] devpts: called with bogus options 20:37:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r8, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYPTR=&(0x7f0000000580)=ANY=[@ANYRES32=r6, @ANYRESDEC, @ANYRES32, @ANYBLOB="1e9b73375c167eccc36076f7ca0639cd55b729bdb0c2f576fc0faddea05c1118560d507c9eb91597b697228f14fd6765e798bc5d5a3465b373cfbd982bfdf29d3aaccb474c8a561dead06d627349b62dee6eb840e1d2d611ad2265f59539abba81a0e17faacb41e4d31f4bce3fba4e0a25af8d2fa71bee0878901d522d01cc5f15c472589bd0af28b90a860c96b8ae84ae63781de7d86bc85f1442bf1f5877c44c83e0474f4a8188c85a8f140e912d5f40e39270e203e73b47f32b69db0e0e90cb7306c877a2e5d01473a8c058320c91b68e524faf2a2221111eb4b6822a8c32786483edce5000bfffb98608cff6c31c59a8b4029c", @ANYRES16=r7, @ANYRESDEC=r5, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32, @ANYPTR64], @ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000400)=ANY=[]], @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x20000800) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r9, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r11, &(0x7f0000000340), 0x41395527) vmsplice(r10, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r12, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r12, &(0x7f0000f6f000), 0x323, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @mcast1}, 0xfffffffffffffc85) [ 977.743802][T25223] devpts: called with bogus options 20:37:09 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002000000144d82daea0100000000000000800000ff0300000800020001000000080002000400000008000200ff070000080003000000000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 977.821678][T25229] autofs4:pid:25229:autofs_fill_super: called with bogus options 20:37:09 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002000000144d82daea0100000000000000800000ff0300000800020001000000080002000400000008000200ff070000080003000000000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 977.985852][T25234] devpts: called with bogus options 20:37:10 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 978.078832][T25343] devpts: called with bogus options [ 978.096406][T25346] devpts: called with bogus options 20:37:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(r0, 0x8, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0xffff, 0x200}) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:37:10 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002000000144d82daea0100000000000000800000ff0300000800020001000000080002000400000008000200ff070000080003000000000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:10 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd70000000000002000000144d82daea0100000000000000800000ff0300000800020001000000080002000400000008000200ff070000080003000000000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 978.183744][T25352] autofs4:pid:25352:autofs_fill_super: called with bogus options [ 978.335966][T25416] devpts: called with bogus options [ 978.413574][T25462] devpts: called with bogus options 20:37:10 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 20:37:10 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(0xffffffffffffffff, 0xc0285629, &(0x7f00000000c0)={0x0, 0x1f, 0x4e56, [], &(0x7f0000000080)=0x8}) 20:37:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000340)=0xd5d6) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="44000000bced9f6bbcb64d10a84c320bb419b9905ff90d430925b8e5f9ffb0581c015050655e32abfcd462f97ee601ec944bcc8aab3b1d33cc1c5355d833e8117243d0f1b30300000000000000d81dfa99843ea06d08e1b4c6757865ecb1a3b290d1b4c1f044906f580df394c0bc58087e66c6db327f3d3617971205a3a185589220221376fdc094ec8abfc88919d6543b62589ed459947cc7d3c982f2c90acb20b71d721325109b0336abd08c44beb8dbe701ae34e471de1c37edb7dde3e5534dcb668dee465da6f326e3af244be2c106b84a01683408cbe14c812da7", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:10 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = getpgid(0xffffffffffffffff) sched_setaffinity(r1, 0x8, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x3300, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100}, 0x28) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x11, 0x4, {0x91, 0x1, 0x2}}, 0x14) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000100)={0xa, 0x5, 0x9, 0x80}, 0xa) 20:37:10 executing program 2: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x3000000, 0x0) [ 978.714996][T25481] autofs4:pid:25481:autofs_fill_super: called with bogus options [ 978.742730][T25471] devpts: called with bogus options [ 978.801508][T25504] autofs4:pid:25504:autofs_fill_super: called with bogus options [ 978.826458][T25539] devpts: called with bogus options 20:37:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000340)=0xd5d6) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="44000000bced9f6bbcb64d10a84c320bb419b9905ff90d430925b8e5f9ffb0581c015050655e32abfcd462f97ee601ec944bcc8aab3b1d33cc1c5355d833e8117243d0f1b30300000000000000d81dfa99843ea06d08e1b4c6757865ecb1a3b290d1b4c1f044906f580df394c0bc58087e66c6db327f3d3617971205a3a185589220221376fdc094ec8abfc88919d6543b62589ed459947cc7d3c982f2c90acb20b71d721325109b0336abd08c44beb8dbe701ae34e471de1c37edb7dde3e5534dcb668dee465da6f326e3af244be2c106b84a01683408cbe14c812da7", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x608101, 0x0) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000140)={0x0, 0x0, 0x7, &(0x7f0000000080)=0x4}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r2, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) 20:37:10 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xd34e381d679d8a6a, &(0x7f0000000580)={0x8000000000009, 0x87}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x9, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r7, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r9, 0x3, 0x0, 0x0, {}, [{{@nsim={{0x10}, {0x10}}, {0x8}}}]}, 0x3c}}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x771e4166d8391ccf}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x84, r9, 0x1, 0x70bd26, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r10}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r11}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000049}, 0x40000) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r12, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r14, &(0x7f0000000340), 0x41395527) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x42011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xa}, 0x0, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r15, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r15, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:10 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x800, 0x0) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000140)={0x10001, 0x3, 0x81, 0x6}, 0x10) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000080)=0xf88) r2 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f00009fe000/0x600000)=nil, 0x600000, 0x2000000, r2) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x9, 0x200) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000000)="01f41a3283d303bb86e9922a873d683a", 0x10) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='\x00', 0x100210, 0x0) 20:37:11 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0x0, 0x20000004, &(0x7f0000000340)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 979.100645][T25689] devpts: called with bogus options 20:37:11 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) prctl$PR_SVE_GET_VL(0x33, 0xc63e) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000280)={0x0, 0x70, 0x81, 0xf9, 0x9, 0x81, 0x0, 0x81, 0x80000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000180), 0x2}, 0x2002, 0x8d3, 0x4, 0x5, 0x6, 0x2, 0x3}) openat$pidfd(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self\x00', 0x800, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x345f, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632977fbac141414e9", 0x0, 0x100, 0x0, 0x0, 0xfffffffffffffe15}, 0x28) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0xd2d12eaf49d966eb, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000100)={0x3f, [0x4, 0x5, 0x2, 0x6, 0x20, 0xfff, 0x200, 0x4, 0x100, 0x8, 0xfffd, 0xffff, 0x9f17, 0x5, 0x83f4, 0x6, 0x100, 0xff, 0x156f, 0x1, 0x2000, 0x200, 0x3, 0x2, 0x65, 0x0, 0x449, 0x9, 0x6, 0x1, 0x5, 0xb, 0xff, 0x7f, 0x7f, 0x280, 0x7, 0x7, 0x1, 0x7ff, 0x7, 0x0, 0x221a, 0x19e, 0x1ff, 0x8, 0x1000, 0x100], 0xc}) [ 979.202390][T25694] devpts: called with bogus options 20:37:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000340)=0xd5d6) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="44000000bced9f6bbcb64d10a84c320bb419b9905ff90d430925b8e5f9ffb0581c015050655e32abfcd462f97ee601ec944bcc8aab3b1d33cc1c5355d833e8117243d0f1b30300000000000000d81dfa99843ea06d08e1b4c6757865ecb1a3b290d1b4c1f044906f580df394c0bc58087e66c6db327f3d3617971205a3a185589220221376fdc094ec8abfc88919d6543b62589ed459947cc7d3c982f2c90acb20b71d721325109b0336abd08c44beb8dbe701ae34e471de1c37edb7dde3e5534dcb668dee465da6f326e3af244be2c106b84a01683408cbe14c812da7", @ANYRES16=r6, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f000012000400010001000104000009000000010400000800050003000000"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:11 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xd34e381d679d8a6a, &(0x7f0000000580)={0x8000000000009, 0x87}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x9, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r7, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r9, 0x3, 0x0, 0x0, {}, [{{@nsim={{0x10}, {0x10}}, {0x8}}}]}, 0x3c}}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x771e4166d8391ccf}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x84, r9, 0x1, 0x70bd26, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r10}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r11}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000049}, 0x40000) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r12, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r14, &(0x7f0000000340), 0x41395527) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x42011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xa}, 0x0, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r15, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r15, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 979.326346][T25800] devpts: called with bogus options 20:37:11 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@x25, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) [ 979.507606][T25883] autofs4:pid:25883:autofs_fill_super: called with bogus options [ 979.553198][T25949] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 979.601097][T25884] devpts: called with bogus options 20:37:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r2, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x2c, r4, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_PROP={0x4}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x2b0, r4, 0x301, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1580}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3b0a6931}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x42}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff38c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x52}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x4, @ipv4={[], [], @multicast1}, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa0000000}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x73}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6gretap0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x80000000, @mcast2, 0x4908ae5e}}}}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xb8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5b92}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}]}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x4000000}, 0xc844) fchdir(r0) r5 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r5, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 20:37:11 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xd34e381d679d8a6a, &(0x7f0000000580)={0x8000000000009, 0x87}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x9, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, r7, 0x1ef6325be532a5eb, 0x0, 0x0, {}, [@FOU_ATTR_PEER_V4={0x8, 0x8, @multicast2}]}, 0x1c}}, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r9, 0x3, 0x0, 0x0, {}, [{{@nsim={{0x10}, {0x10}}, {0x8}}}]}, 0x3c}}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r10, 0x407, 0x0) write(r10, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000680)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x771e4166d8391ccf}, 0xc, &(0x7f0000000400)={&(0x7f00000005c0)={0x84, r9, 0x1, 0x70bd26, 0x25dfdbff, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r10}}, {@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r11}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000049}, 0x40000) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r12 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r12, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r14, &(0x7f0000000340), 0x41395527) vmsplice(r13, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x42011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xa}, 0x0, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r15, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r15, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000700)="0fd899a1771ff675bfc2bc544c767bf6e59b4674d90ed4e82eaba4264c2d99ee7ae0bfae2d211a7a3791a8f68c507f20fb066f1276e72a21a259687287ff92756a129693d15e8e144465a76b0395f2c133743cf308de2b9b3ec6bda041eb5958a2eb856256749da5995b1d9ae09bed20379135f9991c4d08b21b45a02fe380b6a13c507a2723abfc4beb45040096f2f19304", 0x92}, {&(0x7f0000000400)="dd7b719213296fbd8daa2b9cda014f83e4267d9ace14a796451e8f51ec4b7cc6a034f66ef7acfde17a5b9412296df5aa3d158bebde143c12d2b8e689c1eaf67930f8d581fd5db761e00219f458c400772b81676524bf92206326d3122a9d596b44bdb805b635a433ec6ee9fbd150f9f68d6c3450eb59778c06e00f7627922538a931ab05dc69efb240d89932bae7314c70968e0fe88be22e0b16ad603d5c94e046771bd8dc8554afd5e6ee498ff277047795c06eb0dce0067f783a1a1542df901eb9a0507dc16ded64d919abf3e8216f53f8a8", 0xd3}, {&(0x7f0000000580)="715366870ce8b327da490356ca11b7dcfd0792596aa5aff7935c39e941893778f495729cb257283ac9840efd713d1c5be342a469b62d1f912020efc8aa73588945c1", 0x42}, {&(0x7f0000000600)="e9c0c5469274261ac6a2ac17197f5391b053d60a7a4bc4e95b2ef428fd517a1c884e21f6c29a1827eec3860853dbc426e9a9e4427b032daf93e58f9a9207e5e1327f609aea8d7a9447ad24181d24047fba207c3a012c51004fdd486dde3020d9eb48e967dd48d02b1a48a39fd7a390266ffe8053b8fdae16d12aff23adaaf405806e82050f10e0a50ce2ca5fc43ce2c8d61e3c76cc72f4f41c64437e0dc93322640fc33b69", 0xa5}], 0x4}, 0x4) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r7, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r7, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 979.831121][T26126] Enabling of bearer rejected, failed to enable media [ 979.922426][T26129] devpts: called with bogus options [ 979.929302][T26131] devpts: called with bogus options 20:37:11 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) fchmodat(r1, &(0x7f0000000080)='./file0\x00', 0x12) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x0, @name="b7fcd2abd31cd0fd7f5d691a8f835a8af52fb508bb9517029635eed66533d302"}, 0x8, 0x9, 0x4}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r2 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r2, &(0x7f0000000240)=""/112, 0x349b7f55) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r2) keyctl$assume_authority(0x10, r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000000)={r5, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000300)={r5, 0x48, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x9fd1, @mcast1, 0x836c}, @in={0x2, 0x4e23, @rand_addr=0xa26b}, @in6={0xa, 0x4e21, 0x37d, @ipv4={[], [], @multicast2}, 0x9}]}, &(0x7f0000000340)=0x10) 20:37:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) getpeername$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000200)=0x10) umount2(0x0, 0x0) r3 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000140)) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$PPPIOCGFLAGS(r4, 0x8004745a, &(0x7f0000000240)) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2) 20:37:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000340)='/dev/capi20\x00', 0x4000, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000380)={0x216b, 0x7ff, 0x81, 0x3, 0x80000, 0x9}) 20:37:12 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x99, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59010000002b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0c4d0832185e25d74b1a4b7c3de17fe50b3df998c577734f53a2e20bd44fbb4f08d944e97c94ea87ffaebc4cd301c1a191c34ef0d672d5d92db5b1160f0efb3a692b538287d52e85376f460"}, 0x99, 0x0) r2 = getpid() socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x400000000000010, 0x802, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r3, 0x0, 0x0) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r4, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r6, 0x407, 0x0) write(r6, &(0x7f0000000340), 0x41395527) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) gettid() bind$inet6(r7, &(0x7f0000d84000)={0xa, 0x2, 0x0, @rand_addr="000000000000000400"}, 0x1c) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r8, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r9, 0x3a, 0x1, &(0x7f00000000c0), 0xfffffffffffffe0b) sendto$inet6(r9, &(0x7f0000000340)="84fc7722269f6c99262cce4a8528b49a7f4f6f167748791fba9e8358e5773d3195cf8d573fd89448459554ecf40236608f4a86f7", 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x0, 0x3, @local}, 0x2f7) 20:37:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_SUPPORTED_CPUID(0xffffffffffffffff, 0xc008ae05, &(0x7f0000000180)=""/66) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setns(r4, 0x1a000000) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_buf(r5, 0x0, 0x3d272a272be69792, &(0x7f0000000080)=""/78, &(0x7f0000000000)=0x4e) [ 980.339037][T26347] devpts: called with bogus options 20:37:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000001c0)) umount2(0x0, 0x0) 20:37:12 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000000)='autofs\x00\xb0\xf3\xdd_8\x17\xbd\xca\xc7`KBW\x15\xd2\xc9\xb0&c\xf7N\x9a\xf9\xa1\xcec\xef\xeb\x15U\xda\xf9\x9d\xb7\xe0\x01R\xa5\x05qn\xa4Q:\x97\v\x1f\x15\x00\x88!\xc2\'A', 0x0, 0x0) 20:37:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a590500dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7644b418848dc8287074144a234ba58bfa0f1b116d5"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x34, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40844}, 0x80) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r7, 0x401c5504, &(0x7f0000000340)={0x9, {0x4, 0x1, 0x132d, 0x9, 0x3, 0x3f}}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x4e20, 0x3ff, @rand_addr="0000000000c57900"}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000140)=""/88, 0xeb396731cc78c6b7) [ 980.550781][T26354] Unknown ioctl 1075883590 [ 980.586296][T26354] Unknown ioctl 1075883590 [ 980.636090][T26354] Unknown ioctl 1075883590 [ 980.648513][T26358] devpts: called with bogus options [ 980.673168][T26361] autofs4:pid:26361:autofs_fill_super: called with bogus options [ 980.673750][T26354] Unknown ioctl 1075883590 20:37:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x10000, &(0x7f0000000200)={'trans=unix,', {[{@fscache='fscache'}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x21028e8be67855a2, 0x35, 0x66, 0x34, 0x34, 0x38, 0x33], 0x2d, [0x34, 0x37, 0xbf], 0x2d, [0x814100775b90f3ca, 0x65, 0x34, 0x65], 0x2d, [0x38, 0x61, 0x32, 0x38], 0x2d, [0x63, 0x64, 0x37, 0x33, 0x30, 0x64, 0x4, 0x33]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, './cgroup\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}, {@measure='measure'}, {@dont_appraise='dont_appraise'}]}}) umount2(0x0, 0x0) [ 980.739939][T26354] Unknown ioctl 1075883590 [ 980.766423][T26354] Unknown ioctl 1075883590 [ 980.802671][T26354] Unknown ioctl 1075883590 20:37:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a590500dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7644b418848dc8287074144a234ba58bfa0f1b116d5"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x34, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40844}, 0x80) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r7, 0x401c5504, &(0x7f0000000340)={0x9, {0x4, 0x1, 0x132d, 0x9, 0x3, 0x3f}}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x4e20, 0x3ff, @rand_addr="0000000000c57900"}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 980.828162][T26354] Unknown ioctl 1075883590 [ 980.864883][T26354] Unknown ioctl 1075883590 [ 980.876835][T26354] Unknown ioctl 1075883590 20:37:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x10000, &(0x7f0000000200)={'trans=unix,', {[{@fscache='fscache'}, {@dfltgid={'dfltgid', 0x3d, r2}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x21028e8be67855a2, 0x35, 0x66, 0x34, 0x34, 0x38, 0x33], 0x2d, [0x34, 0x37, 0xbf], 0x2d, [0x814100775b90f3ca, 0x65, 0x34, 0x65], 0x2d, [0x38, 0x61, 0x32, 0x38], 0x2d, [0x63, 0x64, 0x37, 0x33, 0x30, 0x64, 0x4, 0x33]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, './cgroup\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}, {@measure='measure'}, {@dont_appraise='dont_appraise'}]}}) umount2(0x0, 0x0) [ 980.917509][T26354] Unknown ioctl 1075883590 20:37:12 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x80, 0x1c1000) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="eba500000000000000000300000008000800e0140002"], 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, 0x0, 0x4, 0x70bd27, 0x25dfdbfe, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40440c1}, 0x8000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100)="81330d4d5b5b924a8701acb33355d52ceec592e3c512111395fb281f64d5186432726ddb", 0x24, r1}, 0x68) ioctl$SIOCRSGCAUSE(r0, 0x89e0, &(0x7f00000000c0)) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 980.954831][T26354] Unknown ioctl 1075883590 [ 980.960062][T26354] Unknown ioctl 1075883590 [ 981.038807][T26354] Unknown ioctl 1075883590 [ 981.044068][T26354] Unknown ioctl 1075883590 [ 981.082462][T26354] Unknown ioctl 1075883590 [ 981.099812][T26354] Unknown ioctl 1075883590 20:37:13 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fsetxattr(r0, &(0x7f0000000200)=@known='s\x00\x00tem.posoix_acl_access\x00', &(0x7f0000000400)='devpts\x00', 0x17b, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352d0074144bb34ba3ff4a0c8d2456d80c6c38a1f4b6dadd31570e43072553ebf086b063bc39d8e17ea356e205621dc58ef7a9d79e902a5ba1c5ec43dcee1056c14b01a4e39e9e7bdf209e7e398c179ab854b5e37c855a119691d969cb78e5b32213719"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r6, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0xff, 0x2, 0x0, 0x0, 0x84, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x2}, 0x4880}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 981.144161][T26354] Unknown ioctl 1075883590 [ 981.175256][T26478] autofs4:pid:26478:autofs_fill_super: called with bogus options [ 981.181952][T26354] Unknown ioctl 1075883590 [ 981.204745][T26473] devpts: called with bogus options 20:37:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) epoll_create1(0x0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0xffa0) umount2(0x0, 0x0) [ 981.239590][T26354] Unknown ioctl 1075883590 [ 981.284993][T26354] Unknown ioctl 1075883590 [ 981.290164][T26354] Unknown ioctl 1075883590 [ 981.303436][T26483] devpts: called with bogus options 20:37:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000580)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a590500dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7644b418848dc8287074144a234ba58bfa0f1b116d5"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x34, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x40844}, 0x80) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r7, 0x401c5504, &(0x7f0000000340)={0x9, {0x4, 0x1, 0x132d, 0x9, 0x3, 0x3f}}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000d84000)={0xa, 0x4e20, 0x3ff, @rand_addr="0000000000c57900"}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) getsockopt$inet_int(r4, 0x0, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) 20:37:13 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000000)="f4856d4f864ac26d66eecebc5775f84ab4fc7a9146b38c", 0x17}, {&(0x7f0000000040)="95d28b4cf391ddcad2517caa5555046ae8079385581d1f43d33fd639c7f69485401c18f5b21075a78e2370a94eec7a58b55c901d34397067015eb7e9159a2165fc72d16757d729233dd634fd88670eca03", 0x51}, {&(0x7f00000000c0)="564e546e60bee20450d609401b26318a3986f8de19effa1bbb532d630eeedf658bad8391995ae2f4d750ba6e1b0a4de1711309877bf7f1004b7ce61c466de685267c8cefe3aecb2e0eeb63ba3e665a1788b33360bc2ae18f3808f34089a0916a5f7441e4e38770ed8190a64eccf35029e54b212370430aab08320c21a5a97ad75399255f28c1fb4f2c2f5c4b35ba8b3cd605351567e186fc501b5ab1f62f08bccb5b631f963b6a44bd891d6825bc4d21ceb0ceb8ec69c0e2f11962276a7db0e32ab304463906610e58ccb5fb94d4b82a2cacfc03b6865ead70a85fac3258be595ec41d759bd05534c0f31f66690cbe71c6", 0xf1}, {&(0x7f00000001c0)="90ce4ea70874431b949e9e7487ca47f6cb582640e6f1d6e2b57b377d97b736a7d86b0925011dbdf8be2bcedd1051e5d7f7fddbabab073bb8bf554268fd2fef7492aefd4f274b42fd79ae194846bcf85ee966358b42d097a943ca6090a034ce9708f64ecdab6a36efe3639cb6aad5a0849fd16a5293fc", 0x76}, {&(0x7f0000000240)="0ac475a0e9ac716b656ed1bdcf203516b48c5c4bac6bdf993ebe8ea32ac1cc52d1d4a84c6f9e132c096d6ee36aafaab840584689d3150c7a02", 0x39}, {&(0x7f0000000280)}, {&(0x7f0000000300)="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", 0xfc}], 0x7, 0x3f) 20:37:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0x20010060) umount2(0x0, 0x0) 20:37:13 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fsetxattr(r0, &(0x7f0000000200)=@known='s\x00\x00tem.posoix_acl_access\x00', &(0x7f0000000400)='devpts\x00', 0x17b, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352d0074144bb34ba3ff4a0c8d2456d80c6c38a1f4b6dadd31570e43072553ebf086b063bc39d8e17ea356e205621dc58ef7a9d79e902a5ba1c5ec43dcee1056c14b01a4e39e9e7bdf209e7e398c179ab854b5e37c855a119691d969cb78e5b32213719"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r6, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0xff, 0x2, 0x0, 0x0, 0x84, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x2}, 0x4880}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) [ 981.502089][T26590] devpts: called with bogus options [ 981.680651][T26594] Unknown ioctl 1075883590 20:37:13 executing program 0 (fault-call:4 fault-nth:0): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 981.726615][T26600] autofs4:pid:26600:autofs_fill_super: called with bogus options [ 981.739798][T26594] Unknown ioctl 1075883590 [ 981.757086][T26594] Unknown ioctl 1075883590 [ 981.762107][T26594] Unknown ioctl 1075883590 [ 981.762881][T26601] devpts: called with bogus options [ 981.783845][T26594] Unknown ioctl 1075883590 [ 981.817678][T26594] Unknown ioctl 1075883590 [ 981.848899][T26594] Unknown ioctl 1075883590 20:37:13 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xc, 0x0, 0xa9}) fsetxattr(r0, &(0x7f0000000200)=@known='s\x00\x00tem.posoix_acl_access\x00', &(0x7f0000000400)='devpts\x00', 0x17b, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000600)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352d0074144bb34ba3ff4a0c8d2456d80c6c38a1f4b6dadd31570e43072553ebf086b063bc39d8e17ea356e205621dc58ef7a9d79e902a5ba1c5ec43dcee1056c14b01a4e39e9e7bdf209e7e398c179ab854b5e37c855a119691d969cb78e5b32213719"], 0x4e, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x400000000000010, 0x802, 0x0) write(r5, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r5, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r6, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r7, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r9, &(0x7f0000000340), 0x41395527) vmsplice(r8, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0xff, 0x2, 0x0, 0x0, 0x84, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x2}, 0x4880}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r10, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r10, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) getdents64(r1, &(0x7f00000000c0)=""/79, 0x20010060) umount2(0x0, 0x0) [ 981.866128][T26691] FAULT_INJECTION: forcing a failure. [ 981.866128][T26691] name failslab, interval 1, probability 0, space 0, times 0 [ 981.878000][T26594] Unknown ioctl 1075883590 [ 981.926539][T26691] CPU: 0 PID: 26691 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 981.934694][T26691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.945073][T26691] Call Trace: [ 981.948486][T26691] dump_stack+0xf5/0x159 [ 981.952782][T26691] should_fail.cold+0xa/0x1a [ 981.957853][T26691] __should_failslab+0xee/0x130 [ 981.962820][T26691] should_failslab+0x9/0x14 [ 981.967435][T26691] kmem_cache_alloc_node+0x39/0x660 [ 981.973785][T26691] ? __netlink_lookup+0x24e/0x300 [ 981.978970][T26691] __alloc_skb+0x8e/0x360 [ 981.983791][T26691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 981.990061][T26691] ? netlink_autobind.isra.0+0x135/0x170 [ 981.995818][T26691] netlink_sendmsg+0x5bc/0x770 [ 982.000609][T26691] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 982.006201][T26691] ? netlink_unicast+0x430/0x430 [ 982.009769][T26712] devpts: called with bogus options [ 982.011390][T26691] sock_sendmsg+0x9f/0xc0 [ 982.011426][T26691] ___sys_sendmsg+0x2b7/0x5d0 [ 982.025818][T26691] ? __rcu_read_unlock+0x66/0x3c0 [ 982.031428][T26691] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 982.037808][T26691] ? __fget+0xb8/0x1d0 [ 982.041982][T26691] ? __fget_light+0xaf/0x190 [ 982.047206][T26691] __sys_sendmmsg+0x123/0x350 [ 982.052107][T26691] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 982.058468][T26691] ? fput_many+0xec/0x130 [ 982.062821][T26691] ? fput+0x29/0x30 [ 982.066672][T26691] __x64_sys_sendmmsg+0x64/0x80 [ 982.071791][T26691] do_syscall_64+0xcc/0x370 [ 982.076328][T26691] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 982.082232][T26691] RIP: 0033:0x45a219 [ 982.086324][T26691] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.106349][T26691] RSP: 002b:00007f7d2a4ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 982.115063][T26691] RAX: ffffffffffffffda RBX: 00007f7d2a4ccc90 RCX: 000000000045a219 20:37:14 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000000)) [ 982.123249][T26691] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 982.131687][T26691] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 982.141995][T26691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d2a4cd6d4 [ 982.150671][T26691] R13: 00000000004c7fa6 R14: 00000000004de3e0 R15: 0000000000000005 [ 982.165975][T26594] Unknown ioctl 1075883590 20:37:14 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x222407, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @remote}, 0x10) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000080)={0x10003, 0x7}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x1000, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01400000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000000)={r4, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000100)={r4, 0xc9, 0x3ff}, &(0x7f0000000140)=0x8) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x1) [ 982.214958][T26594] Unknown ioctl 1075883590 [ 982.251688][T26594] Unknown ioctl 1075883590 [ 982.269257][T26719] FAULT_INJECTION: forcing a failure. [ 982.269257][T26719] name failslab, interval 1, probability 0, space 0, times 0 [ 982.290775][T26594] Unknown ioctl 1075883590 [ 982.293412][T26719] CPU: 0 PID: 26719 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 982.303206][T26719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.311599][T26594] Unknown ioctl 1075883590 [ 982.313352][T26719] Call Trace: [ 982.313386][T26719] dump_stack+0xf5/0x159 [ 982.313504][T26719] should_fail.cold+0xa/0x1a [ 982.330763][T26719] __should_failslab+0xee/0x130 [ 982.334629][T26594] Unknown ioctl 1075883590 [ 982.335654][T26719] should_failslab+0x9/0x14 [ 982.335703][T26719] __kmalloc+0x53/0x690 [ 982.348689][T26594] Unknown ioctl 1075883590 [ 982.349505][T26719] ? terminate_walk+0x1d0/0x250 [ 982.349545][T26719] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 982.364522][T26594] Unknown ioctl 1075883590 [ 982.365222][T26719] tomoyo_realpath_from_path+0x83/0x4c0 [ 982.365248][T26719] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 982.378401][T26594] Unknown ioctl 1075883590 [ 982.380871][T26719] tomoyo_path_number_perm+0x10a/0x3c0 [ 982.380952][T26719] ? __fget+0xb8/0x1d0 [ 982.394961][T26719] tomoyo_file_ioctl+0x2c/0x40 [ 982.396410][T26594] Unknown ioctl 1075883590 [ 982.399764][T26719] security_file_ioctl+0x6d/0xa0 [ 982.399795][T26719] ksys_ioctl+0x64/0xe0 [ 982.413346][T26719] __x64_sys_ioctl+0x4c/0x60 [ 982.416619][T26594] Unknown ioctl 1075883590 [ 982.418072][T26719] do_syscall_64+0xcc/0x370 [ 982.418146][T26719] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 982.427825][T26594] Unknown ioctl 1075883590 [ 982.433072][T26719] RIP: 0033:0x45a219 [ 982.433145][T26719] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.453039][T26594] Unknown ioctl 1075883590 [ 982.461497][T26719] RSP: 002b:00007f0abeeb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 982.461520][T26719] RAX: ffffffffffffffda RBX: 00007f0abeeb6c90 RCX: 000000000045a219 [ 982.461532][T26719] RDX: 0000000020000000 RSI: 0080000080045017 RDI: 0000000000000003 [ 982.461577][T26719] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:37:14 executing program 2 (fault-call:1 fault-nth:0): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 982.461600][T26719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0abeeb76d4 [ 982.486378][T26594] Unknown ioctl 1075883590 [ 982.490751][T26719] R13: 00000000004c616a R14: 00000000004db368 R15: 0000000000000004 20:37:14 executing program 0 (fault-call:4 fault-nth:1): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000070001006671000034000200000008000200000000000800090000000000080001000000000008000300000000004a83bbcd97fb91b3b57fa9c92910a347a34e23643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b01390b8070ac248429b0e179aedc5230a79aa287dc36afe0204552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4de32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c9998996fe30ff13b0b875acfd5f41f830cb004000000028f02e4f6002a13a5530e749a510b2162f9081767ebbf49cb7bb993b182a1d5373c5ce"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 982.642202][T26725] FAULT_INJECTION: forcing a failure. [ 982.642202][T26725] name failslab, interval 1, probability 0, space 0, times 0 [ 982.688336][T26725] CPU: 0 PID: 26725 Comm: syz-executor.2 Not tainted 5.4.0-rc6+ #0 [ 982.696367][T26725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.706603][T26725] Call Trace: [ 982.709940][T26725] dump_stack+0xf5/0x159 [ 982.714303][T26725] should_fail.cold+0xa/0x1a [ 982.719017][T26725] __should_failslab+0xee/0x130 [ 982.723981][T26725] should_failslab+0x9/0x14 [ 982.728550][T26725] kmem_cache_alloc_node+0x39/0x660 [ 982.733784][T26725] ? __netlink_lookup+0x24e/0x300 [ 982.739604][T26725] __alloc_skb+0x8e/0x360 [ 982.743968][T26725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.750274][T26725] ? netlink_autobind.isra.0+0x135/0x170 [ 982.756031][T26725] netlink_sendmsg+0x5bc/0x770 [ 982.760846][T26725] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 982.766545][T26725] ? netlink_unicast+0x430/0x430 [ 982.771513][T26725] sock_sendmsg+0x9f/0xc0 [ 982.775936][T26725] sock_write_iter+0x16b/0x210 [ 982.776809][T26787] FAULT_INJECTION: forcing a failure. [ 982.776809][T26787] name failslab, interval 1, probability 0, space 0, times 0 [ 982.781486][T26725] new_sync_write+0x388/0x4a0 [ 982.781538][T26725] __vfs_write+0xb1/0xc0 [ 982.781573][T26725] vfs_write+0x18a/0x390 [ 982.808833][T26725] ksys_write+0xd5/0x1b0 [ 982.813149][T26725] __x64_sys_write+0x4c/0x60 [ 982.817783][T26725] do_syscall_64+0xcc/0x370 [ 982.822332][T26725] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 982.828247][T26725] RIP: 0033:0x45a219 [ 982.832281][T26725] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 982.852780][T26725] RSP: 002b:00007f0460d23c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 982.861219][T26725] RAX: ffffffffffffffda RBX: 00007f0460d23c90 RCX: 000000000045a219 [ 982.869213][T26725] RDX: 0000000000000024 RSI: 0000000020000080 RDI: 0000000000000003 [ 982.877206][T26725] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 982.885201][T26725] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0460d246d4 [ 982.893198][T26725] R13: 00000000004c6cf5 R14: 00000000004e2238 R15: 0000000000000004 [ 982.902309][T26787] CPU: 1 PID: 26787 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 982.910246][T26787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.920423][T26787] Call Trace: [ 982.923831][T26787] dump_stack+0xf5/0x159 [ 982.928102][T26787] should_fail.cold+0xa/0x1a [ 982.932714][T26787] __should_failslab+0xee/0x130 [ 982.937669][T26787] should_failslab+0x9/0x14 [ 982.940248][T26719] ERROR: Out of memory at tomoyo_realpath_from_path. [ 982.942210][T26787] kmem_cache_alloc_node_trace+0x3b/0x670 [ 982.942240][T26787] ? memcg_kmem_put_cache+0x91/0xe0 [ 982.959844][T26787] __kmalloc_node_track_caller+0x38/0x50 [ 982.965543][T26787] __kmalloc_reserve.isra.0+0x49/0xd0 [ 982.970954][T26787] __alloc_skb+0xc2/0x360 [ 982.976703][T26787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 982.982988][T26787] ? netlink_autobind.isra.0+0x135/0x170 [ 982.988666][T26787] netlink_sendmsg+0x5bc/0x770 [ 982.994046][T26787] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 982.999882][T26787] ? netlink_unicast+0x430/0x430 [ 983.005469][T26787] sock_sendmsg+0x9f/0xc0 [ 983.009845][T26787] ___sys_sendmsg+0x2b7/0x5d0 [ 983.014677][T26787] ? __rcu_read_unlock+0x66/0x3c0 [ 983.019997][T26787] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 983.025961][T26787] ? __fget+0xb8/0x1d0 [ 983.030125][T26787] ? __fget_light+0xaf/0x190 [ 983.034782][T26787] __sys_sendmmsg+0x123/0x350 [ 983.039585][T26787] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 983.045861][T26787] ? fput_many+0xec/0x130 [ 983.050256][T26787] ? fput+0x29/0x30 [ 983.054183][T26787] __x64_sys_sendmmsg+0x64/0x80 [ 983.059245][T26787] do_syscall_64+0xcc/0x370 [ 983.063801][T26787] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.069771][T26787] RIP: 0033:0x45a219 [ 983.073699][T26787] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.093528][T26787] RSP: 002b:00007f7d2a4ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 983.102300][T26787] RAX: ffffffffffffffda RBX: 00007f7d2a4ccc90 RCX: 000000000045a219 [ 983.110792][T26787] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 983.118790][T26787] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.126895][T26787] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d2a4cd6d4 20:37:15 executing program 5 (fault-call:1 fault-nth:1): r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000000)) [ 983.135138][T26787] R13: 00000000004c7fa6 R14: 00000000004de3e0 R15: 0000000000000005 20:37:15 executing program 1 (fault-call:7 fault-nth:0): semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:15 executing program 2 (fault-call:1 fault-nth:1): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 983.277636][T26834] FAULT_INJECTION: forcing a failure. [ 983.277636][T26834] name failslab, interval 1, probability 0, space 0, times 0 [ 983.344685][T26833] FAULT_INJECTION: forcing a failure. [ 983.344685][T26833] name failslab, interval 1, probability 0, space 0, times 0 20:37:15 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x1) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x10, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r4, @in, 0xa9}, 0x90) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000000)={r4}, 0x8) [ 983.387601][T26833] CPU: 1 PID: 26833 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 983.398459][T26833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.408532][T26833] Call Trace: [ 983.411856][T26833] dump_stack+0xf5/0x159 [ 983.416133][T26833] should_fail.cold+0xa/0x1a [ 983.420851][T26833] __should_failslab+0xee/0x130 [ 983.425890][T26833] should_failslab+0x9/0x14 [ 983.430423][T26833] __kmalloc+0x53/0x690 [ 983.434743][T26833] ? tomoyo_encode2.part.0+0xd9/0x260 [ 983.440148][T26833] tomoyo_encode2.part.0+0xd9/0x260 [ 983.445419][T26833] tomoyo_encode+0x34/0x50 [ 983.449869][T26833] tomoyo_realpath_from_path+0x14a/0x4c0 [ 983.455550][T26833] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 983.460984][T26833] tomoyo_path_number_perm+0x10a/0x3c0 [ 983.466550][T26833] ? __fget+0xb8/0x1d0 [ 983.470802][T26833] tomoyo_file_ioctl+0x2c/0x40 [ 983.475587][T26833] security_file_ioctl+0x6d/0xa0 [ 983.480559][T26833] ksys_ioctl+0x64/0xe0 [ 983.484754][T26833] __x64_sys_ioctl+0x4c/0x60 [ 983.489374][T26833] do_syscall_64+0xcc/0x370 [ 983.493907][T26833] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.499856][T26833] RIP: 0033:0x45a219 [ 983.503846][T26833] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.523587][T26833] RSP: 002b:00007f0abeeb6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 983.532057][T26833] RAX: ffffffffffffffda RBX: 00007f0abeeb6c90 RCX: 000000000045a219 [ 983.540039][T26833] RDX: 0000000020000000 RSI: 0080000080045017 RDI: 0000000000000003 [ 983.548145][T26833] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.556134][T26833] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0abeeb76d4 [ 983.564114][T26833] R13: 00000000004c616a R14: 00000000004db368 R15: 0000000000000004 [ 983.585882][T26834] CPU: 0 PID: 26834 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 983.593943][T26834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.604017][T26834] Call Trace: [ 983.607334][T26834] dump_stack+0xf5/0x159 [ 983.609358][T26873] autofs4:pid:26873:autofs_fill_super: called with bogus options [ 983.611696][T26834] should_fail.cold+0xa/0x1a [ 983.611803][T26834] __should_failslab+0xee/0x130 [ 983.621316][T26833] ERROR: Out of memory at tomoyo_realpath_from_path. [ 983.624095][T26834] should_failslab+0x9/0x14 [ 983.624126][T26834] __kmalloc+0x53/0x690 [ 983.644582][T26834] ? terminate_walk+0x1d0/0x250 [ 983.649609][T26834] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 983.655391][T26834] tomoyo_realpath_from_path+0x83/0x4c0 [ 983.661046][T26834] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 983.666900][T26834] tomoyo_path_number_perm+0x10a/0x3c0 [ 983.672435][T26834] ? __fget+0xb8/0x1d0 [ 983.676604][T26834] tomoyo_file_ioctl+0x2c/0x40 [ 983.681485][T26834] security_file_ioctl+0x6d/0xa0 [ 983.686527][T26834] ksys_ioctl+0x64/0xe0 [ 983.690836][T26834] __x64_sys_ioctl+0x4c/0x60 [ 983.695459][T26834] do_syscall_64+0xcc/0x370 [ 983.700241][T26834] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 983.706155][T26834] RIP: 0033:0x45a219 [ 983.710221][T26834] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 983.730307][T26834] RSP: 002b:00007ff916bcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 20:37:15 executing program 0 (fault-call:4 fault-nth:2): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 20:37:15 executing program 4: mkdir(&(0x7f0000000b00)='./file1\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 983.738845][T26834] RAX: ffffffffffffffda RBX: 00007ff916bcac90 RCX: 000000000045a219 [ 983.746845][T26834] RDX: 0000000020000180 RSI: 00000000000089f1 RDI: 0000000000000003 [ 983.754947][T26834] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 983.762990][T26834] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff916bcb6d4 [ 983.771003][T26834] R13: 00000000004c6365 R14: 00000000004db6e0 R15: 0000000000000004 20:37:15 executing program 5 (fault-call:1 fault-nth:2): r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000000)) [ 983.820270][T26834] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:15 executing program 1 (fault-call:7 fault-nth:1): semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 983.969135][T27046] FAULT_INJECTION: forcing a failure. [ 983.969135][T27046] name failslab, interval 1, probability 0, space 0, times 0 20:37:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 984.075045][T27046] CPU: 0 PID: 27046 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 984.082982][T27046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.093392][T27046] Call Trace: [ 984.096786][T27046] dump_stack+0xf5/0x159 [ 984.101131][T27046] should_fail.cold+0xa/0x1a [ 984.105775][T27046] __should_failslab+0xee/0x130 [ 984.110763][T27046] should_failslab+0x9/0x14 [ 984.115305][T27046] kmem_cache_alloc+0x29/0x5d0 [ 984.120116][T27046] ? __rcu_read_unlock+0x66/0x3c0 [ 984.125212][T27046] skb_clone+0xf9/0x290 [ 984.129424][T27046] netlink_deliver_tap+0x428/0x4a0 [ 984.134597][T27046] netlink_unicast+0x3af/0x430 [ 984.139407][T27046] netlink_sendmsg+0x456/0x770 [ 984.144204][T27046] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 984.149789][T27046] ? netlink_unicast+0x430/0x430 [ 984.154768][T27046] sock_sendmsg+0x9f/0xc0 [ 984.159154][T27046] ___sys_sendmsg+0x2b7/0x5d0 [ 984.163939][T27046] ? __rcu_read_unlock+0x66/0x3c0 [ 984.169084][T27046] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 984.175184][T27046] ? __fget+0xb8/0x1d0 [ 984.179340][T27046] ? __fget_light+0xaf/0x190 [ 984.184039][T27046] __sys_sendmmsg+0x123/0x350 [ 984.188778][T27046] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 984.195081][T27046] ? fput_many+0xec/0x130 [ 984.199449][T27046] ? fput+0x29/0x30 [ 984.203295][T27046] __x64_sys_sendmmsg+0x64/0x80 [ 984.208179][T27046] do_syscall_64+0xcc/0x370 [ 984.212778][T27046] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.218718][T27046] RIP: 0033:0x45a219 [ 984.222729][T27046] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.242394][T27046] RSP: 002b:00007f7d2a4ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 984.250954][T27046] RAX: ffffffffffffffda RBX: 00007f7d2a4ccc90 RCX: 000000000045a219 [ 984.259023][T27046] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 984.267053][T27046] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 20:37:16 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000000)) [ 984.275522][T27046] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7d2a4cd6d4 [ 984.283773][T27046] R13: 00000000004c7fa6 R14: 00000000004de3e0 R15: 0000000000000005 [ 984.341144][T27054] FAULT_INJECTION: forcing a failure. [ 984.341144][T27054] name failslab, interval 1, probability 0, space 0, times 0 20:37:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="0f00000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 984.407095][T27054] CPU: 0 PID: 27054 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 [ 984.415110][T27054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.425193][T27054] Call Trace: [ 984.428627][T27054] dump_stack+0xf5/0x159 [ 984.432981][T27054] should_fail.cold+0xa/0x1a [ 984.437614][T27054] __should_failslab+0xee/0x130 [ 984.442487][T27054] should_failslab+0x9/0x14 [ 984.447091][T27054] __kmalloc+0x53/0x690 [ 984.451302][T27054] ? tomoyo_encode2.part.0+0xd9/0x260 [ 984.456820][T27054] tomoyo_encode2.part.0+0xd9/0x260 [ 984.462055][T27054] tomoyo_encode+0x34/0x50 [ 984.466538][T27054] tomoyo_realpath_from_path+0x14a/0x4c0 [ 984.472466][T27054] tomoyo_path_number_perm+0x10a/0x3c0 [ 984.478065][T27054] ? __fget+0xb8/0x1d0 [ 984.482181][T27054] tomoyo_file_ioctl+0x2c/0x40 [ 984.487665][T27054] security_file_ioctl+0x6d/0xa0 [ 984.492695][T27054] ksys_ioctl+0x64/0xe0 [ 984.496894][T27054] __x64_sys_ioctl+0x4c/0x60 [ 984.501547][T27054] do_syscall_64+0xcc/0x370 [ 984.506086][T27054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.511996][T27054] RIP: 0033:0x45a219 [ 984.515915][T27054] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 984.535822][T27054] RSP: 002b:00007ff916bcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 984.544279][T27054] RAX: ffffffffffffffda RBX: 00007ff916bcac90 RCX: 000000000045a219 20:37:16 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000040)={0x6, 0x1, @start={0x2, 0x1}}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept$alg(r0, 0x0, 0x0) [ 984.552311][T27054] RDX: 0000000020000180 RSI: 00000000000089f1 RDI: 0000000000000003 [ 984.560308][T27054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 984.568296][T27054] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff916bcb6d4 [ 984.576407][T27054] R13: 00000000004c6365 R14: 00000000004db6e0 R15: 0000000000000004 [ 984.596919][T27046] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1000000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:16 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000000002, &(0x7f0000000000)) 20:37:16 executing program 0 (fault-call:4 fault-nth:3): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) [ 984.874362][T27054] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:16 executing program 4: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="1b00000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:16 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:16 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000000010, &(0x7f0000000000)) 20:37:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x0) 20:37:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="c000000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:17 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000004c00, &(0x7f0000000000)) [ 985.344195][T27298] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:17 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) setsockopt$ax25_SO_BINDTODEVICE(0xffffffffffffffff, 0x101, 0x19, &(0x7f0000000000)=@rose={'rose', 0x0}, 0x10) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000540)={0x2f4, r0, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x110, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x26b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @ipv4={[], [], @remote}, 0x8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x46}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x91}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffc01}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3bf}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}]}, @TIPC_NLA_LINK={0x194, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8b6b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x635}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2d5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff179}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}]}]}, 0x2f4}}, 0x4000) 20:37:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x2, 0x0) 20:37:17 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x2, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="c00e000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 985.600634][T27306] autofs4:pid:27306:autofs_fill_super: called with bogus options 20:37:17 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000004c01, &(0x7f0000000000)) 20:37:17 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x10, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:17 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x3, 0x0) 20:37:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="effd000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:17 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='au\x7f\x00ws\xed', 0x10000, 0x0) 20:37:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005000, &(0x7f0000000000)) 20:37:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="e03f030019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:18 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x4c00, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="a400002019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005001, &(0x7f0000000000)) 20:37:18 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x4, 0x0) 20:37:18 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000400)=0x115) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100686866000c000200080002"], 0x3}}, 0x0) sendmsg$xdp(r0, &(0x7f0000000780)={&(0x7f0000000080)={0x2c, 0x2, r2, 0xd}, 0x10, &(0x7f0000000700)=[{&(0x7f00000000c0)="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", 0xff}, {&(0x7f00000001c0)="1004d69863018ca9fdc94c1c7752bae40315b42dc2989b1549ae72ce913518092a6ef940222d13125b0b357f58619d6ce5af97bd53dd8ba49535961cb63dfb9bfcdcf50d32acac28a5112eaefd2ac16bb0201bdb81b708392f6cd7f989c063cac81fadae9eb422ff9931e24022bea8f9eaa57091bf1433442ea28d87ba780a89ebab8e78fc17a1810170aa320cfe2510a0e6ca77d32b5817bd1c2809e9eda56184089f7e1aba008784ec7caf76f79bba2b70c9010fd9d8f2c9f1fc0b81f3de1e18529de229867469e60832406a6064ba4042e0a055e0cfa5", 0xd8}, {&(0x7f0000000300)="293263895b065669353ecb77bdb18018e2cab71e5faaaa809dd319e755828a9bfb8dce92a679a8e410544da873adfdabd21bc9826d409a0169c06f461c7023068b765705476f194f9208edd3a3277cedc821dcd9c6a4453d322298c49f2d7329a4523fd7f743048c281ff8b6bbdffefc0de9e12560b343ceecd1aaa27f75593221aef6c09b6c5d12a568e5bd6100e0a3c36af0", 0x93}, {&(0x7f00000003c0)="cc3a8423e18becae45448cc0e615e3deac23fe769f7f77e59eb7987c39dbd254a698114f80b271b05aee7add81627209b96be07663291dc6645e8ef33f1804237947e14534de67f997bd1cb5c15a4f9b426fe00595b5ae814b8115e0fd23d9995c7eb6c46473f273aaada8fda66fd8a306473a09cd8cff3c207daa692707d273690f628e2b6c14cf12c17fdfeddefbb39af708bba9b731485c8f81e93e8b03c4e0b3684843fdd0db7ab5f18dd5d4f5da1e0a4d62aa370f02084bc7ae5e501f44d1", 0xc1}, {&(0x7f0000000540)="8596b85d86df75f6d60d64486d542cf992a6a66c5a8143ffdaa5bf0675692c4657c62ab6816760f34ab9366489dc31ee5e549f49c275aa7468dbc4b0208ad53d04fa070f73ae35f883f93712ba0d5cb137f3e7f7e3c49ded5e52fa92756977dc014414ad7bbb6ed578d5d7ae49b4cbbefca95783df08eba59fec12922494ec977f9d598a9e5de84e5609e023d128e59567337799dbd7e0da5eba45f50cd42ff538dae4500ed33b8dea860f8527d57bcd66e57563", 0xb4}, {&(0x7f0000000600)="a723b610bf6d7e1a6562e44a1c652966970e888bda13e7291d8fb2f1014bc238767ba7096b7c9c07e2939b812344681175c85ca45662c3ddefbcade4d90eba2052f1901537bbbf5f2d324f3cf595317d2b37b95776ae06ff792c4248397669aa2d1536b80ec80a2845e1e7283108550e1191801f67eb85be79eecb74286253832a75b7f9d065f39ca0347bc5c3504dec0279b04ade00b293c211a82183fd3bd012d14a9e7d50ed2ff576d6205b218817dcc45696fe1f9e896f93", 0xba}, {&(0x7f00000004c0)="aa89a54ffbd8881a7c368576617b1fb1b600b6", 0x13}, {&(0x7f00000006c0)}], 0x8, 0x0, 0x0, 0x8000}, 0x0) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000000)) 20:37:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="effdffff19002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:18 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x4c01, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:18 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005008, &(0x7f0000000000)) [ 986.815495][T27791] autofs4:pid:27791:autofs_fill_super: called with bogus options 20:37:18 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x5, 0x0) 20:37:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000000f002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:19 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000000000500e, &(0x7f0000000000)) 20:37:19 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5421, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 987.046456][T27976] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:19 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x4, &(0x7f0000000080)={[{@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}], [{@smackfsroot={'smackfsroot', 0x3d, 'autofs\x00'}}, {@pcr={'pcr', 0x3d, 0x2f}}]}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000018002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:19 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x30a, 0x0) 20:37:19 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005015, &(0x7f0000000000)) 20:37:19 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5450, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2402000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:19 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005016, &(0x7f0000000000)) [ 987.602248][T28201] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:19 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendto$unix(r0, &(0x7f0000000000)="ff29d94fb7e44f6e88e2fd0f5406b65d57dcabb768a6586020fd4acb127a904bc8fe2a98a0da1ebbba84b27ebecae90503d2e64c9e5bacf4297b2cd2ad9181b80314b3f317e78558b23670fb66ab04b1e933847fa1dde0e409f389b179f6c0837d963394eff38ecc05396f4cde82fe697bc775d97dc7042ddce82cafc9d314a8c312379dbbcb91cb9bf9f9862805b8db5ad7371bd1769e52fe38d9b7b985f3c0520ee3924793c6304dd63d0c2de7880bd2f896767e5a1410b935a6c952e418", 0xbf, 0x40088d0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:19 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5451, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2403000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:19 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x368, 0x0) 20:37:19 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005421, &(0x7f0000000000)) 20:37:19 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:20 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000040)='\x82utofs\x00', 0x0, 0x0) [ 988.116585][T28421] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2404000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:20 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005450, &(0x7f0000000000)) 20:37:20 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5460, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:20 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x2) 20:37:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2406000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:20 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x6364, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:20 executing program 4: mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x101, &(0x7f0000000000)=0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000540)='\f\xb1ev/\xbfA\xb5<\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000040)={0x10000000, 0x0, 0x0, 0xc, 0x0, 0xa9, 0xffffffff, 0x40}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000580)='/dev/cachefiles\x00', 0x800, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000380)=0x4) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r4, 0xc0106407, &(0x7f0000000440)={0x4, 0x1, 0x3, 0x4}) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x3d293337bff30387, 0x0) syncfs(r2) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x100, 0x0) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000400)) io_submit(r0, 0x2, &(0x7f0000000300)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x7, r1, &(0x7f0000000040)="2d51cb78674a1deb2449208a5ffd9e29dd22d71e1895d5db7e45dc1ec4e2c2003910ede90296e9d8f739d5a8ba487ff59b5e5944719985ecbf196d03dfb9a278bf90d0274d9492a7fee54faacffea667b7b8013b1624e71105c0d4ff14a0be12a43bd886355db1c700001a6d88b239aab347c9e7e021e0e0fd3859c61369110020fd9cd5bb75a2b13eaed530d4c5a8b477f1ab0dc3a987db138302ec83c5df859e4648db9f00d32702af1898e75fcb34d3e2", 0xb2, 0x435d8b12, 0x0, 0x1, r3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x8000, r5, &(0x7f0000000180)="d799563252a3cabca91a6e58b8783bb2c0c86141a66de47e403a9c1bc7e3a15cd72ede15415a4c4526a68e87baadb7a4b44f3b2f170dadd2736684f4e9cb1ab8bf3a868feeb2808f4bd1c05c4cacbf64fe6235195aa41127c5f19f500ef8b5596b99ad6c8b88248f2df5274f3bbf0b10f5a3302587a16559125c23fcf62d83cb80f4afd5fcba7fd4e5cf33adeaccd551", 0x90, 0x8, 0x0, 0x1, r6}]) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$VIDIOC_CREATE_BUFS(r7, 0xc100565c, &(0x7f00000005c0)={0x8bd, 0x80, 0x2, {0x7198998bee8e0251, @vbi={0xfff, 0x488e, 0x100, 0x30314752, [0x1, 0x1], [0x1, 0x800], 0x1}}}) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) [ 988.553475][T28644] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:20 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005451, &(0x7f0000000000)) 20:37:20 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240a000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:20 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005452, &(0x7f0000000000)) 20:37:20 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x3) 20:37:21 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000005460, &(0x7f0000000000)) 20:37:21 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240c000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:21 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4) 20:37:21 executing program 4: clock_gettime(0x0, &(0x7f00000037c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000003600)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/80, 0x50}], 0x1, &(0x7f0000000100)=""/222, 0xde}, 0x5}, {{&(0x7f0000000200)=@x25={0x9, @remote}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000300)=""/74, 0x4a}, {&(0x7f0000000280)=""/14, 0xe}, {&(0x7f0000000380)=""/18, 0x12}, {&(0x7f00000003c0)=""/254, 0xfe}, {&(0x7f0000000540)=""/238, 0xee}], 0x5, &(0x7f00000006c0)=""/131, 0x83}, 0x3}, {{&(0x7f0000000780)=@nl, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000800)=""/174, 0xae}, {&(0x7f00000008c0)=""/210, 0xd2}, {&(0x7f00000009c0)=""/76, 0x4c}], 0x3, &(0x7f0000000a40)=""/151, 0x97}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/37, 0x25}, {&(0x7f0000002b80)=""/89, 0x59}, {&(0x7f0000002c00)=""/165, 0xa5}], 0x5, &(0x7f0000002d40)=""/64, 0x40}, 0x4}, {{0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002d80)=""/91, 0x5b}, {&(0x7f0000002e00)=""/234, 0xea}], 0x2}, 0x4}, {{&(0x7f0000002f40)=@tipc=@name, 0x80, &(0x7f0000003140)=[{&(0x7f0000002fc0)=""/237, 0xed}, {&(0x7f00000030c0)=""/96, 0x60}], 0x2, &(0x7f0000003180)=""/78, 0x4e}, 0x4}, {{&(0x7f0000003200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003280)=""/119, 0x77}, {&(0x7f0000003300)=""/104, 0x68}, {&(0x7f0000003380)}, {&(0x7f00000033c0)=""/161, 0xa1}, {&(0x7f0000003480)=""/126, 0x7e}], 0x5, &(0x7f0000003580)=""/90, 0x5a}, 0x10001}], 0x7, 0x4001, &(0x7f0000003800)={r0, r1+10000000}) socket$l2tp(0x18, 0x1, 0x1) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000003840)=0x3, 0x2) mkdir(&(0x7f0000000b00)='./file0\x00', 0x0) r3 = syz_open_dev$audion(&(0x7f00000038c0)='/dev/audio#\x00', 0xfffffffffffffffd, 0x2000) r4 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r6, 0x0) r8 = getpgrp(0xffffffffffffffff) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r11, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a0000000100"], 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r12, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r9, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r10}}}, @rights={{0x20, 0x1, 0x1, [r11, r12, 0xffffffffffffffff, r4]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r8, r6, r7}}}], 0x78, 0xc0880}, 0x0) r13 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x9}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r14 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r15, 0x0) r17 = getpgrp(0xffffffffffffffff) r18 = dup2(0xffffffffffffffff, 0xffffffffffffffff) lstat(&(0x7f0000006480)='./bus\x00', &(0x7f00000064c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r20 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r20, &(0x7f0000003a80)=ANY=[@ANYBLOB="0a0000000122e400"], 0x0) r21 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$PIO_UNIMAP(r21, 0x541e, &(0x7f0000000100)={0x0, 0x0}) sendmsg$netlink(r18, &(0x7f0000006640)={&(0x7f0000004d80)=@kern={0x10, 0x0, 0x0, 0x21000830}, 0xc, 0x0, 0x0, &(0x7f0000006580)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, r19}}}, @rights={{0x20, 0x1, 0x1, [r20, r21, 0xffffffffffffffff, r13]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r17, r15, r16}}}], 0x78, 0xc0880}, 0x0) mount$fuse(0x0, &(0x7f0000003380)='./file0\x00', &(0x7f0000003880)='fuse\x00', 0x440, &(0x7f0000003900)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x17000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r7}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x101}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x9}}], [{@euid_eq={'euid', 0x3d, r15}}]}}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r22 = semget$private(0x0, 0x0, 0x40) semctl$IPC_INFO(r22, 0x0, 0x3, &(0x7f0000000000)=""/44) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, 0x0) 20:37:21 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 989.373670][T29028] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:21 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000006364, &(0x7f0000000000)) 20:37:21 executing program 4 (fault-call:4 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240e000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:21 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x5) 20:37:21 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 989.721620][T29198] FAULT_INJECTION: forcing a failure. [ 989.721620][T29198] name failslab, interval 1, probability 0, space 0, times 0 [ 989.831465][T29198] CPU: 0 PID: 29198 Comm: syz-executor.4 Not tainted 5.4.0-rc6+ #0 [ 989.839404][T29198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 989.849501][T29198] Call Trace: [ 989.852822][T29198] dump_stack+0xf5/0x159 [ 989.857167][T29198] should_fail.cold+0xa/0x1a [ 989.861789][T29198] __should_failslab+0xee/0x130 [ 989.866663][T29198] should_failslab+0x9/0x14 [ 989.871181][T29198] __kmalloc+0x53/0x690 [ 989.875417][T29198] ? terminate_walk+0x1d0/0x250 [ 989.880277][T29198] ? tomoyo_realpath_from_path+0x83/0x4c0 [ 989.886010][T29198] tomoyo_realpath_from_path+0x83/0x4c0 [ 989.891605][T29198] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 989.897145][T29198] tomoyo_path_number_perm+0x10a/0x3c0 [ 989.902707][T29198] ? __fget+0xb8/0x1d0 [ 989.906806][T29198] tomoyo_file_ioctl+0x2c/0x40 [ 989.911582][T29198] security_file_ioctl+0x6d/0xa0 [ 989.916534][T29198] ksys_ioctl+0x64/0xe0 [ 989.920706][T29198] __x64_sys_ioctl+0x4c/0x60 [ 989.925312][T29198] do_syscall_64+0xcc/0x370 [ 989.929850][T29198] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 989.935752][T29198] RIP: 0033:0x45a219 [ 989.939704][T29198] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 989.959314][T29198] RSP: 002b:00007f1a09eb7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 989.968040][T29198] RAX: ffffffffffffffda RBX: 00007f1a09eb7c90 RCX: 000000000045a219 20:37:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240f000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:21 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000000008933, &(0x7f0000000000)) [ 989.976214][T29198] RDX: 0000000020000180 RSI: 00000000000089f1 RDI: 0000000000000003 [ 989.984262][T29198] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 989.995939][T29198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1a09eb86d4 [ 990.003924][T29198] R13: 00000000004c6365 R14: 00000000004db6e0 R15: 0000000000000004 20:37:22 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6) 20:37:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2410000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 990.084406][T29198] ERROR: Out of memory at tomoyo_realpath_from_path. 20:37:22 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000040045010, &(0x7f0000000000)) [ 990.257516][T29312] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2460000019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:22 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:22 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x7) 20:37:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:22 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000040045017, &(0x7f0000000000)) 20:37:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400030019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:22 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:22 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x8) 20:37:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x2, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:22 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000040045431, &(0x7f0000000000)) [ 991.004776][T29556] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:23 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400060019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:23 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x9) 20:37:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x10, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:23 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000400454ca, &(0x7f0000000000)) 20:37:23 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000a0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x4c01, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:23 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xa) 20:37:23 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000040049409, &(0x7f0000000000)) 20:37:23 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 991.805256][T29994] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000c0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:23 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000070001006671000034000200000008000200000000000800090000000000080001000000000008000300000000004a83bbcd97fb91b3b57fa9c92910a347a34e23643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b01390b8070ac248429b0e179aedc5230a79aa287dc36afe0204552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4de32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c9998996fe30ff13b0b875acfd5f41f830cb004000000028f02e4f6002a13a5530e749a510b2162f9081767ebbf49cb7bb993b182a1d5373c5ce"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xb) 20:37:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5421, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:23 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000004020940d, &(0x7f0000000000)) 20:37:24 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000e0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:24 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc) 20:37:24 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080044d76, &(0x7f0000000000)) 20:37:24 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5450, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000f0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 992.395957][T30527] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:24 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xe) 20:37:24 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080044df9, &(0x7f0000000000)) 20:37:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5451, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2465580019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 992.810375][T30750] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:24 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400600019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:24 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5452, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:24 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045002, &(0x7f0000000000)) 20:37:24 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xf) 20:37:25 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2458650019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:25 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045005, &(0x7f0000000000)) 20:37:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x5460, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:25 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x10) 20:37:25 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x6364, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24c06d0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:25 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045006, &(0x7f0000000000)) [ 993.590190][T31296] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400810019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:25 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x11) 20:37:25 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:25 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r3, 0xc008640a, &(0x7f0000000340)={0x0}) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000580)={r4, 0xc0000, r5}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r6 = getpid() r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket(0x400000000000010, 0x802, 0x0) write(r8, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r9 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r8, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r7, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="020000000000fedbdf250100000008000500050000000400040008000200ff0f00001200040001000100010400000900000001040000080005000300000054e5625883ffebe0859344a0112870b474d0fd36049d9b6a8c61b7d670ba4a2c0d03752f038dcb10b01d49fc356ac8893e221e1b78a39e5f5704b2"], 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r10 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r10, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r12, &(0x7f0000000340), 0x41395527) vmsplice(r11, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r13, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r13, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:25 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 993.953199][T31516] devpts: called with bogus options 20:37:25 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045007, &(0x7f0000000000)) 20:37:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="246dc00019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8911, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d66e4c557a09e6834d52cbd999fd786d9b385b9385a5909cc7b20c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc3527f27244326a9ab418848dc8287074144bb34"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x5, 0x0, 0x101, 0xfbfffff8, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000006b002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:26 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x12) 20:37:26 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000008004500b, &(0x7f0000000000)) 20:37:26 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 994.398176][T31866] devpts: called with bogus options 20:37:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8912, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 994.459183][T31950] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:26 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000070001006671000034000200000008000200000000000800090000000000080001000000000008000300000000004a83bbcd97fb91b3b57fa9c92910a347a34e23643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b01390b8070ac248429b0e179aedc5230a79aa287dc36afe0204552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4de32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c9998996fe30ff13b0b875acfd5f41f830cb004000000028f02e4f6002a13a5530e749a510b2162f9081767ebbf49cb7bb993b182a1d5373c5ce"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x13) 20:37:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400020019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="00fb4e0200074d7fe4c557a09e6834d52cbd999fd786d9b385b9385a59c520dd022b6984489e47a50c4c4357288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"], 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:26 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000008004500f, &(0x7f0000000000)) 20:37:26 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 994.804517][T32293] devpts: called with bogus options 20:37:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8913, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:26 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0x2, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f0000000500)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b2d4572221d6749ec49060000008c", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:26 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045010, &(0x7f0000000000)) 20:37:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400030019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:26 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000070001006671000034000200000008000200000000000800090000000000080001000000000008000300000000004a83bbcd97fb91b3b57fa9c92910a347a34e23643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b01390b8070ac248429b0e179aedc5230a79aa287dc36afe0204552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4de32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c9998996fe30ff13b0b875acfd5f41f830cb004000000028f02e4f6002a13a5530e749a510b2162f9081767ebbf49cb7bb993b182a1d5373c5ce"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x14) 20:37:26 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 995.071184][T32387] devpts: called with bogus options [ 995.083255][T32438] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400040019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:27 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045430, &(0x7f0000000000)) 20:37:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:27 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r1 = gettid() tkill(r1, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) fstat(0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x4e, 0x2, 0x0, "074d7fe4c557a09e6834d52cbd999fd7", "86d9b385b9385a59c520dd022b6984489e47a50c4c43d969a2e157288f2fc875dcc352aee7244b26a9ab418848dc8287074144bb34ba58bfa0"}, 0x4e, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x400000000000010, 0x802, 0x0) write(r4, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x6d02820}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="8a9293863c266433eb20be81f289828b72221d6749ec49060000008c00001fa4a72a5a523758f0b7be7a3b8489e08ab17540f7730ff3589cce3d2499481f8701fc064c3d43", @ANYBLOB="00042dbd7000000000000200000014000400ff0100000000000000800000ff0300000800020001000000080002000400000008000200ff0700000800030000000000080005000200000008000200090000000800050005000000"], 0x2}, 0x1, 0x0, 0x0, 0x24000020}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r3, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c01}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x44, r5, 0x2, 0x0, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfff}, @SEG6_ATTR_SECRET={0x12, 0x4, [0x10001, 0x401, 0x9, 0x401]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x40844}, 0x4) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r6, &(0x7f0000008880), 0x4000000000000be, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r9, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) sendto$inet6(r9, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 20:37:27 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:27 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x30) [ 995.421977][T32604] devpts: called with bogus options 20:37:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400060019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:27 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800454d2, &(0x7f0000000000)) 20:37:27 executing program 3 (fault-call:7 fault-nth:0): socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 995.534752][T32710] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891d, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:27 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000a0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:27 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x48) 20:37:27 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080086301, &(0x7f0000000000)) [ 995.905146][ T557] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000c0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:27 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:27 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891e, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:27 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8946, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x4c) 20:37:28 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5011, &(0x7f0000000000)) 20:37:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000e0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:28 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 996.300952][ T886] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:28 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getpeername$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x10) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000800c5012, &(0x7f0000000000)) 20:37:28 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x60) 20:37:28 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24000f0019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 996.639987][ T1230] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:28 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000008010500c, &(0x7f0000000000)) 20:37:28 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000070001006671000034000200000008000200000000000800090000000000080001000000000008000300000000004a83bbcd97fb91b3b57fa9c92910a347a34e23643a3c5c6b25caffa9fd141476dd041c5b0b9662cd9fb075c7f418e3b9a3d22a5b156fe3f75a61a1aa4d1a39bdb19f5aa6eeeb07563388976c971c6fad98ec1b2a0a40b01390b8070ac248429b0e179aedc5230a79aa287dc36afe0204552f1e7e2c5e380de4096fa82a4764ffe558eeb4c1bd19fbe64f2c293739f4de32f88cb972e7333ebecc430716ed3dac4ce61ad690d1c9998996fe30ff13b0b875acfd5f41f830cb004000000028f02e4f6002a13a5530e749a510b2162f9081767ebbf49cb7bb993b182a1d5373c5ce"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x68) 20:37:28 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x355) syz_genetlink_get_family_id$ipvs(0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) connect(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e24, 0x1, @remote, 0x2}}, 0x80) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8949, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:28 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400100019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 996.979262][ T1439] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:28 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x8000008010500d, &(0x7f0000000000)) 20:37:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:29 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:29 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x6c) 20:37:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400600019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:29 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 997.431441][ T1988] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:29 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7, 0x6d, 0x1}, 0x7) 20:37:29 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)) 20:37:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000319002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:29 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:29 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x74) 20:37:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000619002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:29 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000080)=""/28) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 997.809113][ T2312] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8923, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:29 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045003, &(0x7f0000000000)) 20:37:29 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8971, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000a19002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:30 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x7a) 20:37:30 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x8008) sysinfo(&(0x7f0000000040)=""/11) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x3a, 0x1, &(0x7f00000000c0), 0xff2a) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="1afd887f11d3e4613809f4d173aabedbd556868ac7f61ae613605c68b7d44cfbc0c9232450f015b384913a7ba90f9c28f80eea2deaa2846f387742e138d54766702ff650a1c839e10e257b94e543a98e49dd96f8b8053ed6629bd6dd0390abb06b0f45b6cf86d84b0996367f907f290a778cf970e0911240c679bc20f346552f9303eecb8035667dbdb409da642a39cf9bdb700ae5f2e7a7b8a25300fca6367180767dc81b46a5def0d7aa7065413c0457978c14f82785cfd27609d50d019ba9895a0082b66978b30fcbae5da4a3adaef967ff349a905fdc3791779d2286184c1c5d78497c23bd5a7a92f3030ec1334a3942c7af", 0xf4}, {&(0x7f0000000000)="c90ca52a63a8b996d9d8216adc9e662a1b06715bd9a9506b8334", 0x1a}], 0xc7, 0x0, 0xfffffffffffffeb4}, 0x1) r2 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 998.216400][ T2648] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:30 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045004, &(0x7f0000000000)) 20:37:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000c19002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:30 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0xc0) 20:37:30 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000e19002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:30 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000000)) [ 998.641049][ T2980] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:30 executing program 3: r0 = request_key(&(0x7f0000000140)='trusted\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='em1.]:\xcecgroupvmnet1md5sumGPLselinux}!!-ppp1eth1em1\x00', 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$search(0xa, r0, &(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={'syz', 0x2}, r1) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x18f002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000300)='-posix_acl_access#\x00') r4 = semget$private(0x0, 0x4, 0x200) semctl$GETNCNT(r4, 0x0, 0xe, &(0x7f0000000040)=""/219) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f0000000340)) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x300) [ 998.874372][ T3221] encrypted_key: insufficient parameters specified 20:37:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000f19002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:30 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:30 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)) [ 998.950554][ T3254] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:31 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x4, 0xc) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x331) 20:37:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8930, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400655819002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:31 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045007, &(0x7f0000000000)) 20:37:31 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'ip_vti0\x00', @ifru_settings={0x9, 0x9c61, @fr=&(0x7f0000000040)={0x3ff, 0x1, 0x5, 0x9, 0x101, 0x40, 0x1000}}}}) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045009, &(0x7f0000000000)) 20:37:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400006019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:31 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x332) 20:37:31 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4, 0x314462cb1ed09e83) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000000)={r2, @in, 0xa9}, 0x90) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r2, 0x8, 0x30}, &(0x7f00000000c0)=0xc) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000000)) 20:37:31 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89a2, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:31 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x500) 20:37:31 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400586519002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:31 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89a3, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 3: socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) recvmsg$can_bcm(0xffffffffffffffff, &(0x7f0000001880)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000001700)=[{&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000000100)=""/66, 0x42}, {&(0x7f0000000500)=""/117, 0x75}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/29, 0x1d}, {&(0x7f00000015c0)=""/87, 0x57}, {&(0x7f0000001640)=""/31, 0x1f}, {&(0x7f0000001680)=""/120, 0x78}], 0x8, &(0x7f0000001780)=""/248, 0xf8}, 0xc0000020) r2 = socket$unix(0x1, 0x0, 0x0) sendmsg(r1, &(0x7f0000002e00)={&(0x7f00000018c0)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x3, 0x0, 0x1, 0x0, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, [], 0x24}, 0x19d6998c}}}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000001940)="e5c9fd5df5cff61a62d1fc7f1ffb584bf5057b9baacce229f31796237a4f1bdea5aaec761cdb24a20722d8fb70963949b34265614575609b8b746cbef62473069b592d6f5bb057c9ac8f33a151927de905534b36257c25f28ed82b69a7315254eb6e47cb513e0af48569b6b6fe0fe1b32ee79afa44325b544aee9475e2194fcb7db6061256d0c4167fb757bbeac6db790c80d56f0153be392eb85a417ae4bde71d682ee692abc6d1cb35e7b82f2a6ad523e7466ef7f608c1959ad71cc5703efb394bd021c07609eb6c0e10c39d0a788059fc79f232a6bd5e20", 0xd9}, {&(0x7f0000001a40)="1ba303602f4b1e90dcdccb1bd466cfc757571303d93eb6770bfa97c56d6a424304dc15975e16e5528b0f", 0x2a}, {&(0x7f0000001a80)="95b9acf91479437450f58744611c38e58f40ce15b52a11e95c7da0118e2e656c7de185b2893f21408e259fe678982b687cf5e6c4e2e4796e1eb0702b3e32e8caedd9722560046945c84919bed5ab0f2a6564cf69cce7cf05a6208d9ab67bc43c10dd", 0x62}, {&(0x7f0000001b00)="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", 0x1000}], 0x4, &(0x7f0000002b40)=[{0x50, 0x1, 0x7, "02b0e4798503ede9f44a24792fd5efdcebc71352a84c664febe520510ee225fc949c7b469f0c540b920a894eb20448c2a31117930e0c322903cc2c02e920"}, {0x58, 0x111, 0xebe, "8b7ef1242682cf84d7492789d95896ee1199f0d5394a003ad031d04f1456b00ee2de2f3d4ba35096673a50a5cff33345783122bad31f45cf3f387ff24bbb4d90b38467d6887b"}, {0x100, 0x10e, 0x6, "818f62a78558bc09f490823be94d0082c595236359816f843fb89d2a874d765f5493fdc73491561a6aa82c1e32171309b785c50c5aa41a284d06016fe8b5c70c4d9cc85f0006e75934bafa3cc7ddda0f848d0de84da20ba4a48803d64726f468c73ee6f3c1b4e5c26f5a8d06468fa52c5b38b2b54b88dcf51cba21cb5f69046284d29ddf64640f91e68b03dec706fb0fc144b3a0b25846726a577c18544f24dfcadac2b2f468dbf7eb3705a263621fdd1e4a3cc61c39cc07765cda0cc3278523669adc0b6d189620ca0efd27713c4756775fb5e49b83b8eb54bda48789a437663188bb68761acfc8aaa815933886d9b6"}, {0x40, 0x104, 0xfffffffb, "c9ffe7b373527b9288c6eb85e0c27912a7f5b16d6cad175f5622fa879494f5db11bbf5b8f23d7c46ad"}, {0xa8, 0x101, 0xccc, "5b7f55b48de0caf983a36a60fa2628e57bc24f3b980c4f2c798c066fbb4c0cb156b4b4377bd6d471bda62c4268d9003c3477bbdcd7f2be9bd3694e64cb5437a66e810b8542e507610583fe2089544c577e4bc06bf82da616caa1dcdf11a85d0c6f31f264661ca9202eaccc027efe6ba0da67340cf2706b3d51c370b0e1a4ddedfb01690405d286f70821f051ed234e76bd4a7bc9cc1d"}], 0x290}, 0x40010044) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f00000001c0)={0x8, {{0x2, 0x4e20, @remote}}, 0x0, 0x5, [{{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e24, @local}}]}, 0x310) 20:37:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0xc0045878, &(0x7f0000000000)) 20:37:32 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400c06d19002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8933, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x52f) 20:37:32 executing program 3: syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x20000) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400008119002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045878, &(0x7f0000000000)) 20:37:32 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="24006dc019002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) 20:37:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:32 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0189436, &(0x7f0000000000)) 20:37:32 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x600) 20:37:32 executing program 3: rt_sigaction(0x200, &(0x7f00000000c0)={&(0x7f0000000040)="c4a2fd1dc24385a30080000067f3420f5b7bbf660fe8d3c4815d7c65acc4e2d90b6efed9545a433ef2410f2c6c5c0c430f1c420036dcf7", {0x1}, 0x10000000, &(0x7f0000000080)="c4e1f9e70c09677284f2400f5d983861ae62f0432952bbc48200f308c4c1972ac42e0f0faf0500000090660f380be7660f545e77f3460f5da47360aa360c"}, &(0x7f00000001c0)={&(0x7f0000000100)="420f5332660f2e6f6641f69135b3000047a7f226f2dbe166440f57fcc4010659d1c4c191e4f4c4422193a4e860fb0000dca200000000", {}, 0x0, &(0x7f0000000140)="f2e1008fc9a00164c528edc09900800000c4c402793116d13b660f5101c4622191141bc4a109f1fcf243a7"}, 0x8, &(0x7f0000000200)) socket$nl_route(0x10, 0x3, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$NBD_SET_BLKSIZE(r0, 0xab01, 0x2b14c0ac) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:33 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="240000000f002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 1001.061131][ T5121] __nla_validate_parse: 2 callbacks suppressed [ 1001.061206][ T5121] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8942, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:33 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:33 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c020660b, &(0x7f0000000000)) 20:37:33 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x700) 20:37:33 executing program 3: socket$nl_route(0x10, 0x3, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x2500, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) accept$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) pipe(&(0x7f00000003c0)={0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bind$packet(r1, 0x0, 0xfffffffffffffe55) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@loopback, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) write(r3, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000040)) 20:37:33 executing program 2: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000080)="2400000018002551075c0165ff0ffc02802000030011000500e1000c080002008000a000", 0x24) [ 1001.434928][ T5480] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 20:37:33 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:33 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8943, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) 20:37:33 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x80000080045017, &(0x7f0000000000)=0x2) 20:37:33 executing program 0: r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="600000002400071f00"/20, @ANYRES32=r2, @ANYBLOB="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"], 0x60}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x332, 0x900) 20:37:33 executing program 1: semget$private(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={0x0}}, 0x400) sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000000180)={'ip6gre0\x00\xeej\x01\x0f\'@\x00\xff', @ifru_flags}) [ 1001.781518][ T5840] netlink:[ 1001.787435][ T5840] ================================================================== [ 1001.787450][ T5840] BUG: KCSAN: data-race in wq_watchdog_reset_touched / wq_watchdog_touch [ 1001.787455][ T5840] [ 1001.787466][ T5840] write to 0xffff88812bf172c8 of 8 bytes by interrupt on cpu 0: [ 1001.787474][ T5840] wq_watchdog_reset_touched+0x8c/0xe0 [ 1001.787482][ T5840] wq_watchdog_timer_fn+0x270/0x2b0 [ 1001.787488][ T5840] call_timer_fn+0x5f/0x2f0 [ 1001.787496][ T5840] run_timer_softirq+0xc7a/0xcd0 [ 1001.787504][ T5840] __do_softirq+0x115/0x33f [ 1001.787511][ T5840] irq_exit+0xbb/0xe0 [ 1001.787521][ T5840] smp_apic_timer_interrupt+0xe6/0x280 [ 1001.787531][ T5840] apic_timer_interrupt+0xf/0x20 [ 1001.787538][ T5840] __tsan_read8+0x7/0x1f0 [ 1001.787547][ T5840] unmap_single_vma+0x144/0x200 [ 1001.787554][ T5840] unmap_vmas+0xda/0x1a0 [ 1001.787560][ T5840] exit_mmap+0x13e/0x300 [ 1001.787565][ T5840] mmput+0xea/0x280 [ 1001.787571][ T5840] do_exit+0x4c9/0x18f0 [ 1001.787578][ T5840] do_group_exit+0xb4/0x1c0 [ 1001.787585][ T5840] __x64_sys_exit_group+0x2e/0x30 [ 1001.787592][ T5840] do_syscall_64+0xcc/0x370 [ 1001.787600][ T5840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.787605][ T5840] [ 1001.787617][ T5840] write to 0xffff88812bf172c8 of 8 bytes by task 5840 on cpu 1: [ 1001.787623][ T5840] wq_watchdog_touch+0x61/0xae [ 1001.787631][ T5840] touch_softlockup_watchdog+0x2a/0x40 [ 1001.787638][ T5840] wait_for_xmitr+0x6f/0x1b0 [ 1001.787646][ T5840] serial8250_console_putchar+0x28/0x50 [ 1001.787654][ T5840] uart_console_write+0x9b/0xd0 [ 1001.787663][ T5840] serial8250_console_write+0x3a0/0x500 [ 1001.787671][ T5840] univ8250_console_write+0x47/0x60 [ 1001.787678][ T5840] console_unlock+0x935/0xb80 [ 1001.787685][ T5840] vprintk_emit+0x38f/0x4e0 [ 1001.787692][ T5840] vprintk_default+0x31/0x50 [ 1001.787698][ T5840] vprintk_func+0x85/0x140 [ 1001.787704][ T5840] printk+0x69/0x91 [ 1001.787711][ T5840] __nla_validate_parse.cold+0x24/0x4f [ 1001.787717][ T5840] __nla_parse+0x4c/0x70 [ 1001.787723][ T5840] fq_change+0x77/0x840 [ 1001.787729][ T5840] fq_init+0x262/0x2a4 [ 1001.787736][ T5840] qdisc_create+0x322/0x990 [ 1001.787744][ T5840] tc_modify_qdisc+0x288/0x10c0 [ 1001.787752][ T5840] rtnetlink_rcv_msg+0x1d3/0x500 [ 1001.787760][ T5840] netlink_rcv_skb+0xb0/0x260 [ 1001.787768][ T5840] rtnetlink_rcv+0x26/0x30 [ 1001.787776][ T5840] netlink_unicast+0x354/0x430 [ 1001.787784][ T5840] netlink_sendmsg+0x456/0x770 [ 1001.787799][ T5840] sock_sendmsg+0x9f/0xc0 [ 1001.787808][ T5840] ___sys_sendmsg+0x2b7/0x5d0 [ 1001.787816][ T5840] __sys_sendmmsg+0x123/0x350 [ 1001.787825][ T5840] __x64_sys_sendmmsg+0x64/0x80 [ 1001.787833][ T5840] do_syscall_64+0xcc/0x370 [ 1001.787843][ T5840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.787848][ T5840] [ 1001.787859][ T5840] Reported by Kernel Concurrency Sanitizer on: [ 1001.787871][ T5840] CPU: 1 PID: 5840 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 1001.787889][ T5840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.787904][ T5840] ================================================================== [ 1001.787916][ T5840] Kernel panic - not syncing: panic_on_warn set ... [ 1001.787929][ T5840] CPU: 1 PID: 5840 Comm: syz-executor.0 Not tainted 5.4.0-rc6+ #0 [ 1001.787946][ T5840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.787953][ T5840] Call Trace: [ 1001.787961][ T5840] dump_stack+0xf5/0x159 [ 1001.787967][ T5840] panic+0x210/0x640 [ 1001.787975][ T5840] ? vprintk_func+0x8d/0x140 [ 1001.787983][ T5840] kcsan_report.cold+0xc/0xe [ 1001.787990][ T5840] kcsan_setup_watchpoint+0x3fe/0x410 [ 1001.787996][ T5840] ? format_decode+0x1a3/0xb10 [ 1001.788004][ T5840] __tsan_unaligned_write8+0x143/0x1f0 [ 1001.788012][ T5840] wq_watchdog_touch+0x61/0xae [ 1001.788022][ T5840] touch_softlockup_watchdog+0x2a/0x40 [ 1001.788029][ T5840] wait_for_xmitr+0x6f/0x1b0 [ 1001.788039][ T5840] serial8250_console_putchar+0x28/0x50 [ 1001.788047][ T5840] uart_console_write+0x9b/0xd0 [ 1001.788055][ T5840] ? wait_for_xmitr+0x1b0/0x1b0 [ 1001.788064][ T5840] serial8250_console_write+0x3a0/0x500 [ 1001.788073][ T5840] univ8250_console_write+0x47/0x60 [ 1001.788082][ T5840] ? univ8250_console_setup+0x120/0x120 [ 1001.788090][ T5840] console_unlock+0x935/0xb80 [ 1001.788098][ T5840] vprintk_emit+0x38f/0x4e0 [ 1001.788106][ T5840] vprintk_default+0x31/0x50 [ 1001.788114][ T5840] vprintk_func+0x85/0x140 [ 1001.788121][ T5840] printk+0x69/0x91 [ 1001.788130][ T5840] __nla_validate_parse.cold+0x24/0x4f [ 1001.788140][ T5840] ? __read_once_size.constprop.0+0x12/0x20 [ 1001.788147][ T5840] __nla_parse+0x4c/0x70 [ 1001.788155][ T5840] fq_change+0x77/0x840 [ 1001.788163][ T5840] ? __hrtimer_init+0x12f/0x1a0 [ 1001.788170][ T5840] fq_init+0x262/0x2a4 [ 1001.788177][ T5840] ? fq_change+0x840/0x840 [ 1001.788184][ T5840] qdisc_create+0x322/0x990 [ 1001.788192][ T5840] ? __nla_parse+0x54/0x70 [ 1001.788200][ T5840] tc_modify_qdisc+0x288/0x10c0 [ 1001.788208][ T5840] ? qdisc_create+0x990/0x990 [ 1001.788217][ T5840] rtnetlink_rcv_msg+0x1d3/0x500 [ 1001.788225][ T5840] ? __rcu_read_unlock+0x66/0x3c0 [ 1001.788233][ T5840] netlink_rcv_skb+0xb0/0x260 [ 1001.788243][ T5840] ? rtnl_calcit.isra.0+0x220/0x220 [ 1001.788250][ T5840] rtnetlink_rcv+0x26/0x30 [ 1001.788258][ T5840] netlink_unicast+0x354/0x430 [ 1001.788267][ T5840] netlink_sendmsg+0x456/0x770 [ 1001.788275][ T5840] ? aa_sock_msg_perm.isra.0+0xa5/0x140 [ 1001.788282][ T5840] ? netlink_unicast+0x430/0x430 [ 1001.788288][ T5840] sock_sendmsg+0x9f/0xc0 [ 1001.788295][ T5840] ___sys_sendmsg+0x2b7/0x5d0 [ 1001.788304][ T5840] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1001.788311][ T5840] ? __fget+0xb8/0x1d0 [ 1001.788320][ T5840] ? __fget_light+0xaf/0x190 [ 1001.788328][ T5840] __sys_sendmmsg+0x123/0x350 [ 1001.788337][ T5840] ? __read_once_size+0x5a/0xe0 [ 1001.788346][ T5840] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1001.788354][ T5840] ? _copy_to_user+0x84/0xb0 [ 1001.788365][ T5840] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1001.788373][ T5840] ? put_timespec64+0x94/0xc0 [ 1001.788382][ T5840] __x64_sys_sendmmsg+0x64/0x80 [ 1001.788389][ T5840] do_syscall_64+0xcc/0x370 [ 1001.788396][ T5840] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.788402][ T5840] RIP: 0033:0x45a219 [ 1001.788427][ T5840] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1001.788434][ T5840] RSP: 002b:00007f7d2a4ccc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1001.788451][ T5840] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045a219 [ 1001.788461][ T5840] RDX: 0000000000000332 RSI: 0000000020000140 RDI: 0000000000000003 [ 1001.788471][ T5840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1001.788481][ T5840] R10: 0000000000000900 R11: 0000000000000246 R12: 00007f7d2a4cd6d4 [ 1001.788493][ T5840] R13: 00000000004c7fa6 R14: 00000000004de3e0 R15: 00000000ffffffff [ 1001.790304][ T5840] Kernel Offset: disabled