0000000000000000000000000000000000020000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:18 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:18 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696465342c6c6f7765726469893d2e2f66696c6530a19fba6eccdfda733d2e2f66696c65315c20"]) recvmmsg(0xffffffffffffff9c, &(0x7f0000007180)=[{{&(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000300)=""/215, 0xd7}, {&(0x7f0000000040)}, {&(0x7f00000004c0)=""/252, 0xfc}], 0x3, &(0x7f00000005c0)=""/4096, 0x1000}, 0x8}, {{&(0x7f00000015c0)=@nl, 0x80, &(0x7f0000002c00)=[{&(0x7f0000001640)=""/209, 0xd1}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/178, 0xb2}, {&(0x7f0000002800)=""/188, 0xbc}, {&(0x7f00000028c0)=""/126, 0x7e}, {&(0x7f0000002940)=""/88, 0x58}, {&(0x7f0000000400)=""/60, 0x3c}, {&(0x7f00000029c0)=""/155, 0x9b}, {&(0x7f0000002a80)=""/217, 0xd9}, {&(0x7f0000002b80)=""/102, 0x66}], 0xa, &(0x7f0000002cc0)=""/152, 0x98}, 0x9}, {{&(0x7f0000002d80)=@un=@abs, 0x80, &(0x7f0000004000)=[{&(0x7f0000002e00)=""/170, 0xaa}, {&(0x7f0000002ec0)=""/4096, 0x1000}, {&(0x7f0000003ec0)=""/140, 0x8c}, {&(0x7f0000003f80)=""/111, 0x6f}], 0x4, &(0x7f0000004040)=""/214, 0xd6}, 0x3}, {{&(0x7f0000004140)=@ax25, 0x80, &(0x7f0000005540)=[{&(0x7f00000041c0)=""/4096, 0x1000}, {&(0x7f00000051c0)=""/121, 0x79}, {&(0x7f0000005240)=""/189, 0xbd}, {&(0x7f0000005300)=""/234, 0xea}, {&(0x7f0000005400)=""/17, 0x11}, {&(0x7f0000005440)=""/204, 0xcc}], 0x6, &(0x7f00000055c0)=""/72, 0x48}, 0xd76}, {{&(0x7f0000005640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000006b00)=[{&(0x7f00000056c0)=""/34, 0x22}, {&(0x7f0000005700)=""/103, 0x67}, {&(0x7f0000005780)=""/141, 0x8d}, {&(0x7f0000005840)=""/140, 0x8c}, {&(0x7f0000005900)=""/47, 0x2f}, {&(0x7f0000005940)=""/168, 0xa8}, {&(0x7f0000005a00)=""/4096, 0x1000}, {&(0x7f0000006a00)=""/199, 0xc7}], 0x8, &(0x7f0000006b80)=""/207, 0xcf}, 0x1}, {{&(0x7f0000006c80)=@generic, 0x80, &(0x7f0000006dc0)=[{&(0x7f0000006d00)=""/144, 0x90}], 0x1}, 0x7}, {{&(0x7f0000006e00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e80)=""/59, 0x3b}], 0x1}, 0x6}, {{&(0x7f0000006f00)=@nfc_llcp, 0x80, &(0x7f0000007140)=[{&(0x7f0000006f80)=""/51, 0x33}, {&(0x7f0000006fc0)=""/231, 0xe7}, {&(0x7f00000070c0)=""/20, 0x14}, {&(0x7f0000007100)}], 0x4}, 0x200}], 0x8, 0x40012163, &(0x7f0000007380)={0x0, 0x989680}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f00000073c0)={0x0, 0x0, 0x30}, &(0x7f0000007400)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000007440)={r1, 0x4000000000000, 0x30}, &(0x7f0000007480)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 721.918415] xt_time: unknown flags 0x30 14:31:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:18 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 721.963945] overlayfs: unrecognized mount option "lowerdi‰=./file0¡ŸºnÌßÚs=./file1\ " or missing value 14:31:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:18 executing program 0: r0 = request_key(&(0x7f0000000140)='.dead\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)='eth0lo.)wlan1posix_acl_accessselinuxcgroup(keyringmd5sum\x00', 0xfffffffffffffffc) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhci\x00', 0x1, 0x0) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getuid() getresuid(&(0x7f0000000480)=0x0, &(0x7f0000000500), &(0x7f0000000780)) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f0000000940)=0xe8) r11 = getgid() getgroups(0x0, &(0x7f0000000980)=[0xee00, r5, 0xee00]) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r1, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000a80)={{}, {0x1, 0x1}, [{0x2, 0x7, r2}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x6, r6}, {0x2, 0x1, r7}, {0x2, 0x1, r8}, {0x2, 0x5, r9}, {0x2, 0x7, r10}], {0x4, 0x2}, [{0x8, 0x0, r11}, {0x8, 0x2, r12}, {0x8, 0x0, r13}], {0x10, 0x4}, {0x20, 0x4}}, 0x7c, 0x3) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, r0) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = accept4(r14, &(0x7f0000000000)=@ax25, &(0x7f0000000080)=0x80, 0x0) sendmsg$nl_route(r15, &(0x7f0000000540)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {0x3, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}]}, 0x28}}, 0x0) [ 722.190812] xt_time: unknown flags 0x30 [ 722.199231] __ntfs_error: 45 callbacks suppressed [ 722.199253] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 14:31:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 722.233485] overlayfs: unrecognized mount option "lowerdi‰=./file0¡ŸºnÌßÚs=./file1\ " or missing value 14:31:18 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:18 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x2, 0x4001) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f00000000c0)=0x3ff) 14:31:18 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723f2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c009f69e8bb48cab690c751679b6f2a75169f0e1d24373d7b968b23909f36b3a2f473a69529f61dbdb052f3ce43678aaf88be36c375"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 722.372054] xt_time: unknown flags 0x30 14:31:18 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:18 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 722.522829] overlayfs: unrecognized mount option "upperdir?./file0" or missing value 14:31:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:19 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 722.747022] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 722.768428] overlayfs: unrecognized mount option "upperdir?./file0" or missing value [ 722.836396] ntfs: (device loop0): ntfs_fill_super(): Unable to determine device size. 14:31:19 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000600", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000031200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e21, @remote}}, 0x4, 0x7fff, 0x10001, 0x6, 0xe1}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r1, 0xfffffffffffffff8, 0xaf8, 0x4, 0x400, 0x9}, 0x14) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x3, 0x100000001) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000000280)='./file0\x00', 0x400000014104e, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r0, r1, 0x0, 0x400008bc8) [ 723.171385] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 723.209046] overlayfs: failed to resolve './file1': -2 14:31:19 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000f0ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:19 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x7fff}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:19 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x9, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x000\x00\x00\x00\x00\x00\x00', @ANYPTR, @ANYPTR=&(0x7f00000002c0)=ANY=[]], 0x0, 0x0, 0x0}) 14:31:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000f0ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:19 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000011", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 723.546963] binder: 27143:27146 got transaction with invalid offset (0, min 0 max 0) or object. 14:31:19 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) r1 = dup3(r0, r0, 0x80000) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) socket$inet6(0xa, 0x0, 0x3) 14:31:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 723.621757] ntfs: (device loop5): parse_options(): Unrecognized mount option context. [ 723.636566] binder: 27143:27146 transaction failed 29201/-22, size 0-12288 line 3035 [ 723.671010] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 723.681147] binder_alloc: binder_alloc_mmap_handler: 27143 20002000-20006000 already mapped failed -16 [ 723.691415] ntfs: (device loop5): parse_options(): Unrecognized mount option uid<00000000000000000000. [ 723.707428] binder: BINDER_SET_CONTEXT_MGR already set 14:31:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:20 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000006", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 723.714518] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfshat. [ 723.745002] binder: 27143:27146 ioctl 40046207 0 returned -16 14:31:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 723.786751] binder: undelivered TRANSACTION_ERROR: 29201 14:31:20 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000180), 0xc, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="000000000000000004000e000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 723.871003] overlayfs: failed to resolve './file1': -2 14:31:20 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000500", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:20 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r2, r0, 0x0) 14:31:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000f0ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:20 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 724.172244] ntfs: (device loop5): parse_options(): Unrecognized mount option context. 14:31:20 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f0000000480), 0x89) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f0000000280)=0xffffff97) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x105000, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @rand_addr=0x3}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0x2, 0x1000004e23, @local}, 0x10) r1 = memfd_create(&(0x7f0000000200)='Pev ', 0x0) ftruncate(r1, 0x200739) sendfile(r0, r1, 0x0, 0xa00004000000004) [ 724.251947] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000ffffff9e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:20 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:20 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:20 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:21 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 724.736171] overlayfs: filesystem on './file0' not supported as upperdir 14:31:21 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) creat(&(0x7f0000000040)='./file1\x00', 0x40) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 724.944591] time_mt_check: 10 callbacks suppressed [ 724.944599] xt_time: unknown flags 0x30 14:31:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x105000, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000300)) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @rand_addr=0x3}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000040)={0x2, 0x1000004e23, @local}, 0x10) r1 = memfd_create(&(0x7f0000000200)='Pev ', 0x0) ftruncate(r1, 0x200739) sendfile(r0, r1, 0x0, 0xa00004000000004) 14:31:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:21 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000007fff", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000009effffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:21 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 725.251968] overlayfs: filesystem on './file0' not supported as upperdir 14:31:21 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r1 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)) r2 = dup3(r0, r1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000004c0)={0xffffffffffffffff}, 0x117, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000400)=0x1, r3, 0x0, 0x1, 0x4}}, 0x20) getpgid(0xffffffffffffffff) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x8a000, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x78, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0xffffffffffffffff, @empty, 0x4}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e20, 0x4, @mcast1}, @in={0x2, 0x4e23, @rand_addr=0x4}, @in={0x2, 0x4e22, @remote}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f00000003c0)={r5, 0x3}, 0x8) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)=0x0) getpgrp(r6) socket$inet6(0xa, 0x0, 0x3) 14:31:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 725.379233] xt_time: unknown flags 0x30 14:31:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:21 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000007fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 725.651817] xt_time: unknown flags 0x30 14:31:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 725.783905] overlayfs: filesystem on './file0' not supported as upperdir [ 725.968527] xt_time: unknown flags 0x30 [ 725.995987] xt_time: unknown flags 0x30 14:31:22 executing program 0: r0 = socket$inet_tcp(0x2, 0x3, 0x6) sendmsg(r0, &(0x7f0000000480)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x0) getpgrp(0x0) timer_create(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 14:31:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000007fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:22 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000040)='workdir'}, 0x30) ptrace$setregset(0x4205, r0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)}) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000400", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:22 executing program 0: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000002c0)="640f01d10f30c4c21191648b9a65660f38036300262e0fc7ae7fec0471c4e39d48910000000097c4e2a999c9c4e135fadc9a59d9e3853d0166b8f3000f00d0", 0x3f}], 0x1, 0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) clone(0x802122101fc0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key(&(0x7f0000000000)='asymmetric\x00', 0x0, &(0x7f00000000c0)="3058020af10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a711f5a939b4fd0072693a46c08df6616dd21be3453ecf73039a20f43acbc5376139a9070ae27dd847474d1e59b2697801e6ebd80f75ca", 0x5a, 0xfffffffffffffffd) [ 726.255625] xt_time: unknown flags 0x30 14:31:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:22 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:22 executing program 0: 14:31:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 726.354071] PKCS8: Unsupported PKCS#8 version [ 726.371472] overlayfs: filesystem on './file0' not supported as upperdir [ 726.388224] PKCS8: Unsupported PKCS#8 version 14:31:22 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) pkey_alloc(0x0, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, 0xfffffffffffffffe) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 726.539817] xt_time: unknown flags 0x30 14:31:22 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000ffffff9e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:22 executing program 0: 14:31:23 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000fffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:23 executing program 0: 14:31:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 726.885262] xt_time: unknown flags 0x30 [ 726.891191] xt_time: unknown flags 0x30 14:31:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:23 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:23 executing program 0: [ 727.041683] overlayfs: filesystem on './file0' not supported as upperdir [ 727.187000] xt_time: unknown flags 0x30 14:31:23 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x1ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000001c0)=0x10) accept4(r0, &(0x7f0000000280)=@generic, &(0x7f0000000300)=0x80, 0x80800) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x1797b80fa7c69a0e, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x6a000000000000) socket$inet6(0xa, 0x0, 0x3) 14:31:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:23 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:23 executing program 0: 14:31:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 727.209631] __ntfs_error: 24 callbacks suppressed [ 727.209662] ntfs: (device loop5): parse_options(): Unrecognized mount option context. [ 727.262028] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:23 executing program 0: 14:31:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000003120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 727.343377] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:23 executing program 0: 14:31:23 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:23 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 727.671348] overlayfs: filesystem on './file0' not supported as upperdir [ 727.721476] ntfs: (device loop5): parse_options(): Unrecognized mount option context. [ 727.771600] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:24 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0xf5ca, 0x6c, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:24 executing program 0: 14:31:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000003", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000009effffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:24 executing program 0: 14:31:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000f0ffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:24 executing program 0: [ 728.095903] ntfs: (device loop5): parse_options(): Unrecognized mount option context. [ 728.114800] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:24 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x10000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x400000, 0x0) 14:31:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:24 executing program 0: 14:31:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000007fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:24 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 728.350432] overlayfs: failed to resolve './file1': -2 14:31:24 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000004", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:24 executing program 0: 14:31:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 728.585081] ntfs: (device loop5): parse_options(): Unrecognized mount option context. 14:31:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x143) r2 = epoll_create(0x20) r3 = epoll_create(0x7fffffff) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f000000d000)) lseek(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0x1) r5 = epoll_create(0x5) set_tid_address(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r1, &(0x7f0000c7f000)) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000d5dff4)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r4, &(0x7f000050aff4)) [ 728.633511] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:25 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000280)={0x0, 0xfb, 0x112, 0x4, 0x3ff, "180153c643bbca361110c90b14bd2825", "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"}, 0x112, 0x3) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 728.976887] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000007fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) sendfile(r1, r1, 0x0, 0x2) 14:31:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:25 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 729.240274] overlayfs: filesystem on './file0' not supported as upperdir 14:31:25 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nfc_llcp(r1, &(0x7f0000000600)={&(0x7f00000002c0)={0x27, 0x1, 0x2, 0x2, 0x3ff, 0x9, "d1de3305c786986eb4f635af3bed4cb93114832302fae0246021ca92c8c71b9e6a3e2268626c3e9fc9b158777c06d2c2fdcd0c4947a334be6d1c8fd74a96b5", 0x3}, 0x60, &(0x7f0000000400)=[{&(0x7f0000000340)}, {&(0x7f00000004c0)="6c58725821b81de6aa68bd7eb0dafa75cbb834c502c9f53a3dc00c7e071d16d1b3708b5a29d5e12712a19446479339c24741fdc66977f0096b895affc85192ba40b5b5d887c6f213dbde5fe22082cba2a21672678fe2fcbe15c80491b345c215578549bf692c2b4fdc3f35d2f13b3d6f0302289a6e9f6cd64a8b73ee2bebeef18ce2df8fc477948db04ed4450d4c164060170c78596346abefffee57f07dafa57dfeae9c9f10c12b9835271292849cd81502d9e77833aa98880dc63422dd678299ebfaf9b2c4fc141c6cf9a15947e80a5d9602", 0xd3}, {&(0x7f0000000380)="58e05597b6196b2fe838c5e414c47b0ca8f8dad4755d0f21763faf121727d10ea82e5248fc4e3e9049f9325010ee2ed4c611583de0e52b028fd82835899002b79dddb06809e6169aa74af3f116ffab92f3de3f070c9225987e28077d03b538299d5bf33223d6", 0x66}], 0x3, &(0x7f00000005c0)={0x20, 0x0, 0x8001, "a574479d957a1e71ef"}, 0x20}, 0x8000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000640)=""/192) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x111000, 0x0) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000001c0)={0xffffffff, 0x0, 0x8, 0xeea, 0x80000000, 0x6c}) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302cbe541c814796f5f30510065933776f726b6469723d2e2f66696c65315c00"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000280)=0x0) ioprio_get$pid(0x1, r3) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:25 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x9, 0x20011, r1, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0xc, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00c@@', @ANYPTR], 0x0, 0x0, 0x0}) 14:31:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:25 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000b00)) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 729.677324] overlayfs: unrecognized mount option "¾TG–õóY3workdir=./file1\" or missing value [ 729.691763] binder: 27806:27808 transaction failed 29189/-22, size 0-0 line 2834 [ 729.776774] binder_alloc: binder_alloc_mmap_handler: 27806 20002000-20006000 already mapped failed -16 14:31:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 729.820151] binder: 27806:27808 transaction failed 29189/-22, size 0-0 line 2834 14:31:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 729.887266] binder: undelivered TRANSACTION_ERROR: 29189 [ 729.894251] binder: undelivered TRANSACTION_ERROR: 29189 [ 729.903553] overlayfs: unrecognized mount option "¾TG–õóY3workdir=./file1\" or missing value 14:31:26 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c001d173273e9bfd474b05bbaeeeb14e88a94f5fb0c4962788657caa0ba972acf87af6d2bb534035ea216acc26db6a5fd7870f26c6c0b5c79e1155f6998e05b7fffd59b9ffde98a20bd9cbf28b45284c2796458bef41884aef6eeffa666ba16d6be946d82b0da14b8704283f47673d9c1ca118415b6b46c34c54f739020194f490a3db9ac93fc98c23ed2339baeddb545b532147f6117d1"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) 14:31:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000003120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:26 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) 14:31:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000b00)) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 730.173770] time_mt_check: 14 callbacks suppressed [ 730.173780] xt_time: unknown flags 0x30 14:31:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000003", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:26 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 730.388439] xt_time: unknown flags 0x30 14:31:26 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000011", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 730.444715] overlayfs: filesystem on './file0' not supported as upperdir 14:31:26 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000b00)) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:26 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000280)=""/92) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000001c0)={0xfffffffffffffffe, 0x9}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:26 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@context={'context', 0x3d, 'user_u'}}, {@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@uid_lt={'uid<'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000b00)=0xe8) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 730.690614] xt_time: unknown flags 0x30 14:31:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000040)="99", 0x1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x80040, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000080)) getsockopt$inet_opts(r1, 0x0, 0x400000000000009, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) 14:31:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 731.003434] overlayfs: filesystem on './file0' not supported as upperdir [ 731.010468] xt_time: unknown flags 0x30 14:31:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:27 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x200000000003) 14:31:27 executing program 0: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000480)={0x0, 0x0, 'client0\x00', 0x0, "6e505f5a0d001a8a", "4b340c3c941103d07db2a48e4e89ce8035b24cc52773218f184a2bf6cb6cc9c1"}) io_setup(0x95, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) io_pgetevents(r0, 0x9, 0x1, &(0x7f00000000c0)=[{}], &(0x7f0000000140)={r1, r2+30000000}, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r3, 0x11000008912, &(0x7f0000000040)="0a5c2d023c126285718070") syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r5, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r5, 0x4008af03, &(0x7f0000000000)=ANY=[@ANYBLOB="2600000000000000f0"]) dup3(r4, r5, 0x0) 14:31:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000fffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 731.315814] xt_time: unknown flags 0x30 14:31:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 731.506904] xt_time: unknown flags 0x30 14:31:27 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:27 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:27 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) [ 731.607987] overlayfs: filesystem on './file0' not supported as upperdir 14:31:28 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5204, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x3) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x40, 0x0) getsockopt$inet_mreqsrc(r1, 0x0, 0x0, &(0x7f00000000c0)={@dev, @multicast1}, &(0x7f0000000100)=0xc) 14:31:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:28 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x80) syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x0, 0x40001) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x800) socketpair(0xd, 0x800, 0x5, &(0x7f0000000300)) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000340), &(0x7f00000003c0)=0x60) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='rdma.current\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000004c0)='/dev/swradio#\x00', 0x1, 0x2) socket$inet6(0xa, 0x8080e, 0x3) syz_open_dev$midi(&(0x7f0000000500)='/dev/midi#\x00', 0x3, 0x12040) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 731.773533] xt_time: unknown flags 0x30 14:31:28 executing program 0: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x420001, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) write$evdev(r1, &(0x7f0000000180)=[{{0x77359400}, 0x17, 0x1}, {{0x77359400}, 0x5, 0xfffffffffffffffc}, {{0x77359400}, 0x1, 0x3f, 0x4}, {{0x0, 0x7530}, 0x1f, 0x20, 0x80000001}, {{0x0, 0x2710}, 0x15, 0x4, 0x6}, {{0x77359400}, 0x14, 0x6, 0x853}], 0x90) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x3, 0xc22, 0x1001, 0xd, 0x7, 0xb, 0x0, 0x2}}) unshare(0x400) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)={'security\x00', 0x2c, "545d0e6de1903fb204872a5bda46da9c36c110fc63c1a825ed7de61789683580d4a9108b3a21d6792b76c6a0"}, &(0x7f00000002c0)=0x50) pselect6(0x40, &(0x7f0000000140), 0x0, &(0x7f0000000380)={0x7f}, &(0x7f0000000400), 0x0) 14:31:28 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 732.036067] xt_time: unknown flags 0x30 14:31:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:28 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000040)=0x80) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'bond0\x00', &(0x7f0000000080)=@ethtool_cmd={0x1}}) 14:31:28 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 732.266719] __ntfs_error: 21 callbacks suppressed [ 732.266756] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:28 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x10000) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfffffffffffff000}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x7fff, @loopback, 0x1ff}}}, 0x84) getsockopt$inet6_buf(r0, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f00000000c0)=0x28) 14:31:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 732.307275] xt_time: unknown flags 0x30 [ 732.308017] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. [ 732.326125] xt_time: unknown flags 0x30 14:31:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 732.369592] overlayfs: filesystem on './file0' not supported as upperdir 14:31:28 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x7fffe) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000500)='/dev/vsock\x00', 0x40, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40200200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x100, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x1000}}, ["", "", "", ""]}, 0x24}}, 0x400c800) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1a0, 0x0, 0xfffffffffffffffd, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000380)='./file1\x00', 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upperdir=./file0,r=./file0,workdir=..file1\\\x00\x00\x00\x00\x00\x00\x00\x00']) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) linkat(r0, &(0x7f00000003c0)='./file1\x00', r0, &(0x7f0000000400)='./file0\x00', 0x1400) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:28 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) ptrace$getenv(0x4201, r3, 0x400, &(0x7f0000000180)) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"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"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x331) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 14:31:28 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000012030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:28 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000f0ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 732.780100] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 732.816946] kvm [28152]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000035 data 0x0 14:31:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 732.859673] kvm [28152]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000031 data 0x0 [ 732.872907] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:29 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000280)=0x7fffffff) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(0xffffffffffffff9c, r1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f00000001c0), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000f0ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:29 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000028c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000002900)=0x3, 0x4) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) r1 = gettid() r2 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x101000) read(r2, 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0x80089203, 0x20000000) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r1, 0x2000000000000015) 14:31:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:29 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 733.316927] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 733.331478] overlayfs: filesystem on './file0' not supported as upperdir [ 733.342899] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000007fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:29 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, &(0x7f0000000580)=""/66) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:29 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x7, 0x20) lstat(&(0x7f0000000100)='./file1\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f0000000580)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000006c0)={{0x3, r2, r3, r4, r5, 0x21, 0xe784}, 0x9, 0x8000, 0x2}) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6ff765726469723d2e2f66696c65302c776f726b646972352e2f66696c65315c0083a4cb26238e542508a32bb84aa73e03a8bdc6e4561576db43f460f86edd37cdef1f2fcf70ae7b32172d467cc9c404e9511ab8e07a56a2ed2c9c249bf7eeb9bee735c12ba77607a70d24b269ce8bb468d8d9dd7d13df4f6e893a24eb4a5ef9a9078c810789c0f423f8e1179be8b9746aca56859984bc71e6588f16c3d89ab4f4e5e5a6a92236f0a11749bd549f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8fffff5000069a2f8ff00000000bf2000000000000095"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x5, 0x100, 0x400}, 0x10) r7 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r7, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r7, 0x107, 0x5, &(0x7f0000001000), 0x224) syz_emit_ethernet(0x66, &(0x7f0000000140)={@empty=[0x2b], @random="1b207f5c5eeb", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x8100}}}}}}, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r8, 0x4008af14, &(0x7f0000000300)={0x0, 0x100}) ioctl$EVIOCSABS2F(r8, 0x401845ef, &(0x7f00000001c0)={0x80000001, 0x101, 0x200, 0x1, 0x4c4, 0x52ad}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) 14:31:29 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r4) recvfrom$packet(r3, &(0x7f0000000440)=""/91, 0x5b, 0x0, 0x0, 0x0) r5 = getegid() chown(0x0, 0x0, r5) socket$alg(0x26, 0x5, 0x0) accept4$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x2711}, 0x10, 0x800) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f00000003c0)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000700)=0x55cc) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000008c0)={0x0, 0xed3, 0x1, [], &(0x7f0000000880)={0xa00902, 0x80000000, [], @ptr=0x7f}}) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) 14:31:29 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) [ 733.658081] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 733.738105] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 733.834641] overlayfs: unrecognized mount option "lo÷erdir=./file0" or missing value 14:31:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4040000) 14:31:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 734.041213] overlayfs: unrecognized mount option "lo÷erdir=./file0" or missing value 14:31:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040003) [ 734.226547] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:30 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) ioctl$int_out(r0, 0x2, &(0x7f00000001c0)) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:30 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(0xffffffffffffffff, 0xc004aea7, &(0x7f0000a1cffc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) mlock2(&(0x7f0000bbd000/0x1000)=nil, 0x1000, 0x0) sendfile(r1, r1, &(0x7f0000b58000)=0x200000, 0xffff) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0xff60}, 0xe3c7) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)="2f6578650000c10000000000e9ff0700000000000054fa07424adee916d2da75afe70b35a0fd6a1f0200f5ab26d7a071fb35331ce39c5a6568641006d7c0206a74e33326530000000000000000000000") renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in=@local}}, {{@in=@multicast2}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000600)={{{@in6, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000001c0)=0xe8) ioprio_get$uid(0x3, r4) recvfrom$packet(r3, &(0x7f0000000440)=""/91, 0x5b, 0x0, 0x0, 0x0) r5 = getegid() chown(0x0, 0x0, r5) socket$alg(0x26, 0x5, 0x0) accept4$vsock_stream(r0, &(0x7f00000002c0)={0x28, 0x0, 0x2711}, 0x10, 0x800) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f00000003c0)) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000700)=0x55cc) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000008c0)={0x0, 0xed3, 0x1, [], &(0x7f0000000880)={0xa00902, 0x80000000, [], @ptr=0x7f}}) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000300), 0x4) 14:31:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 734.312596] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 734.419350] overlayfs: failed to resolve './file1': -2 14:31:30 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x404000a) 14:31:30 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) 14:31:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:31 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f00000001c0)=0x5) socket$inet6(0xa, 0x0, 0x3) 14:31:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000f0ffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040004) 14:31:31 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x7, 0x20) lstat(&(0x7f0000000100)='./file1\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000400), &(0x7f0000000540), &(0x7f0000000580)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000005c0)={0x0, 0x0}, &(0x7f0000000600)=0xc) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000006c0)={{0x3, r2, r3, r4, r5, 0x21, 0xe784}, 0x9, 0x8000, 0x2}) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6ff765726469723d2e2f66696c65302c776f726b646972352e2f66696c65315c0083a4cb26238e542508a32bb84aa73e03a8bdc6e4561576db43f460f86edd37cdef1f2fcf70ae7b32172d467cc9c404e9511ab8e07a56a2ed2c9c249bf7eeb9bee735c12ba77607a70d24b269ce8bb468d8d9dd7d13df4f6e893a24eb4a5ef9a9078c810789c0f423f8e1179be8b9746aca56859984bc71e6588f16c3d89ab4f4e5e5a6a92236f0a11749bd549f"]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8fffff5000069a2f8ff00000000bf2000000000000095"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x5, 0x100, 0x400}, 0x10) r7 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r7, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r7, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r7, 0x107, 0x5, &(0x7f0000001000), 0x224) syz_emit_ethernet(0x66, &(0x7f0000000140)={@empty=[0x2b], @random="1b207f5c5eeb", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x18}, @local}, @gre={{0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x8100}}}}}}, 0x0) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r8, 0x4008af14, &(0x7f0000000300)={0x0, 0x100}) ioctl$EVIOCSABS2F(r8, 0x401845ef, &(0x7f00000001c0)={0x80000001, 0x101, 0x200, 0x1, 0x4c4, 0x52ad}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) 14:31:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000003120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040002) 14:31:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x0, 0x0) 14:31:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000031200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040700) [ 735.465100] overlayfs: filesystem on './file0' not supported as upperdir [ 735.486223] time_mt_check: 12 callbacks suppressed [ 735.486232] xt_time: unknown flags 0x30 14:31:31 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000006", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:31 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r0, 0x118, 0x1, &(0x7f00000001c0)=0x8, 0x4) socket$inet6(0xa, 0x0, 0x3) [ 735.609966] overlayfs: unrecognized mount option "lo÷erdir=./file0" or missing value 14:31:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000fffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x0, 0x0) [ 735.773469] xt_time: unknown flags 0x30 14:31:32 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200080) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x410002}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x112, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0xffffffffffffff2b, 0x11, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc800}, 0x7ff) r2 = eventfd2(0x0, 0x0) fallocate(r2, 0x60, 0x0, 0x4) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r0, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) eventfd2(0xc6d5, 0x800) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f00000001c0)=0x1, 0x4) 14:31:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4047400) 14:31:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000007fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 736.038139] xt_time: unknown flags 0x30 14:31:32 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2, 0x11, r3, 0x0) ioctl$KVM_SET_CPUID2(0xffffffffffffffff, 0x4008ae90, &(0x7f0000001040)=ANY=[@ANYBLOB="06000000000000000000000000000000000000000000000000000000000000000000000000000000001e0000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000100000000000000000000000000000000000000000000000004916f6c8bd7ec16d000000000000000000000000000000040000000000000007"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) 14:31:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000f0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 736.071631] overlayfs: filesystem on './file0' not supported as upperdir 14:31:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040009) 14:31:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:32 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x0, 0x0) 14:31:32 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x10000) write$P9_RLCREATE(r0, &(0x7f00000001c0)={0x18, 0xf, 0x2, {{0x80, 0x1, 0x5}, 0x7ff}}, 0x18) socket$inet6(0xa, 0x0, 0x3) 14:31:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 736.358606] xt_time: unknown flags 0x30 14:31:32 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000000)=0x6154, 0x4) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000040)={0x9, 0x6, 0x2004}) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-aesni-avx2\x00'}, 0x58) socket$rds(0x15, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 14:31:32 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040011) 14:31:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000ffffff9e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 736.626668] xt_time: unknown flags 0x30 14:31:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000120300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000005", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:33 executing program 5 (fault-call:8 fault-nth:0): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 736.770468] overlayfs: filesystem on './file0' not supported as upperdir 14:31:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040007) [ 736.820283] FAULT_INJECTION: forcing a failure. [ 736.820283] name failslab, interval 1, probability 0, space 0, times 0 [ 736.892614] CPU: 1 PID: 28575 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 736.900033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 736.909397] Call Trace: [ 736.912007] dump_stack+0x244/0x39d [ 736.915657] ? dump_stack_print_info.cold.1+0x20/0x20 [ 736.920879] should_fail.cold.4+0xa/0x17 [ 736.924955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 736.930075] ? lock_downgrade+0x900/0x900 [ 736.934232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 736.939775] ? proc_fail_nth_write+0x9e/0x210 [ 736.944284] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 736.948888] ? find_held_lock+0x36/0x1c0 [ 736.952976] ? perf_trace_sched_process_exec+0x860/0x860 [ 736.958438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 736.963985] __should_failslab+0x124/0x180 [ 736.968240] should_failslab+0x9/0x14 [ 736.972046] __kmalloc+0x2e0/0x760 [ 736.975600] ? strncpy_from_user+0x5a0/0x5a0 [ 736.980012] ? fput+0x130/0x1a0 [ 736.983305] ? do_syscall_64+0x9a/0x820 [ 736.987283] ? __x64_sys_memfd_create+0x142/0x4f0 [ 736.992350] ? do_syscall_64+0x9a/0x820 [ 736.996342] __x64_sys_memfd_create+0x142/0x4f0 [ 737.001043] ? trace_hardirqs_on+0x310/0x310 [ 737.005455] ? memfd_fcntl+0x1910/0x1910 [ 737.009531] do_syscall_64+0x1b9/0x820 [ 737.013428] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 737.018805] ? syscall_return_slowpath+0x5e0/0x5e0 [ 737.023754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.028649] ? trace_hardirqs_on_caller+0x310/0x310 [ 737.033673] ? prepare_exit_to_usermode+0x291/0x3b0 [ 737.038715] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 737.043567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 737.049193] RIP: 0033:0x457679 [ 737.052395] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 737.071302] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 737.079014] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 737.086284] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 14:31:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000031200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 737.093565] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 737.100834] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5db85606d4 [ 737.108111] R13: 00000000004c5617 R14: 00000000004d9be0 R15: 0000000000000004 14:31:33 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x10000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000280)={{0x1, 0x1, 0x4, 0x0, 0x3}, 0x3d, 0xa38, 0x9}) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 737.209065] xt_time: unknown flags 0x30 14:31:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000088", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040010) [ 737.286889] overlayfs: failed to resolve './file1': -2 [ 737.385411] xt_time: unknown flags 0x30 14:31:33 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x24, r2, 0x500, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xffffffffffffffff}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x80) socket$inet6(0xa, 0x1, 0x3ff) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r3 = socket$inet6(0xa, 0x7, 0x0) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bind$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) accept4$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, 0x0, 0x0) recvmmsg(r3, &(0x7f0000007580), 0x40000000000017c, 0x0, &(0x7f00000077c0)={0x77359400}) 14:31:33 executing program 5 (fault-call:8 fault-nth:1): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000f0ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:33 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 737.505334] overlayfs: failed to resolve './file1': -2 14:31:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4044002) 14:31:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 737.630624] xt_time: unknown flags 0x30 14:31:34 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:34 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r1 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) getpid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x8, &(0x7f0000000280)='overlay\x00'}, 0x30) getpgrp(r2) socket$inet6(0xa, 0x0, 0x3) 14:31:34 executing program 0: mknod(&(0x7f00000010c0)='./file0/file0\x00', 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/autofs\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0xc008240a, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) link(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='./file0/file0\x00') 14:31:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000fffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040074) [ 737.838569] xt_time: unknown flags 0x30 [ 737.852017] FAULT_INJECTION: forcing a failure. [ 737.852017] name failslab, interval 1, probability 0, space 0, times 0 [ 737.866688] CPU: 0 PID: 28635 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 737.874070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 737.883427] Call Trace: [ 737.883487] dump_stack+0x244/0x39d [ 737.883531] ? dump_stack_print_info.cold.1+0x20/0x20 [ 737.883561] ? debug_smp_processor_id+0x1c/0x20 [ 737.886599] overlayfs: failed to resolve './file1': -2 [ 737.889779] ? perf_trace_lock+0x14d/0x7a0 [ 737.889805] should_fail.cold.4+0xa/0x17 [ 737.889842] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 737.918868] ? perf_trace_lock+0x14d/0x7a0 [ 737.923151] ? find_held_lock+0x36/0x1c0 [ 737.927253] ? expand_files.part.8+0x571/0x9a0 [ 737.931890] ? perf_trace_sched_process_exec+0x860/0x860 [ 737.937390] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 737.942169] __should_failslab+0x124/0x180 [ 737.946446] should_failslab+0x9/0x14 [ 737.950262] kmem_cache_alloc+0x2be/0x730 [ 737.950281] ? kasan_check_read+0x1/0x20 [ 737.950325] ? shmem_destroy_callback+0xc0/0xc0 [ 737.958534] shmem_alloc_inode+0x1b/0x40 [ 737.958554] alloc_inode+0x63/0x190 [ 737.958571] new_inode_pseudo+0x71/0x1a0 [ 737.958590] ? prune_icache_sb+0x1c0/0x1c0 [ 737.979235] new_inode+0x1c/0x40 [ 737.982621] shmem_get_inode+0xf1/0x920 [ 737.986645] ? shmem_encode_fh+0x340/0x340 [ 737.990899] ? lock_downgrade+0x900/0x900 [ 737.995102] ? lock_release+0xa00/0xa00 [ 737.999095] ? retint_kernel+0x2d/0x2d [ 738.003028] __shmem_file_setup.part.50+0x83/0x2a0 [ 738.007996] shmem_file_setup+0x65/0x90 [ 738.011993] __x64_sys_memfd_create+0x2af/0x4f0 [ 738.016679] ? memfd_fcntl+0x1910/0x1910 [ 738.020785] do_syscall_64+0x1b9/0x820 [ 738.024685] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 738.030081] ? syscall_return_slowpath+0x5e0/0x5e0 [ 738.035023] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.039888] ? trace_hardirqs_on_caller+0x310/0x310 [ 738.044921] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 738.049958] ? prepare_exit_to_usermode+0x291/0x3b0 [ 738.054995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.059865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.065084] RIP: 0033:0x457679 [ 738.068324] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:31:34 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 738.087238] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 738.094958] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 738.102238] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 738.109515] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 738.116809] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5db85606d4 [ 738.124088] R13: 00000000004c5617 R14: 00000000004d9be0 R15: 0000000000000004 14:31:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000008c0)={&(0x7f0000000000), 0xc, &(0x7f0000000880)={&(0x7f0000001940)=@setlink={0x48, 0x13, 0x1, 0x0, 0x0, {}, [@IFLA_VFINFO_LIST={0x14, 0x16, [{0x10, 0x1, [@typed={0xc, 0x7, @str='syz_tun\x00'}]}]}, @IFLA_IFNAME={0x14, 0x3, 'bond_slave_1\x00'}]}, 0x48}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x783200, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000080)={0x8f, ""/143}) 14:31:34 executing program 5 (fault-call:8 fault-nth:2): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x1e, &(0x7f0000000380)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x8}, 0xb6) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000600)={&(0x7f00000005c0)=[0x5, 0x24], 0x2, 0x8, 0xfffffffffffff800, 0x7f, 0x2, 0x0, {0xfff, 0x15d, 0x0, 0x1f, 0x9, 0xfffffffffffffff8, 0x3, 0x800, 0x0, 0x0, 0x7fffffff, 0x0, 0x401, 0x1, "ba72e70a4e16b84605d6f4e45b7abb4a79bf9fcb21f1d337345e26141b559e50"}}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x1}, 0x2c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r1, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xc0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x10013c93e) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000000007, 0x7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0xb6, 0x0, 0x10001, 0x7f}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000200)={0x3, r5, 0x0, 0x81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, 0x20) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000400)=0x84) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) [ 738.389147] xt_time: unknown flags 0x30 14:31:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x404110b) 14:31:34 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000009effffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:34 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x40, 0x6, [0x940, 0x9, 0x87, 0x400, 0x8, 0x2]}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000380)=r1, 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f00000003c0), &(0x7f00000004c0)=0x60) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f776572642298ae3cc750e88e09f23311262f17e909cc60077ce4d266696c65302c776f726b646972bd2e2f66696c65315c00000000008f2623c0c0d30748beb03412f201a50cc3d1e5283595f7b73e3eb67e0a4dc730a4e99f12b2e63863e779e2528b2dab4d9ea0cfc2b0833d6251962ac8c4fe152dc98df7246a3159707a20a92aacc481a2fc5977dcb958752e03fec5f93fc45ae8d765e07a7d62969536bc17b2e8ec99faf48d04787e1c5b157743c6c5c3f9d0cc422afac82295ac575c08d8b8549f5da609aaa555d74705b51d790f84647ec07fe4075f2a6c6641f142"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$update(0x2, r2, &(0x7f0000000580)="6da0f559c3a8201c", 0x8) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x2) [ 738.533925] FAULT_INJECTION: forcing a failure. [ 738.533925] name failslab, interval 1, probability 0, space 0, times 0 [ 738.584911] CPU: 1 PID: 28722 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 738.592302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 738.601664] Call Trace: [ 738.604271] dump_stack+0x244/0x39d [ 738.607929] ? dump_stack_print_info.cold.1+0x20/0x20 [ 738.613147] should_fail.cold.4+0xa/0x17 [ 738.617259] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 738.622389] ? __kernel_text_address+0xd/0x40 [ 738.626902] ? print_usage_bug+0xc0/0xc0 [ 738.630998] ? find_held_lock+0x36/0x1c0 [ 738.635099] ? perf_trace_sched_process_exec+0x860/0x860 [ 738.640569] __should_failslab+0x124/0x180 [ 738.640601] should_failslab+0x9/0x14 [ 738.648627] kmem_cache_alloc+0x2be/0x730 [ 738.652787] ? mpol_shared_policy_init+0x235/0x650 [ 738.657737] ? trace_hardirqs_on_caller+0xc0/0x310 [ 738.662677] ? current_time+0x72/0x1b0 [ 738.666585] __d_alloc+0xc8/0xb90 [ 738.670056] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 738.670074] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 738.670091] ? ktime_get_coarse_real_ts64+0x22e/0x370 [ 738.670108] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 738.670125] ? timespec64_trunc+0xea/0x180 [ 738.670148] ? inode_init_owner+0x340/0x340 [ 738.699412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 738.704176] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 738.708759] ? retint_kernel+0x2d/0x2d [ 738.712668] ? trace_hardirqs_on_caller+0xc0/0x310 [ 738.712717] ? current_time+0x131/0x1b0 [ 738.712730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 738.712752] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 738.721651] ? __lockdep_init_map+0x105/0x590 [ 738.721682] d_alloc_pseudo+0x1d/0x30 [ 738.721708] alloc_file_pseudo+0x158/0x3f0 [ 738.744417] ? alloc_file+0x4d0/0x4d0 [ 738.748229] ? clear_nlink+0x44/0xe0 [ 738.752011] ? clear_nlink+0x5a/0xe0 [ 738.755748] __shmem_file_setup.part.50+0x110/0x2a0 [ 738.760780] shmem_file_setup+0x65/0x90 [ 738.760806] __x64_sys_memfd_create+0x2af/0x4f0 [ 738.760823] ? memfd_fcntl+0x1910/0x1910 [ 738.760848] do_syscall_64+0x1b9/0x820 [ 738.777421] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 14:31:35 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 738.782825] ? syscall_return_slowpath+0x5e0/0x5e0 [ 738.784330] input:  as /devices/virtual/input/input11 [ 738.787786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.787812] ? trace_hardirqs_on_caller+0x310/0x310 [ 738.787834] ? prepare_exit_to_usermode+0x291/0x3b0 [ 738.787856] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 738.787876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 738.812841] RIP: 0033:0x457679 [ 738.812857] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 738.812880] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 738.812910] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 738.812920] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 738.812929] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 738.812938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5db85606d4 14:31:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040500) [ 738.812947] R13: 00000000004c5617 R14: 00000000004d9be0 R15: 0000000000000004 14:31:35 executing program 5 (fault-call:8 fault-nth:3): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:35 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f7574650000000000000000000000000000000000000000000000000002", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 739.042531] overlayfs: unrecognized mount option "lowerd"˜®<ÇPèŽ ò3&/é Ì`|äÒfile0" or missing value 14:31:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040008) [ 739.096053] FAULT_INJECTION: forcing a failure. [ 739.096053] name failslab, interval 1, probability 0, space 0, times 0 [ 739.115070] CPU: 0 PID: 28769 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 739.122456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.131819] Call Trace: [ 739.134435] dump_stack+0x244/0x39d [ 739.138124] ? dump_stack_print_info.cold.1+0x20/0x20 [ 739.143350] ? debug_smp_processor_id+0x1c/0x20 [ 739.143374] ? perf_trace_lock+0x14d/0x7a0 [ 739.143401] should_fail.cold.4+0xa/0x17 [ 739.143426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 739.143456] ? lock_is_held_type+0x210/0x210 [ 739.143480] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 739.143502] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 739.143531] ? trace_hardirqs_on_caller+0xc0/0x310 [ 739.152597] ? zap_class+0x640/0x640 [ 739.152620] ? find_held_lock+0x36/0x1c0 [ 739.152708] ? perf_trace_sched_process_exec+0x860/0x860 [ 739.152739] ? lock_downgrade+0x900/0x900 [ 739.152763] __should_failslab+0x124/0x180 [ 739.152783] should_failslab+0x9/0x14 [ 739.152798] kmem_cache_alloc+0x2be/0x730 [ 739.152811] ? d_set_d_op+0x31d/0x410 [ 739.152837] __alloc_file+0xa8/0x470 [ 739.152854] ? file_free_rcu+0xd0/0xd0 [ 739.152870] ? d_instantiate+0x79/0xa0 [ 739.152891] ? lock_downgrade+0x900/0x900 [ 739.184597] ? kasan_check_read+0x11/0x20 [ 739.184615] ? do_raw_spin_unlock+0xa7/0x330 [ 739.184632] ? do_raw_spin_trylock+0x270/0x270 [ 739.184655] alloc_empty_file+0x72/0x170 [ 739.184677] alloc_file+0x5e/0x4d0 [ 739.184690] ? _raw_spin_unlock+0x2c/0x50 [ 739.184715] alloc_file_pseudo+0x261/0x3f0 [ 739.184738] ? alloc_file+0x4d0/0x4d0 [ 739.184771] ? usercopy_warn+0x110/0x110 [ 739.214547] __shmem_file_setup.part.50+0x110/0x2a0 [ 739.214573] shmem_file_setup+0x65/0x90 [ 739.214593] __x64_sys_memfd_create+0x2af/0x4f0 [ 739.214611] ? memfd_fcntl+0x1910/0x1910 [ 739.214642] do_syscall_64+0x1b9/0x820 [ 739.214658] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 14:31:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040900) [ 739.214678] ? syscall_return_slowpath+0x5e0/0x5e0 [ 739.214710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.214744] ? trace_hardirqs_on_caller+0x310/0x310 [ 739.214780] ? prepare_exit_to_usermode+0x291/0x3b0 [ 739.214816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.214854] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 739.214880] RIP: 0033:0x457679 [ 739.214897] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 739.226374] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 739.226391] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 739.226401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 739.226411] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 739.226421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5db85606d4 [ 739.226432] R13: 00000000004c5617 R14: 00000000004d9be0 R15: 0000000000000004 [ 739.481837] overlayfs: unrecognized mount option "lowerd"˜®<ÇPèŽ ò3&/é Ì`|äÒfile0" or missing value [ 739.565122] input:  as /devices/virtual/input/input12 14:31:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x1e, &(0x7f0000000380)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x8}, 0xb6) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000600)={&(0x7f00000005c0)=[0x5, 0x24], 0x2, 0x8, 0xfffffffffffff800, 0x7f, 0x2, 0x0, {0xfff, 0x15d, 0x0, 0x1f, 0x9, 0xfffffffffffffff8, 0x3, 0x800, 0x0, 0x0, 0x7fffffff, 0x0, 0x401, 0x1, "ba72e70a4e16b84605d6f4e45b7abb4a79bf9fcb21f1d337345e26141b559e50"}}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x1}, 0x2c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r1, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xc0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x10013c93e) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000000007, 0x7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0xb6, 0x0, 0x10001, 0x7f}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000200)={0x3, r5, 0x0, 0x81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, 0x20) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000400)=0x84) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 14:31:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040300) 14:31:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:36 executing program 5 (fault-call:8 fault-nth:4): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:36 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000280)=@ax25, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000300)=""/175, 0xaf}, 0x2000) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000ffffff9e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 739.750213] FAULT_INJECTION: forcing a failure. [ 739.750213] name failslab, interval 1, probability 0, space 0, times 0 [ 739.779182] CPU: 0 PID: 28811 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 739.786567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.795924] Call Trace: 14:31:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 739.795951] dump_stack+0x244/0x39d [ 739.795978] ? dump_stack_print_info.cold.1+0x20/0x20 [ 739.796003] ? debug_smp_processor_id+0x1c/0x20 [ 739.796031] ? perf_trace_lock+0x14d/0x7a0 [ 739.807421] should_fail.cold.4+0xa/0x17 [ 739.807446] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 739.807480] ? is_bpf_text_address+0xd3/0x170 [ 739.830038] ? kernel_text_address+0x79/0xf0 [ 739.834461] ? __kernel_text_address+0xd/0x40 [ 739.834522] overlayfs: failed to resolve './file1': -2 [ 739.838978] ? unwind_get_return_address+0x61/0xa0 [ 739.838999] ? __save_stack_trace+0x8d/0xf0 [ 739.839021] ? find_held_lock+0x36/0x1c0 [ 739.839057] ? __x64_sys_memfd_create+0x2af/0x4f0 [ 739.862490] ? perf_trace_sched_process_exec+0x860/0x860 [ 739.868008] __should_failslab+0x124/0x180 [ 739.872311] should_failslab+0x9/0x14 [ 739.876147] kmem_cache_alloc_trace+0x2d7/0x750 [ 739.880832] ? __might_sleep+0x95/0x190 [ 739.884825] apparmor_file_alloc_security+0x17b/0xac0 [ 739.890033] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 739.894812] ? apparmor_path_rename+0xcd0/0xcd0 14:31:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 739.899495] ? retint_kernel+0x2d/0x2d [ 739.903463] ? creds_are_invalid+0x45/0x140 [ 739.907830] security_file_alloc+0x4c/0xa0 [ 739.912115] __alloc_file+0x12a/0x470 [ 739.916423] ? file_free_rcu+0xd0/0xd0 [ 739.916445] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 739.916470] ? retint_kernel+0x2d/0x2d [ 739.916498] alloc_empty_file+0x72/0x170 [ 739.916521] alloc_file+0x5e/0x4d0 [ 739.936621] ? _raw_spin_unlock+0x2c/0x50 [ 739.940794] alloc_file_pseudo+0x261/0x3f0 [ 739.945065] ? alloc_file+0x4d0/0x4d0 [ 739.948951] __shmem_file_setup.part.50+0x110/0x2a0 [ 739.953991] shmem_file_setup+0x65/0x90 [ 739.958001] __x64_sys_memfd_create+0x2af/0x4f0 [ 739.962697] ? memfd_fcntl+0x1910/0x1910 [ 739.966793] do_syscall_64+0x1b9/0x820 [ 739.970695] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 739.976081] ? syscall_return_slowpath+0x5e0/0x5e0 [ 739.981037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 739.985904] ? trace_hardirqs_on_caller+0x310/0x310 [ 739.990938] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 739.995978] ? prepare_exit_to_usermode+0x291/0x3b0 [ 740.001043] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.005928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.011142] RIP: 0033:0x457679 [ 740.014351] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 14:31:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4046000) [ 740.014360] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 740.014391] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457679 [ 740.014401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bc816 [ 740.014411] RBP: 000000000072bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 740.014421] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f5db85606d4 [ 740.014431] R13: 00000000004c5617 R14: 00000000004d9be0 R15: 0000000000000004 14:31:36 executing program 5 (fault-call:8 fault-nth:5): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:36 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={"62726f757465000000000000000000000000000000000000000000000000007f", 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 740.120605] input:  as /devices/virtual/input/input13 [ 740.289179] FAULT_INJECTION: forcing a failure. [ 740.289179] name failslab, interval 1, probability 0, space 0, times 0 [ 740.289267] CPU: 1 PID: 28858 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 740.308007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 740.317368] Call Trace: [ 740.319967] dump_stack+0x244/0x39d [ 740.323619] ? dump_stack_print_info.cold.1+0x20/0x20 [ 740.328833] ? should_fail+0xaf1/0xd01 [ 740.328872] should_fail.cold.4+0xa/0x17 [ 740.328894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 740.328923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.336863] ? check_preemption_disabled+0x48/0x280 [ 740.336888] ? debug_smp_processor_id+0x1c/0x20 [ 740.336905] ? perf_trace_lock+0x14d/0x7a0 [ 740.336926] ? find_held_lock+0x36/0x1c0 [ 740.365565] ? perf_trace_sched_process_exec+0x860/0x860 [ 740.371045] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 740.376518] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.382075] __should_failslab+0x124/0x180 [ 740.386327] should_failslab+0x9/0x14 [ 740.390135] kmem_cache_alloc+0x2be/0x730 [ 740.394332] ? retint_kernel+0x2d/0x2d [ 740.398241] getname_flags+0xd0/0x590 [ 740.402054] getname+0x19/0x20 [ 740.405252] do_sys_open+0x383/0x700 [ 740.408978] ? filp_open+0x80/0x80 [ 740.412544] ? trace_hardirqs_off_caller+0x310/0x310 [ 740.417660] ? do_sys_ftruncate+0x449/0x550 [ 740.422019] __x64_sys_open+0x7e/0xc0 [ 740.425845] do_syscall_64+0x1b9/0x820 [ 740.429737] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 740.435106] ? syscall_return_slowpath+0x5e0/0x5e0 [ 740.440080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.444930] ? trace_hardirqs_on_caller+0x310/0x310 [ 740.449955] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 740.454980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 740.460575] ? prepare_exit_to_usermode+0x291/0x3b0 [ 740.465681] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 740.470541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 740.475746] RIP: 0033:0x4112b1 [ 740.478945] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 740.497938] RSP: 002b:00007f5db855fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 740.505654] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 740.512926] RDX: 00007f5db855fafa RSI: 0000000000000002 RDI: 00007f5db855faf0 [ 740.520196] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 740.527469] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 740.534742] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 [ 740.595812] time_mt_check: 7 callbacks suppressed [ 740.595821] xt_time: unknown flags 0x30 14:31:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x1e, &(0x7f0000000380)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x8}, 0xb6) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000600)={&(0x7f00000005c0)=[0x5, 0x24], 0x2, 0x8, 0xfffffffffffff800, 0x7f, 0x2, 0x0, {0xfff, 0x15d, 0x0, 0x1f, 0x9, 0xfffffffffffffff8, 0x3, 0x800, 0x0, 0x0, 0x7fffffff, 0x0, 0x401, 0x1, "ba72e70a4e16b84605d6f4e45b7abb4a79bf9fcb21f1d337345e26141b559e50"}}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x1}, 0x2c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r1, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xc0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x10013c93e) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000000007, 0x7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0xb6, 0x0, 0x10001, 0x7f}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000200)={0x3, r5, 0x0, 0x81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, 0x20) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000400)=0x84) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 14:31:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x404e803) 14:31:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:37 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) removexattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=@random={'btrfs.', 'vboxnet1\x00'}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x9, 0x0, "500c1378dd855e053d18752eb89fb3d81036b126a15dd4de79a25bc245f067d0"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) r1 = socket$inet6(0xa, 0x0, 0x3) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r1}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000001c0)={0x5, 0x7, 0x80000000, 0xc02, 0x0}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=r3, @ANYBLOB="700000001ff40b38a2aac427f88b5317702302d48e0e202f3bdda40f1b8c554db454ba41c5ae5e973f25e8df08802593577dd5bea9c580ce6121fde7d638e9ea9779726543952e811e28a1f92f596e1830877cfb1e5faaf863036a818f0f8a24250409bd35a187259899fa4072fcda138c5e6d0bc1f806fc23af860b5bd901c5c6c874f7f09be18fd08f83f357589c70942aab995473a26f2d15758981380e29f43c9553690cc14f2c1d9df4149edc8931f907597597981d000000000000000000000000"], &(0x7f0000000340)=0x78) 14:31:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 740.780255] xt_time: unknown flags 0x30 14:31:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:37 executing program 5 (fault-call:8 fault-nth:6): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x404000e) [ 740.894625] input:  as /devices/virtual/input/input14 [ 741.075207] xt_time: unknown flags 0x30 [ 741.076926] FAULT_INJECTION: forcing a failure. [ 741.076926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 741.091041] CPU: 1 PID: 28921 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 741.098411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.107779] Call Trace: [ 741.110400] dump_stack+0x244/0x39d [ 741.114046] ? dump_stack_print_info.cold.1+0x20/0x20 [ 741.119269] ? lock_is_held_type+0x210/0x210 14:31:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040005) [ 741.123734] should_fail.cold.4+0xa/0x17 [ 741.127845] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 741.132967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.138539] ? check_preemption_disabled+0x48/0x280 [ 741.138565] ? debug_smp_processor_id+0x1c/0x20 [ 741.138592] ? mark_held_locks+0x130/0x130 [ 741.138607] ? lock_is_held_type+0x210/0x210 [ 741.138627] ? zap_class+0x640/0x640 [ 741.152552] ? print_usage_bug+0xc0/0xc0 [ 741.152575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 14:31:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0xa, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 741.152594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.152612] ? check_preemption_disabled+0x48/0x280 [ 741.152636] ? debug_smp_processor_id+0x1c/0x20 [ 741.152652] ? perf_trace_lock+0x14d/0x7a0 [ 741.152673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.152693] ? should_fail+0x22d/0xd01 [ 741.199272] ? lock_is_held_type+0x210/0x210 [ 741.203741] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 741.208874] ? mark_held_locks+0xc7/0x130 [ 741.213047] __alloc_pages_nodemask+0x366/0xea0 [ 741.217734] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.223315] ? __alloc_pages_slowpath+0x2de0/0x2de0 [ 741.223336] ? debug_smp_processor_id+0x1c/0x20 [ 741.223353] ? perf_trace_lock+0x14d/0x7a0 [ 741.223376] ? find_held_lock+0x36/0x1c0 [ 741.223423] ? trace_hardirqs_off+0xb8/0x310 [ 741.223445] cache_grow_begin+0xa5/0x8c0 [ 741.233119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 741.233138] ? check_preemption_disabled+0x48/0x280 [ 741.233163] kmem_cache_alloc+0x66b/0x730 [ 741.233180] ? do_sys_ftruncate+0x428/0x550 [ 741.233209] getname_flags+0xd0/0x590 [ 741.233227] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 741.233247] getname+0x19/0x20 [ 741.233263] do_sys_open+0x383/0x700 [ 741.233283] ? filp_open+0x80/0x80 [ 741.233313] ? __x64_sys_open+0x11/0xc0 [ 741.233334] __x64_sys_open+0x7e/0xc0 [ 741.233353] do_syscall_64+0x1b9/0x820 [ 741.233369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 741.233389] ? syscall_return_slowpath+0x5e0/0x5e0 [ 741.233405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.233424] ? trace_hardirqs_on_caller+0x310/0x310 [ 741.233443] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 741.233459] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 741.233476] ? prepare_exit_to_usermode+0x291/0x3b0 [ 741.233500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 741.233524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 741.233537] RIP: 0033:0x4112b1 [ 741.233554] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 741.233563] RSP: 002b:00007f5db855fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 741.233578] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 [ 741.233588] RDX: 00007f5db855fafa RSI: 0000000000000002 RDI: 00007f5db855faf0 [ 741.233597] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 741.233607] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 741.233617] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 [ 741.305680] kernel msg: ebtables bug: please report to author: Valid hook without chain [ 741.457725] overlayfs: filesystem on './file0' not supported as upperdir [ 741.493468] __ntfs_error: 10 callbacks suppressed [ 741.493641] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x1e, &(0x7f0000000380)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0x0, 0x8}, 0xb6) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, &(0x7f0000000600)={&(0x7f00000005c0)=[0x5, 0x24], 0x2, 0x8, 0xfffffffffffff800, 0x7f, 0x2, 0x0, {0xfff, 0x15d, 0x0, 0x1f, 0x9, 0xfffffffffffffff8, 0x3, 0x800, 0x0, 0x0, 0x7fffffff, 0x0, 0x401, 0x1, "ba72e70a4e16b84605d6f4e45b7abb4a79bf9fcb21f1d337345e26141b559e50"}}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x0, 0x1}, 0x2c) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r1, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xc0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000001c0)=0x4) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180), 0x10013c93e) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1000000000000007, 0x7) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000000c0)={0xb6, 0x0, 0x10001, 0x7f}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f0000000200)={0x3, r5, 0x0, 0x81}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1}, 0x20) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{}, 'syz1\x00'}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000400)=0x84) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 14:31:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x40401f4) 14:31:37 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x25, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 741.510102] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:37 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='upprdir=./file0,lowerdir=./file0,workdir=./file1\\\x00']) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 741.617793] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:31:38 executing program 5 (fault-call:8 fault-nth:7): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 741.765142] overlayfs: unrecognized mount option "upprdir=./file0" or missing value 14:31:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x60, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040e00) [ 741.811368] input:  as /devices/virtual/input/input15 [ 741.898863] FAULT_INJECTION: forcing a failure. [ 741.898863] name failslab, interval 1, probability 0, space 0, times 0 [ 741.932643] CPU: 0 PID: 28978 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 741.940034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 741.949398] Call Trace: [ 741.952006] dump_stack+0x244/0x39d [ 741.955680] ? dump_stack_print_info.cold.1+0x20/0x20 [ 741.960895] ? debug_smp_processor_id+0x1c/0x20 [ 741.960926] ? perf_trace_lock+0x14d/0x7a0 [ 741.969869] should_fail.cold.4+0xa/0x17 [ 741.969891] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 741.969912] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 741.977673] overlayfs: unrecognized mount option "upprdir=./file0" or missing value [ 741.979066] ? retint_kernel+0x2d/0x2d [ 741.995508] ? trace_hardirqs_on_caller+0xc0/0x310 [ 742.000456] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.005256] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 742.010827] ? print_usage_bug+0xc0/0xc0 [ 742.014898] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.020459] ? check_preemption_disabled+0x48/0x280 [ 742.025491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.030279] ? retint_kernel+0x2d/0x2d [ 742.034198] ? ___might_sleep+0x141/0x340 [ 742.038368] ? debug_smp_processor_id+0x1c/0x20 [ 742.043043] ? perf_trace_sched_process_exec+0x860/0x860 [ 742.048507] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.053285] __should_failslab+0x124/0x180 [ 742.057561] should_failslab+0x9/0x14 [ 742.061370] kmem_cache_alloc+0x2be/0x730 [ 742.065536] ? zap_class+0x640/0x640 [ 742.069269] __alloc_file+0xa8/0x470 [ 742.072999] ? print_usage_bug+0xc0/0xc0 [ 742.077066] ? file_free_rcu+0xd0/0xd0 [ 742.080976] ? find_held_lock+0x36/0x1c0 [ 742.085056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 742.090599] ? check_preemption_disabled+0x48/0x280 [ 742.095631] alloc_empty_file+0x72/0x170 [ 742.099704] path_openat+0x170/0x5150 [ 742.103519] ? lock_is_held_type+0x210/0x210 [ 742.107934] ? trace_hardirqs_on_caller+0xc0/0x310 [ 742.112871] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 742.117644] ? zap_class+0x640/0x640 [ 742.121375] ? path_lookupat.isra.43+0xc00/0xc00 [ 742.126148] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 742.131170] ? expand_files.part.8+0x571/0x9a0 [ 742.135779] ? find_held_lock+0x36/0x1c0 [ 742.139853] ? __alloc_fd+0x347/0x6e0 [ 742.143663] ? lock_downgrade+0x900/0x900 [ 742.147815] ? getname+0x19/0x20 [ 742.151207] ? kasan_check_read+0x11/0x20 [ 742.155364] ? do_raw_spin_unlock+0xa7/0x330 [ 742.159809] ? do_raw_spin_trylock+0x270/0x270 [ 742.164415] ? __lock_is_held+0xb5/0x140 [ 742.168477] ? __check_object_size+0xb1/0x782 [ 742.172988] ? _raw_spin_unlock+0x2c/0x50 [ 742.177142] ? __alloc_fd+0x347/0x6e0 [ 742.180965] do_filp_open+0x255/0x380 [ 742.184777] ? may_open_dev+0x100/0x100 [ 742.188807] ? get_unused_fd_flags+0x122/0x1a0 [ 742.193409] ? __alloc_fd+0x6e0/0x6e0 [ 742.197229] do_sys_open+0x568/0x700 [ 742.200952] ? filp_open+0x80/0x80 [ 742.204501] ? trace_hardirqs_on+0x310/0x310 [ 742.208924] ? trace_hardirqs_off_caller+0x310/0x310 [ 742.214034] ? do_sys_ftruncate+0x449/0x550 [ 742.218377] __x64_sys_open+0x7e/0xc0 [ 742.222189] do_syscall_64+0x1b9/0x820 [ 742.226142] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 742.231514] ? syscall_return_slowpath+0x5e0/0x5e0 [ 742.236468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.241328] ? trace_hardirqs_on_caller+0x310/0x310 [ 742.246359] ? prepare_exit_to_usermode+0x291/0x3b0 [ 742.251422] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 742.256306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 742.261500] RIP: 0033:0x4112b1 [ 742.264722] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 742.283626] RSP: 002b:00007f5db855fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 742.291365] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004112b1 14:31:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 742.298637] RDX: 00007f5db855fafa RSI: 0000000000000002 RDI: 00007f5db855faf0 [ 742.305907] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 742.313180] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 742.320450] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 14:31:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x55, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 742.411500] xt_time: unknown flags 0x30 14:31:38 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="75707065726469723d2e2f667296640c04a0e9ca3e302c6c6f7765726469723d2e2f66696c6530726b6469723d2e2f667f6c65315c000000000000000000"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 742.538015] kernel msg: ebtables bug: please report to author: Valid hook without chain 14:31:38 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="230000005e0081aee4050c00000f00000000a300001832e0948bc609f6d8db51260185", 0x23}], 0x1}, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'vlan0\x00', 0x6200}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x40096100, 0x0) 14:31:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4041100) 14:31:38 executing program 5 (fault-call:8 fault-nth:8): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:38 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x55, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 742.628452] overlayfs: missing 'workdir' [ 742.671487] kernel msg: ebtables bug: please report to author: Total nentries is wrong 14:31:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:39 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x9, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4043f00) [ 742.838237] overlayfs: missing 'workdir' 14:31:39 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)="230000005e0081aee4050c00000f00000000a300001832e0948bc609f6d8db51260185", 0x23}], 0x1}, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'vlan0\x00', 0x6200}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x40096100, 0x0) 14:31:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000f0ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 742.885758] kernel msg: ebtables bug: please report to author: Total nentries is wrong 14:31:39 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x404001, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) 14:31:39 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x63, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040060) [ 743.131697] kernel msg: ebtables bug: please report to author: Total nentries is wrong 14:31:39 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x2, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 743.191429] FAULT_INJECTION: forcing a failure. [ 743.191429] name failslab, interval 1, probability 0, space 0, times 0 [ 743.236146] CPU: 1 PID: 29091 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 743.243531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.243540] Call Trace: [ 743.243568] dump_stack+0x244/0x39d [ 743.243599] ? dump_stack_print_info.cold.1+0x20/0x20 [ 743.243628] ? should_fail.cold.4+0x5/0x17 [ 743.268585] should_fail.cold.4+0xa/0x17 [ 743.272672] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 743.277797] ? debug_smp_processor_id+0x1c/0x20 [ 743.282495] ? perf_trace_lock+0x14d/0x7a0 [ 743.286751] ? flexible_sched_in+0x11f/0xc70 [ 743.291178] ? check_preemption_disabled+0x48/0x280 [ 743.296202] ? print_usage_bug+0xc0/0xc0 [ 743.296223] ? zap_class+0x640/0x640 [ 743.296240] ? debug_smp_processor_id+0x1c/0x20 [ 743.296256] ? perf_trace_lock+0x14d/0x7a0 [ 743.296282] ? find_held_lock+0x36/0x1c0 [ 743.296317] ? __lock_is_held+0xb5/0x140 [ 743.303187] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 743.304169] ? i2c_check_addr_busy+0x148/0x160 [ 743.304203] ? perf_trace_sched_process_exec+0x860/0x860 [ 743.313426] overlayfs: filesystem on './file0' not supported as upperdir [ 743.317143] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.317172] __should_failslab+0x124/0x180 [ 743.317193] should_failslab+0x9/0x14 [ 743.346204] kmem_cache_alloc_trace+0x2d7/0x750 [ 743.355185] ? __init_waitqueue_head+0x6/0x150 [ 743.355209] __kthread_create_on_node+0x137/0x540 [ 743.355233] ? loop_get_status64+0x140/0x140 [ 743.377497] ? kthread_parkme+0xb0/0xb0 [ 743.381515] ? __lockdep_init_map+0x105/0x590 [ 743.386019] ? __lockdep_init_map+0x105/0x590 [ 743.390522] ? loop_get_status64+0x140/0x140 [ 743.394965] kthread_create_on_node+0xb1/0xe0 [ 743.399474] ? __kthread_create_on_node+0x540/0x540 [ 743.404499] ? trace_hardirqs_off_caller+0x310/0x310 [ 743.409631] lo_ioctl+0x7f6/0x1d60 [ 743.413186] ? lo_rw_aio+0x1ef0/0x1ef0 [ 743.417085] blkdev_ioctl+0x98e/0x21b0 [ 743.420996] ? blkpg_ioctl+0xc10/0xc10 [ 743.424906] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 743.429491] ? retint_kernel+0x2d/0x2d [ 743.433400] ? trace_hardirqs_on_caller+0xc0/0x310 [ 743.438335] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 743.443315] ? kasan_check_read+0x11/0x20 [ 743.447470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.452233] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 743.457690] ? rcu_softirq_qs+0x20/0x20 [ 743.461684] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 743.466456] ? retint_kernel+0x2d/0x2d [ 743.470359] ? do_vfs_ioctl+0xd1/0x1790 [ 743.474351] block_ioctl+0xee/0x130 [ 743.477984] ? blkdev_fallocate+0x400/0x400 [ 743.482347] do_vfs_ioctl+0x1de/0x1790 [ 743.486252] ? ioctl_preallocate+0x300/0x300 [ 743.490664] ? __fget_light+0x2e9/0x430 [ 743.494691] ? fget_raw+0x20/0x20 [ 743.498162] ? write_comp_data+0x70/0x70 [ 743.502249] ? putname+0xf7/0x130 [ 743.505720] ? do_syscall_64+0x9a/0x820 [ 743.509700] ? do_syscall_64+0x9a/0x820 [ 743.513685] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 743.518301] ? security_file_ioctl+0x94/0xc0 [ 743.522737] ksys_ioctl+0xa9/0xd0 [ 743.526201] __x64_sys_ioctl+0x73/0xb0 [ 743.530111] do_syscall_64+0x1b9/0x820 [ 743.534015] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 743.539388] ? syscall_return_slowpath+0x5e0/0x5e0 [ 743.544348] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 743.549216] ? trace_hardirqs_on_caller+0x310/0x310 [ 743.554241] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 743.559266] ? prepare_exit_to_usermode+0x291/0x3b0 [ 743.564310] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 743.569256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 743.574459] RIP: 0033:0x4574e7 [ 743.577661] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 743.596575] RSP: 002b:00007f5db853ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 743.604297] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 743.611567] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 743.618852] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 743.626137] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 743.633414] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 14:31:40 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000100)=0x2000000000080000, 0x4) ppoll(&(0x7f0000000140)=[{r0}], 0x1, &(0x7f0000000080), &(0x7f0000000280), 0x8) 14:31:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x40403e8) 14:31:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000031200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:40 executing program 5 (fault-call:8 fault-nth:9): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000fffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 743.799411] xt_time: unknown flags 0x30 14:31:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 743.879136] FAULT_INJECTION: forcing a failure. [ 743.879136] name failslab, interval 1, probability 0, space 0, times 0 [ 743.936794] CPU: 1 PID: 29130 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 743.944196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 743.953556] Call Trace: [ 743.956166] dump_stack+0x244/0x39d [ 743.959828] ? dump_stack_print_info.cold.1+0x20/0x20 [ 743.965036] ? print_usage_bug+0xc0/0xc0 [ 743.969133] should_fail.cold.4+0xa/0x17 [ 743.973214] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 743.978344] ? mark_held_locks+0xc7/0x130 [ 743.982510] ? mark_held_locks+0xc7/0x130 14:31:40 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) mount$9p_xen(&(0x7f0000000400)='\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x12000, &(0x7f0000000540)={'trans=xen,', {[{@fscache='fscache'}], [{@dont_hash='dont_hash'}, {@obj_type={'obj_type', 0x3d, 'overlay\x00'}}]}}) r0 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x0, 0x2) getsockopt$nfc_llcp(r0, 0x118, 0x3, &(0x7f0000000300)=""/46, 0x2e) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8042, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e22, @local}, 0x10) r2 = getpgid(0xffffffffffffffff) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f00000001c0)=r2) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) lsetxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f00000003c0)=@v1={0x1000000, [{0x98e, 0x8}]}, 0xc, 0x2) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x4, 0x800000013) 14:31:40 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000a80)={0xbee, 0x100000001, 0xfffffffffffffffc, 0x7}) r1 = socket$inet6(0xa, 0x7fffe, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000580)={{0x1, 0x7, 0x100000001, 0x1, '\x00', 0x23}, 0x0, [0x3, 0x7, 0x2, 0x0, 0x10001, 0x8ec2, 0x2, 0x400, 0x20, 0xe4c00000000, 0x7, 0x2, 0x2, 0x2, 0x0, 0x7, 0x9, 0x5, 0x5, 0x7, 0x8, 0x81, 0x5, 0x3, 0x6, 0x401, 0x76, 0x3, 0xbe79, 0x6, 0x100000001, 0x4, 0x74bd, 0x9, 0x1, 0x7, 0xa7, 0x101, 0x5, 0x28, 0x5, 0x7, 0x8, 0x3, 0x1, 0x4, 0xf2d3, 0x30000000, 0xff, 0xa2, 0x8f98, 0x9000000000000000, 0x0, 0x9, 0x5, 0x9, 0x3, 0x800, 0x6, 0x9, 0x1f, 0x10000000000000, 0x2, 0x80000001, 0x3, 0x3fef, 0x2, 0x6, 0x6, 0x4, 0x40f5, 0x4, 0x785b, 0x401, 0xff, 0x6, 0x7fffffff, 0x9, 0x3, 0x9, 0x2, 0x4, 0x80000000, 0x0, 0x401, 0x3907, 0x401, 0xffffffffffffff7f, 0xff, 0xffffffff, 0xfffffffffffffff8, 0x7, 0x8000, 0xd0, 0x800, 0x4, 0x29c, 0x3, 0x9, 0x1, 0x81, 0xa61, 0x1, 0x1, 0xffffffff80000000, 0x7, 0x4, 0x2, 0xe73e, 0x3fffffff80, 0x7f, 0x9, 0x81, 0x75, 0x3, 0x6, 0x3, 0x2, 0x8, 0x9d5b, 0x7, 0x3f, 0x6, 0x1000, 0x9, 0xfff, 0x8000, 0xc26]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x400, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0xaa2) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x14, &(0x7f0000000040)={@mcast2={0xff, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000280)={{{@in=@empty, @in6=@mcast2, 0x4e21, 0x7, 0x4e22, 0x4adf, 0xa, 0x20, 0x80, 0x89, r5, r6}, {0x3, 0x1f, 0xb5, 0x9, 0xfff, 0x4, 0x4, 0x8}, {0x8, 0x8, 0x9, 0x80}, 0x7fffffff, 0x6e6bc0, 0x2, 0x0, 0x2, 0x3}, {{@in6=@local, 0x4d3, 0xff}, 0xa, @in=@multicast1, 0x0, 0x1, 0x3, 0x9b19, 0x4, 0x38, 0x80}}, 0xe8) 14:31:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000f0ffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:40 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000340)={[], 0xd3af, 0x12, 0x5, 0x0, 0x4, 0xd000, 0x1, [], 0x9}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket(0x18, 0x0, 0x0) io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x3, 0x0, 0x4, 0x0, 0x5, [{0x4, 0x9, 0x1000, 0x0, 0x0, 0x2}, {0x1, 0x100, 0xa8, 0x0, 0x0, 0x3008}, {0x400, 0x2b2a4a0e, 0x9, 0x0, 0x0, 0x4}, {0x6, 0x335e4f65, 0x8, 0x0, 0x0, 0x1000}, {0x8001, 0x0, 0x4, 0x0, 0x0, 0x3100}]}) io_submit(r4, 0x2, &(0x7f0000000000)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r3, &(0x7f0000000080), 0x121}]) 14:31:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4044000) [ 743.986677] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 743.991273] ? retint_kernel+0x2d/0x2d [ 743.995181] ? trace_hardirqs_on_caller+0xc0/0x310 [ 744.000125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.004902] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 744.007886] xt_time: unknown flags 0x30 [ 744.010360] ? find_held_lock+0x36/0x1c0 [ 744.010389] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.010433] ? retint_kernel+0x2d/0x2d [ 744.017667] xt_time: unknown flags 0x30 [ 744.018502] __should_failslab+0x124/0x180 [ 744.018524] should_failslab+0x9/0x14 [ 744.018544] kmem_cache_alloc_trace+0x2d7/0x750 [ 744.043854] ? check_preemption_disabled+0x48/0x280 [ 744.048901] __kthread_create_on_node+0x137/0x540 [ 744.053748] ? loop_get_status64+0x140/0x140 [ 744.058166] ? kthread_parkme+0xb0/0xb0 [ 744.062137] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 744.066752] ? retint_kernel+0x2d/0x2d [ 744.070630] ? trace_hardirqs_on_caller+0xc0/0x310 [ 744.075566] ? __lockdep_init_map+0x105/0x590 [ 744.080076] ? __lockdep_init_map+0x105/0x590 [ 744.084566] ? loop_get_status64+0x140/0x140 [ 744.088971] kthread_create_on_node+0xb1/0xe0 [ 744.093478] ? __kthread_create_on_node+0x540/0x540 [ 744.098499] ? lo_ioctl+0x638/0x1d60 [ 744.102225] lo_ioctl+0x7f6/0x1d60 [ 744.105776] ? lo_rw_aio+0x1ef0/0x1ef0 [ 744.109692] blkdev_ioctl+0x98e/0x21b0 [ 744.113591] ? blkpg_ioctl+0xc10/0xc10 [ 744.117467] ? lock_downgrade+0x900/0x900 [ 744.121606] ? check_preemption_disabled+0x48/0x280 [ 744.126637] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 744.131567] ? kasan_check_read+0x11/0x20 [ 744.135705] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 744.140969] ? rcu_softirq_qs+0x20/0x20 [ 744.144936] ? __fget+0x4d1/0x740 [ 744.148391] ? ksys_dup3+0x680/0x680 [ 744.152119] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 744.157563] block_ioctl+0xee/0x130 [ 744.161178] ? blkdev_fallocate+0x400/0x400 [ 744.165492] do_vfs_ioctl+0x1de/0x1790 [ 744.169369] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.174140] ? ioctl_preallocate+0x300/0x300 [ 744.178535] ? __fget_light+0x2e9/0x430 [ 744.182495] ? fget_raw+0x20/0x20 [ 744.185942] ? rcu_read_lock_sched_held+0x14f/0x180 [ 744.190963] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.195717] ? security_file_ioctl+0x94/0xc0 [ 744.200115] ksys_ioctl+0xa9/0xd0 [ 744.203610] __x64_sys_ioctl+0x73/0xb0 [ 744.207518] do_syscall_64+0x1b9/0x820 [ 744.211390] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 744.216741] ? syscall_return_slowpath+0x5e0/0x5e0 [ 744.221660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.226497] ? trace_hardirqs_on_caller+0x310/0x310 [ 744.231549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.237122] ? prepare_exit_to_usermode+0x291/0x3b0 [ 744.242129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 744.246979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 744.252166] RIP: 0033:0x4574e7 [ 744.255358] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 744.274286] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 744.282001] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 744.289257] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 744.296513] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 744.303769] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 744.311026] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 14:31:40 executing program 5 (fault-call:8 fault-nth:10): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:40 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:40 executing program 0: r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x200005, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x4, 0x20000000, 0x9, r4, 0x8, 0x0, 'syz0\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x534, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000280)) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) r7 = dup2(r5, r5) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={r6, @rand_addr=0x80000000, @rand_addr=0x1cb}, 0xc) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r7, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r1, 0x402, 0x4) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) exit(0x0) perf_event_open(&(0x7f0000000940)={0x2, 0xfffffffffffffdaa, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x1f}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x48040, 0x0) close(r8) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)="2f70726f632f737973c962440100000063012f76732f54aa080e61699d3600000000000000", 0x2, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x4693af02}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x5, 0x70}, &(0x7f00000000c0)=0xc) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r10, 0x891c, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @broadcast}}) 14:31:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040a00) [ 744.601568] xt_time: unknown flags 0x30 [ 744.656997] FAULT_INJECTION: forcing a failure. [ 744.656997] name failslab, interval 1, probability 0, space 0, times 0 [ 744.676355] CPU: 0 PID: 29179 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 744.683768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.693124] Call Trace: [ 744.695749] dump_stack+0x244/0x39d [ 744.699426] ? dump_stack_print_info.cold.1+0x20/0x20 [ 744.704662] should_fail.cold.4+0xa/0x17 [ 744.708755] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 744.713883] ? zap_class+0x640/0x640 [ 744.717613] ? __lock_acquire+0x62f/0x4c20 [ 744.721863] ? print_usage_bug+0xc0/0xc0 [ 744.725937] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 744.731492] ? check_preemption_disabled+0x48/0x280 [ 744.736532] ? debug_smp_processor_id+0x1c/0x20 [ 744.741220] ? perf_trace_lock+0x14d/0x7a0 [ 744.745471] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.750252] ? lock_is_held_type+0x210/0x210 [ 744.754681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.759451] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 744.764918] ? zap_class+0x640/0x640 [ 744.768652] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.773428] ? print_usage_bug+0xc0/0xc0 [ 744.777514] __should_failslab+0x124/0x180 [ 744.781795] should_failslab+0x9/0x14 [ 744.785608] kmem_cache_alloc+0x47/0x730 [ 744.789700] ? lock_downgrade+0x900/0x900 [ 744.793873] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 744.799600] idr_get_free+0x7a4/0xf70 [ 744.803450] ? radix_tree_iter_tag_clear+0x90/0x90 [ 744.808411] ? __save_stack_trace+0x8d/0xf0 [ 744.812793] ? mark_held_locks+0xc7/0x130 [ 744.816954] ? save_stack+0x43/0xd0 [ 744.820598] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.825367] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 744.829971] ? retint_kernel+0x2d/0x2d [ 744.833869] ? trace_hardirqs_on_caller+0xc0/0x310 [ 744.838805] ? __x64_sys_ioctl+0x73/0xb0 [ 744.842876] ? do_syscall_64+0x1b9/0x820 [ 744.846947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.851719] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 744.857184] ? find_held_lock+0x36/0x1c0 [ 744.861268] idr_alloc_u32+0x1d4/0x3a0 [ 744.865193] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 744.870048] ? lock_acquire+0x1ed/0x520 [ 744.874035] ? __kernfs_new_node+0x14e/0x8d0 [ 744.878457] ? check_preemption_disabled+0x3a/0x280 [ 744.883496] idr_alloc_cyclic+0x166/0x350 [ 744.887664] ? idr_alloc+0x1b0/0x1b0 [ 744.891389] ? __radix_tree_preload+0x1f7/0x280 [ 744.896068] __kernfs_new_node+0x1ee/0x8d0 [ 744.900325] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 744.905118] ? lock_is_held_type+0x210/0x210 [ 744.909691] ? print_usage_bug+0xc0/0xc0 [ 744.913768] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.918512] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 744.923986] ? zap_class+0x640/0x640 [ 744.927717] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 744.932495] ? find_held_lock+0x36/0x1c0 [ 744.936619] kernfs_new_node+0x95/0x120 [ 744.940598] kernfs_create_dir_ns+0x4d/0x160 [ 744.945002] internal_create_group+0x5fc/0xd80 [ 744.949578] ? remove_files.isra.1+0x190/0x190 [ 744.954164] ? up_write+0x7b/0x220 [ 744.957717] ? down_write_nested+0x130/0x130 [ 744.962122] ? down_read+0x120/0x120 [ 744.965856] sysfs_create_group+0x1f/0x30 [ 744.970024] lo_ioctl+0x1307/0x1d60 [ 744.973672] ? lo_rw_aio+0x1ef0/0x1ef0 [ 744.977584] blkdev_ioctl+0x98e/0x21b0 [ 744.981496] ? blkpg_ioctl+0xc10/0xc10 [ 744.985389] ? lock_downgrade+0x900/0x900 [ 744.989563] ? check_preemption_disabled+0x48/0x280 [ 744.994598] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 744.999549] ? kasan_check_read+0x11/0x20 [ 745.003697] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 745.008989] ? rcu_softirq_qs+0x20/0x20 [ 745.012991] ? __fget+0x4d1/0x740 [ 745.016454] ? ksys_dup3+0x680/0x680 [ 745.020160] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 745.025607] block_ioctl+0xee/0x130 [ 745.029223] ? blkdev_fallocate+0x400/0x400 [ 745.033535] do_vfs_ioctl+0x1de/0x1790 [ 745.037424] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 745.042017] ? retint_kernel+0x2d/0x2d [ 745.045907] ? ioctl_preallocate+0x300/0x300 [ 745.050430] ? __fget_light+0x2e9/0x430 [ 745.054396] ? fget_raw+0x20/0x20 [ 745.057842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 745.062616] ? retint_kernel+0x2d/0x2d [ 745.066497] ? security_file_ioctl+0x94/0xc0 [ 745.070909] ksys_ioctl+0xa9/0xd0 [ 745.074362] __x64_sys_ioctl+0x73/0xb0 [ 745.078255] do_syscall_64+0x1b9/0x820 [ 745.082143] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 745.087521] ? syscall_return_slowpath+0x5e0/0x5e0 [ 745.092462] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.097337] ? trace_hardirqs_on_caller+0x310/0x310 [ 745.102361] ? prepare_exit_to_usermode+0x291/0x3b0 [ 745.107398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 745.112250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 745.117428] RIP: 0033:0x4574e7 [ 745.120628] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 745.139516] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 745.147249] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 14:31:41 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000fffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 745.154507] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 745.161788] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 745.169068] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 745.176336] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 [ 745.242509] xt_time: unknown flags 0x30 [ 745.259953] xt_time: unknown flags 0x30 [ 745.284553] overlayfs: filesystem on './file0' not supported as upperdir 14:31:41 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @remote}, &(0x7f00000001c0)=0x10) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000280)={0x9, {{0x2, 0x4e20, @remote}}}, 0x88) 14:31:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x404f401) 14:31:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:41 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:41 executing program 0: r0 = pkey_alloc(0x0, 0x2) pkey_free(r0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer2\x00', 0x141003, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000006c0)) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x200005, 0x0) r4 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000500)={{0x0, 0x1, 0x20, 0x46, '\x00', 0x1}, 0x4, 0x20000000, 0x9, r4, 0x8, 0x0, 'syz0\x00', &(0x7f0000000440)=['/proc/sys/net/ipv4/vs/snat_reroute\x00', ']\x00', '^lowlan0vboxnet0\x00', 'selinux@\x00', 'bdev\x00', '\x00', 'ip6gre0\x00', ')procproc/[\x00'], 0x59, [], [0x3, 0x0, 0x534, 0x101]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000700)={{{@in=@remote, @in6}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000b9bff0)={0x2, 0x2004e21}, 0x10) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000280)) r5 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r5, 0x89f2, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x100000000000000, &(0x7f00000004c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) r7 = dup2(r5, r5) setsockopt$inet_pktinfo(r7, 0x0, 0x8, &(0x7f0000000400)={r6, @rand_addr=0x80000000, @rand_addr=0x1cb}, 0xc) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') connect$inet6(r7, &(0x7f0000000640)={0xa, 0x4e24, 0x595e, @local, 0x2d3}, 0x1c) fcntl$notify(r1, 0x402, 0x4) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) exit(0x0) perf_event_open(&(0x7f0000000940)={0x2, 0xfffffffffffffdaa, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x1f}, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x48040, 0x0) close(r8) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000900)="2f70726f632f737973c962440100000063012f76732f54aa080e61699d3600000000000000", 0x2, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r9, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x4693af02}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x5, 0x70}, &(0x7f00000000c0)=0xc) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r10, 0x891c, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @broadcast}}) [ 745.487708] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 745.515796] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:42 executing program 5 (fault-call:8 fault-nth:11): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040b11) 14:31:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 745.743755] time_mt_check: 1 callbacks suppressed [ 745.743759] xt_time: unknown flags 0x30 [ 745.757225] xt_time: unknown flags 0x30 [ 745.768329] overlayfs: filesystem on './file0' not supported as upperdir 14:31:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040240) 14:31:42 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = socket$nl_crypto(0x10, 0x3, 0x15) clock_gettime(0x0, &(0x7f00000021c0)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000020c0)=[{{&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @remote}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000004c0)=""/105, 0x69}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x2, &(0x7f0000001540)=""/171, 0xab}, 0x1}, {{&(0x7f0000001600)=@generic, 0x80, &(0x7f0000001940)=[{&(0x7f0000001680)=""/139, 0x8b}, {&(0x7f0000001740)=""/219, 0xdb}, {&(0x7f0000001840)=""/209, 0xd1}], 0x3}, 0x3}, {{&(0x7f0000001980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a00)=""/121, 0x79}, {&(0x7f0000001a80)=""/64, 0x40}, {&(0x7f0000001ac0)=""/217, 0xd9}, {&(0x7f0000001bc0)=""/76, 0x4c}], 0x4, &(0x7f0000001c80)}, 0x7fff}, {{&(0x7f0000001cc0)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001d40)=""/172, 0xac}, {&(0x7f0000001e00)=""/40, 0x28}, {&(0x7f0000001e40)=""/2, 0x2}, {&(0x7f0000001e80)=""/153, 0x99}, {&(0x7f0000001f40)=""/14, 0xe}], 0x5, &(0x7f0000002000)=""/138, 0x8a}, 0x20000000000}], 0x4, 0x0, &(0x7f0000002200)={r1, r2+10000000}) inotify_init1(0x807ff) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x2, 0x24040) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0xfffffffffffff5c6}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000002c0)={r4, 0x63, "a593d2971645f3b09a0adf98bd6afa7e8ee7343803ad7334a4f53407f4bda20d3b92413d14966c85173b8f601b93f54ebed30ff00c883395ee1798b292563227a2d5cf20f221e161c11d09747a5e22c7acf4d11278f32d9d7fa9ee7dfca2e075d43b8f"}, &(0x7f0000000340)=0x6b) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 745.929459] xt_time: unknown flags 0x30 [ 745.944400] FAULT_INJECTION: forcing a failure. [ 745.944400] name failslab, interval 1, probability 0, space 0, times 0 [ 745.956601] CPU: 0 PID: 29269 Comm: syz-executor5 Not tainted 4.20.0-rc6+ #371 [ 745.963975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 745.973336] Call Trace: [ 745.975954] dump_stack+0x244/0x39d [ 745.979604] ? dump_stack_print_info.cold.1+0x20/0x20 [ 745.984862] ? should_fail+0xaf1/0xd01 [ 745.988790] should_fail.cold.4+0xa/0x17 [ 745.993205] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 745.998343] ? zap_class+0x640/0x640 [ 746.002089] ? __lock_acquire+0x62f/0x4c20 [ 746.006366] ? print_usage_bug+0xc0/0xc0 [ 746.010439] ? zap_class+0x640/0x640 [ 746.014163] ? lock_unpin_lock+0x4a0/0x4a0 [ 746.018415] ? print_usage_bug+0xc0/0xc0 [ 746.022500] ? print_usage_bug+0xc0/0xc0 [ 746.026594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.031368] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 746.035960] ? retint_kernel+0x2d/0x2d [ 746.039857] ? trace_hardirqs_on_caller+0xc0/0x310 [ 746.044800] ? zap_class+0x640/0x640 [ 746.048532] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 746.053999] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.058793] ? print_usage_bug+0xc0/0xc0 [ 746.062878] __should_failslab+0x124/0x180 [ 746.067159] should_failslab+0x9/0x14 [ 746.070985] kmem_cache_alloc+0x47/0x730 [ 746.075058] ? lock_downgrade+0x900/0x900 [ 746.079227] radix_tree_node_alloc.constprop.19+0x1f7/0x370 [ 746.084976] idr_get_free+0x7a4/0xf70 [ 746.088804] ? radix_tree_iter_tag_clear+0x90/0x90 [ 746.093751] ? __save_stack_trace+0x8d/0xf0 [ 746.098108] ? mark_held_locks+0xc7/0x130 [ 746.102272] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.107102] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 746.111697] ? retint_kernel+0x2d/0x2d [ 746.115594] ? trace_hardirqs_on_caller+0xc0/0x310 [ 746.120540] ? kasan_slab_alloc+0x12/0x20 [ 746.124713] ? kmem_cache_alloc+0x12e/0x730 [ 746.129047] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.133820] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 746.139281] ? sysfs_create_group+0x1f/0x30 [ 746.143644] ? lo_ioctl+0x1307/0x1d60 [ 746.147457] ? blkdev_ioctl+0x98e/0x21b0 [ 746.151529] ? block_ioctl+0xee/0x130 [ 746.155344] ? do_vfs_ioctl+0x1de/0x1790 [ 746.159433] ? ksys_ioctl+0xa9/0xd0 [ 746.163100] ? __x64_sys_ioctl+0x73/0xb0 [ 746.167176] ? do_syscall_64+0x1b9/0x820 [ 746.171258] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.176083] idr_alloc_u32+0x1d4/0x3a0 [ 746.179990] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 746.184857] ? __lock_is_held+0xb5/0x140 [ 746.188940] idr_alloc_cyclic+0x166/0x350 [ 746.193163] ? idr_alloc+0x1b0/0x1b0 [ 746.196892] ? __radix_tree_preload+0x1f7/0x280 [ 746.201585] __kernfs_new_node+0x1ee/0x8d0 [ 746.205853] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 746.210630] ? print_usage_bug+0xc0/0xc0 [ 746.214710] ? print_usage_bug+0xc0/0xc0 [ 746.218787] ? __schedule+0x168a/0x21d0 [ 746.222781] ? zap_class+0x640/0x640 [ 746.226528] ? zap_class+0x640/0x640 [ 746.230266] ? find_held_lock+0x36/0x1c0 [ 746.234368] kernfs_new_node+0x95/0x120 [ 746.238395] kernfs_create_dir_ns+0x4d/0x160 [ 746.242836] internal_create_group+0x5fc/0xd80 [ 746.247472] ? remove_files.isra.1+0x190/0x190 [ 746.252083] ? up_write+0x7b/0x220 [ 746.255636] ? down_write_nested+0x130/0x130 [ 746.260057] ? down_read+0x120/0x120 [ 746.263789] ? __loop_update_dio+0x394/0x6b0 [ 746.268212] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 746.273074] sysfs_create_group+0x1f/0x30 [ 746.277230] lo_ioctl+0x1307/0x1d60 [ 746.280875] ? lo_rw_aio+0x1ef0/0x1ef0 [ 746.284778] blkdev_ioctl+0x98e/0x21b0 [ 746.288700] ? blkpg_ioctl+0xc10/0xc10 [ 746.292623] ? lock_downgrade+0x900/0x900 [ 746.296785] ? check_preemption_disabled+0x48/0x280 [ 746.301814] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 746.306755] ? kasan_check_read+0x11/0x20 [ 746.310913] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 746.316200] ? rcu_softirq_qs+0x20/0x20 [ 746.320199] ? __fget+0x4d1/0x740 [ 746.323686] ? ksys_dup3+0x680/0x680 [ 746.327418] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 746.332887] block_ioctl+0xee/0x130 [ 746.336531] ? blkdev_fallocate+0x400/0x400 [ 746.340868] do_vfs_ioctl+0x1de/0x1790 [ 746.344770] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.349543] ? ioctl_preallocate+0x300/0x300 [ 746.353964] ? __fget_light+0x2e9/0x430 [ 746.357950] ? fget_raw+0x20/0x20 [ 746.361422] ? rcu_read_lock_sched_held+0x14f/0x180 [ 746.366455] ? kmem_cache_free+0x24f/0x290 [ 746.370724] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 746.375501] ? security_file_ioctl+0x94/0xc0 [ 746.379929] ksys_ioctl+0xa9/0xd0 [ 746.383422] __x64_sys_ioctl+0x73/0xb0 [ 746.387332] ? do_syscall_64+0xca/0x820 [ 746.391332] do_syscall_64+0x1b9/0x820 [ 746.395234] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 746.400615] ? syscall_return_slowpath+0x5e0/0x5e0 [ 746.405554] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.410409] ? trace_hardirqs_on_caller+0x310/0x310 [ 746.415444] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 746.420473] ? prepare_exit_to_usermode+0x291/0x3b0 [ 746.425508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 746.430370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 746.435569] RIP: 0033:0x4574e7 [ 746.438772] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 746.457679] RSP: 002b:00007f5db855fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 746.465412] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004574e7 [ 746.472704] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 14:31:42 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 746.479982] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 746.487256] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 746.494552] R13: 0000000000000000 R14: 00000000004d9be0 R15: 0000000000000004 14:31:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$RTC_WIE_ON(r0, 0x700f) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) [ 746.569913] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 746.594550] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x509000, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 746.659151] overlayfs: failed to resolve './file1': -2 [ 746.665968] xt_time: unknown flags 0x30 14:31:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000009effffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:43 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000), 0x4) r1 = timerfd_create(0x8, 0x0) close(r1) 14:31:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setns(r2, 0xc000000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000000)={0x40, 0x1, 0x7, {0x0, 0x989680}, 0x3}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) connect$rds(r1, &(0x7f00000001c0)={0x2, 0x4e24, @rand_addr=0x81}, 0x10) [ 746.930434] xt_time: unknown flags 0x30 [ 747.001446] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 747.032058] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 747.236328] xt_time: unknown flags 0x30 [ 747.464729] overlayfs: failed to resolve './file1': -2 14:31:43 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000280)=0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000ffffff9e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:43 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tgkill(r1, r1, 0x8) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f0000000040)) mq_open(&(0x7f0000000080)="757365722d94776c616e3000", 0x880, 0x0, &(0x7f00000000c0)={0x2, 0x1, 0xfffffffffffffff9, 0x1, 0xff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffff}) 14:31:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$can_raw(0x1d, 0x3, 0x1) sendmsg$can_raw(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@can={{0x3, 0x4, 0x1ff, 0x73}, 0x4, 0x2, 0x0, 0x0, "5ad9028b1651fb4c"}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='\ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:43 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 747.627945] xt_time: unknown flags 0x30 14:31:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:44 executing program 0: r0 = memfd_create(&(0x7f0000000100)="0b656d31c1f8a68d4ec0a35ce2cba2bae5f497ac232aff", 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) ioctl$FICLONE(r0, 0x40049409, r0) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="34efffffffff24000000000005f0"], 0xe) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffc39, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000000c0)=0xfffffffffffffff7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f000002eff0)={0x197, &(0x7f0000000000)=[{}]}, 0x10) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000440)) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000001c0)="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", 0xfa}, {&(0x7f0000000300)="46de02894971a2b84cef15c970b641d22ec86e8ca93ab5a26de06daaaba822c030f203b5ff96ecbed071f4a4a0997c9a8ce8e43a5e333648c5a58e269be89313e77abdad60be7cc85f085bfd40eaa59824a55b01ef53511e958a337b9ea1f2e1e986692e481d3473257209be36c380ca82f3f36794b6d662ac03af6234bb45e0d518ae1e3c0d7a75e1151899491994bae25ce9649326f6426dcb094837e895f253e6ef630e4dd9063f0613beaa116525bfdb81ee7e0bdc0fbd4ab81a27f1a9", 0xbf}], 0x2, &(0x7f0000001040)=[{0x110, 0x112, 0x7fff, "58b650208244a0cebd7a7117e4b27bab1416fad6dce12a5ae0761461c63bded73078bb557d0607db57f6836b84f3fdf30fdfab6837a9c2a79d497ae0c2044c5bd1d1b8bc27a2d65f703efe28b37938ef4498f57d923937958d53b31d5fe2ea665d79f3082b2bfdd768e82b8b3a90c3f50bb8772d2b64d920e44d1aaafe8c940c4fed11b56ea88decee8caab3696bb3e6ae3e418f1ee61cd7174959ea4a1469ee813ce8d347991c586cbfb9c4291a343c0699c1a2b4cf5d011412f23636a2707e6a8a10e6a9fb6c450aa7b7f9f67e5f6d2ca10d7d294d27102ec718d5ee817a168da3dd71353ceece4c7ab13ee46d918a645dcc4bab161be9e81d41287b585d"}, {0x1010, 0x118, 0x0, "9491639fe435c087575bc9dea5321f43df7076a1bb1468fc6721d0a0731c9bd3113656a313b1cdb36435d7496628bca447fdb40a89589b495bdd4075be5c9c751660ca832ed3c243ca076f2496d74e36eaf359c4349fe888edc1c5440bf62d692c1d91989ed4606920d58ef3b0de2c06d8784c22bea50cad007b4ba95c5f49714141490f94b16a115d0f33f0b7f8f2fe8ea7d89ac933db6a27816c09fdab90578cbab63a58f4bf1110416ddad6fd99b3452b902bb9cdbacdb8a126a987ef2e90375dd798c55d3e59117e728ba3575b2bc1d307c055f4bf4a12c4c6b3d82b3d7b624c5da3096a1f1c096f8c63da64850b02c09f2447a3a3550a2ee0c03e13abd2bf4aca45d7dd8c18e4b1f008acaf739120097279b77e7fd91c123e25c70ac5453921dd41aa044b51915a75b78fd72ae8ad18755db7d15bde198af5b2cb55a7c88056bbffc3a3808cf30a1b636b72c7ffd63640376dd5d21bfa1b28f26836a60cb15c0b3d77b04bfd9ee898a22535510de0417e57d37cab90e2dc2a0cfab7ba84fc5be3d115bc991b8cace482531e07e6babc220b14e00d3be316cc5b938e57623c8dcf8b1401231f021dfeff4235411eaa3fd7161c435b1d8a044a9905d4d5019b70b7cbbb7cc3c6862fce520e610f13de5207d6245a6a8e462333e033314349b76c87702c08db6e885454e499f50255c4bc37a7b77258a158f142d4fdf7bcf2cbbc84c83e7cdfa9eecbd194909b15c0e4b28001e7485cf7a3f597990319f57d38d80369f717ebab7b2a8f6873ef1bf30d52f6ccc2251ad9f46ecbabf37ea677625f565aca485bbf3ce5d6a1c9e63e8fe6c17e3657204250a7e308ac99ef185b9039d5256d2e5d2a77c3f9ce24877a857c27fec751e0acb31e6f880cbec109624336e59108a13010c6b9259134b75b0182b1666d29b105f4f9cc22a2dfef931d46853f50dfd624d743533b6233e2c542569651042bfc8910e1c8620af6709f6e3b3bd876ea7dad7bf219f8fa7732dbad79e7937571c729c442d1d92ab157d2505527619b888e6bc89d7a14ebd8252fd2f1900650a4077303eff55d5190294c8f0f7bf68f9c778369e2c5cc19d296aa011e5be73d96f94a984b15755983bf2c4c1dbb4a465e26a26e7615803bf05e44b7513f99585db761fe7041dd6893b06b7d3f6af50036e241234881d2a60f7989a93701839efd6d9d66ee1ca615b474b8fed9b0075614e438270197ebb45c0c80396502b38ca3ed08793cb5e8c1d9eacdb3a65a69a8cb9c313e0d942618e3e9a9b77bb9949c636480499bbc6bf0e6db7fdc583db02911a93df8ff14308d14a6ee6a5387bdad25b2f11ef26c45a399daee779e62d3c9b476f928f8796a8840477d7fafba92acf2960d8f571d26f2b231b7d8095db8a9310ae3b57026532c48b93d8d0c7733767c95ca4fde69d6a87a2f886c5fc11c1a52c7277520eef5a087d147f6cee79113d2f7940e6d2c5ed2eda7984572d527a3ba59bfd0c7196783bb92d20b9f24926fa0c9b4e891a9f5b46c34a8fc23d8b0c5613825ea52c426775d96052f3a7612ad728e8399158a55d09dcc6b5465bccac21add168c32c0b137b0ca349db15ab1ee9f70dcdb1c9931efce518ab911686caba48e9883a3cc1d5cb1f4dedb069d262ccee57526add93f1a9689600c16d2135ee5bf24bd2f715d35d6256a669ed774084a53f9e5db08c1c97d2c027fa328ac2bdc82dc68e1ec3a6a2b135f6b9e9c2924a9612a1898818528494aaac1b6954c9b4d22a7d4487dae5aaa0e333a896fcae25a37ffdd8292c8321cdcd684134cc7124ca06c0da219cc098a3f71de02b1c54717dbd7093e82f9eb11263f8331a75d7c907f7387286527d505c954122d064a986be31d01a1a14419db8ee3273201c01afe0c915263a695cdda9c06998c2a2954cdd43b14dfb016b7a1a92515ab3006ae25f6f7665fe1a3286748ce89b04df960bb657562a2a81934f6dd175159fca0101441de52f09dd4214d1208dcf9aac0c962058d09c48135b00c1c721e45fc9d5d0f0f09bda880804e941f32970e9a7111cb832612dad58612a98f234316a52e88ed827afb7cc7bd1dd6fd66678257b54f18e4fc191ecaad1355f9c706c50845f4c0da9f38acbf996912f201257a4a31afffce6c4390b46d95352aea8b783a99db8b982ffef1b220ddd90b462a0bd0faedc43ebe5e7ae7bd66e379b61040d67a7abe1004d083a80a39328ea6ef3ec45350139e0ecba44e58da07bda15d6fe6b07ca24e998e27f4ce8dd2181bf09f66773cafc85b70bc394e0ffd6209665aa8457b1bf5495c03d4519d89e9a0f4fc3c43d8a6ba056593bdb491cfff8d405fd7f1b4ba7b353d7b092cd4c7c8e8b675eb6b40d9c92a70fce6524156f60f2bb4a96f210287efdfcdebf89247124cac9558a910eb93a81e48fe501e1aff749854d85d8ceee20f59d38b0c37dcdd2cd59ec894cdf8c95e9794adb68b6f61b777d0ee025adeb067a0e63b265f0833d4cea4ec3513da36014d11ebd930f272ff18f88da9166e238b9bb5eee944ba9f908963ec43e32f857d0b07b37c9d0adb8bea53b7fbd670a1a7a04bb452e97a43e455ad69fa23dce8289d5109d15383dc505d848a5fa173ba72574853a903e83af82bcd3ac80ab3a12b1b20f027ea69a99d2e3d6779c4dd1bd6fe8a8943d94f6e400c1720f05c57f3fe88defcbf62c4c86cd29b5ab9d35819412ecbba93b95b2412bb47a9705c97d87dd7dfbf230762abf01bb73505694c6b1b8d1691b32cde5c909b56defd3df53e9ccf8fe3a2993c6c27f7dd9b06cf07e3f90700ec26b866e88925e54e3919f16444b201edbf0215f32f85d13ed9a90ed71b4f3569cf049d773db02290b864606bb92c211bec337b7b521aca42494523e3f4a9cd913a6e50250a0db3699e749a953665703b0193d3dee3a72e91743066aa81f9d3c4d0539b70430d42090713ba6dbac56af9c8a7e2424aaa5ef25ebbfe7b20d55ceb72e3468502caa8b63a5f6fdffe030bb5e9de2ed3c67066671654a2e2a01dce40cd00f6b0d3a8ff37543e029c7a50e647ef2753067e81e2929aae6d5cc38130e936f2f16bb8ab96eeabcc7266e5e67d24949a77fc8182a1f72512aa3166a4cbad4df5207e9b8f822f72b531a8dbd8c765a1b18ee7c3ea449b5919323f9aa0a4e1812b82dd6024342074ac890c498dc5b47ef5b7f429e8fdd702f39427a2c0bc2ec286cbfeaaa4703c7fb3723947183687ab26faada3f25992b2bbec504b87181aae3345c727e872745234d8cc023ca71db0556dc4bd5ee611f58d57aaee0af07d73dd7000b38170c25e6dfac54115a7894f3fb452e713fc4463e6c4220da0009158d1dbb711ee96940638f2ffc932c1361b6556459efa5851cda983fa7bb3f2f5faa37ebe5c295da94b46d920eea8d04bded7dc819b2760fb0ec5dfa93cc50538316a6a375c2bebddb5769795f9158a023db9cf41c93d35f6901e87e5bd2d3a26287dd56f284fbc6902d8b4d64c8695f398b69ebdadd9f6fbf34fd008a665610a3ff11fcff4da0b35f8b10c30c7799c644346f4efaffc7fedf4ccc6cb3a1447586ed919c9af71926d3399cb12fe8180df352532bc1a62da76a6cc1e8ec75ea9e9b389838b49f9d057cfa8f9891fdb6bbab4eba06dbf048379445a18d2d40228cdd5163ef7eaa3ac1f2ae7f19c5cf0f7b08089d1a08585c0496b6d441615767f778eedb7f2020aa4b4a9c3517e4f2fbcedc5d34c2dd2db30dfd92a1ce6a996c4fba46b8a60535264f7c6673eba60eceef388cd8262668bbad1dab2f05b19c16ca19e79481f8edd30680fc9329a6ea7bfcedf13adb4e2bb1e4999b4f2b86a5500fde5833fd10c71f37056fffe85e8c9e3230556519cdf8eb6d3bea5bb55f31bc763f48e677266ad114b3af5eb4b588cad503292f79e50d66ca6e4650dd0b2f862d35634b1ac9a46eb2ab96632abb1b739dcf3e5d59b4b5068b880decb31b7c92ecdd455a3cd4b9c914d2bd874f9668ec34b9a427146758d952a7101e89429c3bcede537c80091f325f826cd66615f99b7a6c38d0a68e0e77aae13bf0e935c181eb9374c877b45f6c23ffcdea78c2e4bfd2a9d899b5ae45c9c567096149d06674a6a200b9b731544508314b2f61e2251b47451123048bf39635a851e112cc4516962d1f9cd36e4d74d193fd5773271c14bbce153cc30328b22944ed3ec403a6f38179fbacbbea2784f25828bb4bceb2b8b1c623cc9ddcc64c3c119d9fa7938dbbfddc78315aec53c37021997c5aafdc466a53ad0100399c7a81f10199f28115ec5debb9cca54ca3bb4221c7bfa07e53dfa9f8d25757bead03c7b49404bf0d9ecde615ac954feea08ba6b9134b418b84cbdc684731251a64298849cfce01b5ec799023cba11652081c38ddc7d32af0dc627ff33da2677fd11e01ac4ec98a176a7f2257fdc57bad97354ae48dfd10c15dcf753de6908a1dd1f6d680b1b6c6eead835b1b42014e454b5b46cfe691f33787222fe55c0785a7899be94dd2c85ca214b1e898b8f091aeb6b598d4177ba6e1cbb01eaeba39953bba420b98784eb8da8f038daaa9845ce3ad640cb58a0523b70f75cfeebebe89d9ad358294f9f715d52af273088ec9c1c2f315c8a2958935a6527ce47ab4ae67b39800e12b409f3df6c6a65041f82ef9fe0ca2fb7e843b30ecfd02ca4f26851ac0fe9854dd60f34655ce63be023ccf682ecde40937a47c634babc10e3b7ab65348ca1db78104c8aa8337fafb155ebe579feb78dd37a884839a80c18cb953459623c8d27a7f3e94ee5a870997e34e587c1bde83b9a81f7984a59b084e60a5577a30a422bd58c131188d643aacba88236543e6f6c98418014d3fcae23d0f425668a71eadf256de6fe49f7355f08351ec10a4d9e91e462448ee463d8f1e11795f8ea02661a6c4d4f0b17863a743836731ede497ee31d972e101ad8a61bd66345f32a2bd72db0626c3d58a3ba627c09865ffee1ea566cdb46bd93ae06247842b9355c55928be1a93a8557abcf899f417880ca52879a4ee72c3c64a0b7264758ecb3222a035e7e8bd584ee7d08e8cb5fbd27f4255f0f07d88acb1f91e8029d1cecaac3e6b09f5a6c74c1fe0f799ad767cc5a2b70c3a4f510d5f7876d9a25ea8165ef7f40a6d79eec1ab05a976dead4685f88249ef0af4423eef03322a31026a3aa607192fa6385dbcce871373711deaf5f5362abc5adbc0a412bcad5930a2e3fbbd3dd96d7f30995219b739b96b1608a068a870b3578bca3a0960b0f1f3592e25c96be1b2eb856d1fbe5058c56fd71be6e4fd15d5715634c1e5c20f47d8e53a13f14fcfeb6e6ef39049cfaf30d58cff6772947dfdf432c1981a0b6cac5b9b83d81e0d898a07f34996010dedecd90af084cd421c8af20cd5864a9a113adb97542dacb3c6e734021d2d3b9e454d991d1df9dbbedf96acfb61edd10f4e5da06d3b7485ac1c77d885ea649e81ecfb9188b8ab909d9f4433bc9b200cf2626dec145214d4893ac7fd558ff03b563f1d29e456d7104d04a705ec0e2a028802ac312dd3db90c970d233d865457534d195d8434f39a2c4d4fd28ddecca101a22e471bc98a1593e004873dbd0994e95f4a8444601a2535d19524aa6e92dd5b447fb4614694e468c61432dc6ba5f1853f7ca99d6978691e54a757c8394d6a453fb5103d08c736125a14882ca1775ea732649e4937d5d893536b6b4f276f4dd899a817de4cf45c029b31bf05b01318cb97eb2acdefd6fe8c2e762985e278274574b7d0afa7450136d687e2"}, {0xa8, 0x10f, 0x200000000000000, "d850e2ed928b70aff517d2c8e6c4261a31235c36b3af48570f5916463cac1ee964a564dd9724f4325b44bf155f6c8025e40337577bf6af7e02bea2189a1a46cdbd853b67551b1819f73120942ed3a8eee995668ea688138e729a64ad31f71c2b16101f77e5361cfba1219d5e13feef2dfa538da0111cc91e8296e44104a3a87d4e93001b57f9706ec6c509a475786cc297"}, {0x88, 0x10f, 0x3ff, "ff599624a8e28dd04014d8dbb04e0adca30636dc7c76c7eeed681b98be1fc24536e2a3287cc56ecc89f3a8b6292b5f75e4490bc0732f5a7768527fe40dd0aa7ba850a923dbb620bdaf4b6cbda75c2f8056dd5d2cd2cbb4416d1695d3942d9d46688c798470ad6bdb872ffd5eb8cca041caddecdde1a0"}, {0x18, 0x100, 0x3, "5234b3c3120179"}, {0xc8, 0x11, 0x1000000, "43bc64b5a43ba818e0de0e8d4d7e48add96b29af25c1dd8ade860e5b689f903e20bc2fade9f994ec0d8d99a25f0dc7a65b74808fe646baf42575af7f7bd25ff93e479f4ea8855a2a77525639b8dffa23b4c6efdd0e40cfde78ed8379017c5248640d2998b5dc38cad9efe6d62da537b1c462b6c447c583b2b4152af44aca57ade43e0666c1c3db40262b83dce8a94508d80ac491907902fbfb9d455d804ecacc0272000acee7ae287a4c4ed6ce08c1a44f402891a0"}, {0x68, 0x107, 0xb6b2, "8a35196ac064ff2468cec1239de2e208bd09a329efe71d5a3ebec633abe80ef6a2b060c251ca241bc8b118b58686f87e3034026fdc4c67cbb8654c7e5afe2b4657d6931d686508610ecaaa0b2afa8c135de93c"}], 0x1398}, 0x8000) 14:31:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 747.696271] overlayfs: failed to resolve './file1': -2 14:31:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000040)='vcan0\x00'}, 0x30) fsetxattr$security_capability(r2, &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)=@v1={0x1000000, [{0x0, 0x1000}]}, 0xc, 0x3) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x101) 14:31:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='%tfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 747.900533] xt_time: unknown flags 0x30 [ 747.926143] xt_time: unknown flags 0x30 [ 747.950080] overlayfs: failed to resolve './file1': -2 14:31:44 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757070657264698a3d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b64feffffffffffffff65315c00"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x228400, 0x0) r1 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x0, 0x8202) bind(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x1, 0x2, {0xa, 0x4e24, 0x40, @empty, 0x1}}}, 0x80) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000001203000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x204000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 748.166338] xt_time: unknown flags 0x30 14:31:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 748.267548] overlayfs: unrecognized mount option "upperdiŠ=./file0" or missing value 14:31:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 748.475222] overlayfs: unrecognized mount option "upperdiŠ=./file0" or missing value 14:31:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='n%fs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:44 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xa00, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f0000000080)={0x8001004, 0x5, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000000c0)={0xff, 0x0, 0x10000, 0x10001}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000100)={0x464, r2}) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x3) syz_open_dev$sndctrl(&(0x7f0000000140)='/dev/snd/controlC#\x00', 0x7f, 0x2) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000180)=0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000001c0)={'lo\x00', 0x4}) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@v2={0x5, 0x0, 0x6, 0x1, 0x6e, "b8be7ecb2d55949e0ef51a0f6fdbc86f049da013a9d1f525243ce70fa962902161efaf7157db7f955917ec7c29990012bdd829b6e06fe783b3e67dacf6e373090f7059111ee9f6a34350c4c49489b8eb28d7ddf5afce81747e0f731c05079386e466348921ce97cf0b814f6b391b"}, 0x78, 0x3) ioctl$RTC_WIE_OFF(r1, 0x7010) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x40}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000340)={r4}, &(0x7f0000000380)=0x8) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f00000003c0)={{0x8, 0x9f4}, {0xfffffffffffff888, 0x4}, 0xef6, 0x5, 0x80}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000480)={0xf9fb, 0x9, 0x8cb3, 0x9, 0xb, 0x1}) ptrace$peek(0x1, r3, &(0x7f00000004c0)) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000500)={0x4, 0xa4, 0x8, 0x1, 0x1d1f}) ioctl$KVM_ENABLE_CAP_CPU(r1, 0x4068aea3, &(0x7f0000000540)={0x7b, 0x0, [0x2, 0x8, 0x8, 0x8]}) fsetxattr$security_selinux(r1, &(0x7f00000005c0)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:dhcpc_exec_t:s0\x00', 0x22, 0x0) fcntl$setown(r6, 0x8, r3) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000640)={0x2, 0x4e20, @empty}, 0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000680)={0x9, 0x200000, 0x7fffffff}, 0xc) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000006c0)) lsetxattr$security_evm(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='security.evm\x00', &(0x7f0000000780)=@v2={0x5, 0x1, 0xd, 0x6da, 0xa7, "25fe972276b2b005cc7f6a64d350cdf8b8fb331991248049d65776da5988a8c26b5f5cd192fbd5a010dd899e43fc626cd2aeb6588639d079a932593b4ec394bcf390d27c46ba61a93b20be1ff0193d0141126144204cbab2815bc61c4bc04eedbb4f0ec402a3c7a48a02f69c74067abccc5ec43e33f9472d052812249fb16d5b17aeda6390f292fc61847da0f2076527496901a61e0059d90f7dd9750d87148a5bf1e2c7c7d644"}, 0xb1, 0x1) write$P9_RLERROR(r5, &(0x7f0000000840)={0x16, 0x7, 0x1, {0xd, 'security.evm\x00'}}, 0x16) fcntl$setstatus(r6, 0x4, 0x4000) ioctl$DRM_IOCTL_SET_UNIQUE(r5, 0x40106410, &(0x7f0000000980)={0xc9, &(0x7f0000000880)="b5d3a36291649334fbd3a507151032de51ef8641b6152ea9c0c88395e4b51baa1633d0151d2247b8a5d9a1d9a4311066f6f2222f2d8021e1fa98e3c6f1bda56f07c63b075801c41792d12ec96028cf48545330eac5d13b0e1028a636382d1decacefb870b44c6b67b695e8e01f5c0d9cdd5135ddb70fdf96f3a89e99a55f6a9e677f6ca3d76630179ab53560f6dc6d56197cc3e08f02026556fd179cd4b87983c081f5efe8a3f6099659c9e3f72d4c68266225c5ff7c24bee438bf127f9edbeab31c3ab1ebcaa46254"}) write$P9_RWALK(r1, &(0x7f00000009c0)={0x30, 0x6f, 0x2, {0x3, [{0x40, 0x4, 0x3}, {0x0, 0x0, 0x1}, {0x80, 0x2, 0x8}]}}, 0x30) 14:31:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x50800, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000440)=""/233) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:44 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:lastlog_t:s0\x00', 0x1f, 0x2) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="756efa8e79510c70700000002f66696cbcc73091500a9136b69d1f427a8565302c6c6f7765726669723d2e2f66696c09302c776f726b6469723d862f7300000000879a5f9baa86a2334584b6031390bdc45027305626d3835fb647c07361e4ee858cf02bebdb6c7bb296"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000007fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000040)='bdevsecurity*\x00', 0x3) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000000080)) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r1, 0xc010641d, &(0x7f0000000240)={r4, &(0x7f0000000340)=""/84}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000500)={'team0\x00', r5}) [ 748.818569] overlayfs: unrecognized mount option "unúŽyQ pp" or missing value 14:31:45 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0a5c2d023c126285718070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'salsa20-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="eca34fff2d847238de6a96cedb1af0ab", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000040)={'#! ', './file0'}, 0xb) write$binfmt_script(r1, &(0x7f0000000280)={'#! ', './file0', [{0x20, '#! '}, {0x20, 'salsa20-generic\x00'}, {0x20, 'em0{%lovmnet1%(system}user'}, {0x20, '&'}, {0x20, '^eth1md5sumvmnet0'}], 0xa, "d39a9fe5b3c905ddb50ff39cc41bca0f9b2139e4334cd96f740d940432a086bbf13fc110580f706ae7e9d177273329d095e84ef11a5db62c70f39d3917aac4d0b65ae82fd08e19949e0b9332e40663db440f226931fec51159bc6114c310e1b1750b3c5939008425d4db5aa20408a5a466edef3bca8693b073748f04ebbc9c051ba53a45ce10e7948545ea2f2aae11b3d83a"}, 0xe1) read(r2, &(0x7f0000000bc0)=""/93, 0xfffffe0a) 14:31:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000007fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='n$fs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:45 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth0_to_team\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) sendmmsg(r1, &(0x7f0000008a80)=[{{&(0x7f0000000180)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x2d3, &(0x7f0000000200), 0x0, &(0x7f0000000480)=[{0x10}], 0x10}}], 0x5ec5f144db556138, 0x0) syz_read_part_table(0x100, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="c4cd1a07285a3a4a437fe3fe090e13ddc3c11f206b0a9f2a2aad1fafabfe9c707b6b0343b23dfc1449498c7c406a1008150bb51ccb6761b1e8c3b0510a03306be3a90e8ac7513ee6555f910d5016687f54015edf38aecb2d16e47cc1a3b074c66bf59942cb91a33b1426149a1f9eb7317eb6c81636a5ef42d23b3fc6faff5f4976c1", 0x82, 0x6}, {&(0x7f0000000100)="7526bbed77ec92154cbc3b084c0ec0e09e4cbcf9c3252f7e77cddb1746367370f3590489500fb19bc3d867049177b3c0d31ca35ad9c7e3cca8209f10745304910651139a1cb879f2bf51d1698a752d8e2634446a7cbc3122bd78b0c34c6beca79aff955c78c6fa59bdcfd5454bbd1f", 0x6f, 0xb028}, {&(0x7f00000002c0)="fd87e8911602d3bb7552e72f34ca07d89e5577155e7e97665e73c04b2a20f6e29cfa71e02e6ef24f2450034f8f01a71b8afa027284ec26fa397dd20c60951571102eea7e4b4519d9ab78c500274194636cf9e944e52ed7c3406e94c5182f9e1c56d81c665056eaf2ea67f1d755df664f322d4cc396d4202320db5f33541de6", 0x7f, 0x1000}, {&(0x7f0000000340)="9def50d1d678af992dae399d8ba0bbfdb98e8717d246df5299f0173fab84fc695c571bfd0a62ca513d5025db3ba5117a14f5c8112009aa34424fee63efdbf3fcec394327b9fe295e4d1003118d1b3ccb22c9f404e74a80d8e56f741ea81294891089799e256220838a097fae7fafb77bb10a", 0x72, 0x9}]) [ 749.075566] overlayfs: unrecognized mount option "unúŽyQ pp" or missing value 14:31:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) syz_open_procfs(r4, &(0x7f0000000080)='net/ip_vs_stats\x00') 14:31:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:45 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) epoll_wait(r0, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x7) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000f0ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:45 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:45 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x10000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000080)=0x2, 0x4) 14:31:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000fffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='nlfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000340)={r2, @in={{0x2, 0x4e21, @remote}}, [0x7fff, 0x3, 0xd4, 0xfffffffffffffffa, 0x6, 0x1, 0x2dc9f00e, 0x7, 0xc00, 0xff, 0x4, 0x9, 0xf0, 0x5, 0x6]}, &(0x7f00000001c0)=0x100) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000380)={0x1, 0x80, [{0x2519fd48, 0x0, 0x100000000}]}) setns(r1, 0x10000000) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000100)='&[:\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='&-\x00', &(0x7f0000000240)='[\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00']) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f00000000c0), 0xc, &(0x7f0000000080)={&(0x7f0000000140)=@ipv4_newroute={0x2c, 0x18, 0xd19, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x3}, @RTA_ENCAP={0x8, 0x16, @nested={0x4}}]}, 0x2c}}, 0x400) 14:31:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 749.756323] overlayfs: filesystem on './file0' not supported as upperdir [ 749.800370] netlink: 'syz-executor0': attribute type 21 has an invalid length. 14:31:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x4000, 0x54000502, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000100)=""/1) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x100, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000001c0)=0x7233, 0x4) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c86302c776f726b6469723d2e2f66696c65315c00313bfc258068ce4c0b187c491942a5f95fe0cdafff62f7575ed7a0266d501bbb4ba46bc022a941508974844b625376a9e80c1f3f4247897d6a957ea28400e0515ea6855fff3a6dd917e34be5ab62f227cc776f09d873d43758680fc8fdfbc3004b3c49d025466810"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:46 executing program 0: r0 = socket$kcm(0xa, 0x802, 0x88) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f00000002c0)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x9}, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="3800000000000000290000e304000000780404010000fab77117211900a1720020291f2c40640fd37fed20f2eb31c84dd0f7037af3760712"], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec, 0x80, &(0x7f0000000040)=[{&(0x7f0000000280), 0xf401}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000180)=0x4) syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x2b75caad3a617b30) 14:31:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) syz_emit_ethernet(0x26, &(0x7f0000000040)={@empty, @empty, [{[{0x9100, 0xffffffff, 0x3, 0x1}], {0x8100, 0x0, 0x4}}], {@can={0xc, {{0x1, 0xfffffffffffffff9, 0x100000000, 0x50}, 0x1, 0x2, 0x0, 0x0, "98ca74e263114345"}}}}, &(0x7f0000000080)={0x1, 0x3, [0x226, 0x6ed, 0x67e, 0x65]}) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x501000) openat$vhci(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhci\x00', 0x100, 0x0) r1 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x420000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffffc) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x80000001, 0x40) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000340)=0x7ffe) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:46 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='nXfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 750.146645] overlayfs: failed to resolve './file1': -2 14:31:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:46 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000080)={0x0, "9e2196420e97293b8a5a036a9cf1e94fa08a919471fe751429ef8d2c06bd2f7b", 0xa8, 0x89, 0xffffffffffffffff, 0x14, 0x1}) 14:31:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)="766574683000000000000000053d00", 0x6d) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000240)=@llc={0x1a, 0x10f, 0x3, 0x2, 0x401, 0x7, @random="a87f69d360cc"}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000340)="90d2b6adc086147470f9580166f52f2e20a7c6e8e2ad99de349f9acc545c22c170bb8d04f9f282a7ac91df64e4", 0x2d}], 0x1, &(0x7f00000003c0)=[{0xc8, 0x29, 0x0, "26d234b0346722e7ab7c153b2a1830514f7aff4a96904083c4208750c36e765d3777ba618e98b2b96e3d2483ce31d0ea7c8911ba71384a0ee83161a1776a3168b277d9c1d89fd03a329289c47e0231a9d1d027319e29d8bf1626000682ce5ecf8c308cf9693d09d2870abd801a60b736b0dcf802681a85ff05f18b3160b433916c2f944744b1c0aef817cea0760414fb2bc36497953d61d0256b72fc08650036b99872fafac9d29d78a56d7876596cdfaaa4a281"}, {0xf8, 0x195, 0x0, "11ef0df2458dafff04a006e9a1f41cd02e67d640cf9c06c7457f1c31caa8b54bb4c7dff76b2d8482189ee24d05667fa5085b79f8d44051b188630fb8a53429879275baddd653162af94876be94a3acb171bb1915f490df1ac87ef8758ea3228f1a78d25836673a8795a01e47202b9a77dbe0b7d0528629f588cf49d14c1a7382d1b9bb2186f5fb416388b147657ffd21ffadb5e4173755ce8253f61e5ed0e39b60920159913939f1cde9f139134c23f8ea32876721347b36383cc40bb56ea33a42062662e00aedd44f3a033548a50a2d5e6820725daa8b74e983a2b266cbc81f9110b0658b9469db"}, {0x90, 0x10d, 0x37f, "cc7bfdbaccd2f5a1b95c8910b00911fd072ec57f28d6000ef8b96cc8c4b651705326afb560df04872331f167dd82ced99aed064232b89b29681cd0f4990f14cc06190cc3d1bab4a4a4f24d2cf998cdd3906677fd6b92c31729088e7c1132095ce9d0493566140d80123e48538af6bd6fed7e2bb9fba21892887279384e65"}, {0x88, 0x10e, 0xfffffffffffff800, "ad0b2d744799b115d342c3cec22014b01e9fb85c72047ef423bbc6697cb148d2e165197e593d79ff693249770034eada914cef2279bdb6ed7141fc82c3813061ede9f5b9e634a5756148d9e73f8eb6cb17e0d41855fbbc809ba4acb3d772e0d641e24bfc7ac6a77c0d673069fd72f06137e204b56c28"}, {0x50, 0x109, 0xfffffffffffffd4e, "d5113e06d7387ed52d892b5196558b79cb8f1003f8b9f7e0dd09917a274db40d757600686af54f2c64f4ffb2e79589fc1be39fff065f034b97"}], 0x328}, 0x8000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@canfd={{0x0, 0x3, 0x7f, 0x3}, 0x1b, 0x2, 0x0, 0x0, "fb36943a11f92f6a3c00f8ee88d98bd07686e70885b9c93afd43bd74a9782ad6b342c96247c329d4a99b972a511b7d1585a227fdd39d5471db9447817b306ee0"}, 0xfffffffffffffe31}}, 0x6040000) [ 750.323245] overlayfs: failed to resolve './fil†0': -2 14:31:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000003120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:46 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000007000)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1}, 0x14) syz_emit_ethernet(0xe, &(0x7f0000000280)={@link_local, @empty, [], {@generic={0x600}}}, &(0x7f0000000000)) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x9c, 0x88042) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000080)={'nat\x00', 0x6e, "317976cf7b2f827679622733c7b712cccdfaf103dc92b11fcb704a8e9aad937fbcebb8f942a5b5834c9ae9a1389363f9dd6da404e2ae4c33db9a1a37974dfd5dd1e3316572c14c2bbd1af343a147fd49e2f3324ac3d24ecaae7137e29510360aeffc97a7af0b9b4082eb25fee321"}, &(0x7f0000000140)=0x92) 14:31:46 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x40, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f00000001c0)={0x0, 0x6}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000280)=0x0) capget(&(0x7f00000002c0)={0x20080522, r2}, &(0x7f0000000300)={0x7, 0xe13d, 0x1, 0x8001, 0xc2, 0x40}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) pread64(r0, &(0x7f0000000340)=""/196, 0xc4, 0x0) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c699e49a86c65302c776f726b6469723d2e2f66696c65"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:46 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='n|fs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 750.650562] overlayfs: unrecognized mount option "ližI¨le0" or missing value [ 750.772222] time_mt_check: 11 callbacks suppressed [ 750.772231] xt_time: unknown flags 0x30 14:31:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000007fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)) r3 = syz_open_pts(r2, 0x0) r4 = dup2(r2, r2) write$P9_RMKNOD(r4, &(0x7f0000000000)={0x14}, 0xfe4e) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000280)) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:47 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000003040)=""/128, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000001980)={0x1, 0x0, 0x0, &(0x7f0000001840)=""/201, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000100)={0x3, 0x0, [{0x16000, 0x12, &(0x7f0000000000)=""/18}, {0x0, 0xa9, &(0x7f0000000040)=""/169}, {0xd000, 0x1000, &(0x7f0000000500)=""/4096}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000002c0)=0x1) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x0, 0x1, 0x0, 0x0, 0x0, 0xfdfdffff00000000}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x200, 0x0) getsockname$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14) [ 750.923411] overlayfs: unrecognized mount option "ližI¨le0" or missing value 14:31:47 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)="6ed8667300", &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000fffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:47 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x2c24, 0xffffffffffffffff) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x200000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x4, 0x301f}) [ 751.113530] xt_time: unknown flags 0x30 14:31:47 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bcsf0\x00', &(0x7f00000004c0)=@ethtool_per_queue_op={0x4b, 0xfffffffffffffffc, [0x77861c4, 0x9, 0x273, 0x0, 0x401, 0x1, 0x2, 0x24, 0xfffffffffffffff9, 0x9, 0x7, 0x77, 0x80000000, 0x6, 0xfffffffffffffff7, 0xfffffffffffffffa, 0x2, 0xfffffffffffffff8, 0x9, 0xfffffffffffffffe, 0x9, 0x2, 0x5, 0x3f, 0x9, 0x4, 0x81, 0xffffffffffff8000, 0x6852, 0x100, 0x40, 0x200, 0x12d0, 0xcfa7, 0x1, 0x8000, 0x7fff, 0x1335ee72, 0x0, 0x81, 0x40, 0x5a08, 0x7, 0x9, 0x5, 0x27, 0x0, 0x0, 0x3f, 0x1, 0x7, 0x1000, 0x1f, 0x1, 0x1, 0x3, 0x4, 0x3, 0x9, 0x4, 0x0, 0x800, 0x2, 0x7, 0x7, 0x3, 0x2, 0xfffffffffffff8a5, 0x7, 0x4, 0x1, 0x100, 0x5, 0x2, 0x8, 0xd67c, 0x9, 0xffff, 0x4, 0x70, 0x9, 0x1, 0x20, 0x800, 0x3, 0x10a2, 0x6, 0xf04, 0x5, 0x866b, 0x1f, 0x1, 0x9, 0xffffffffffffffe1, 0x8, 0x1, 0x8000, 0x90, 0x6, 0x80000000, 0xfffffffffffffffb, 0x2, 0xfffffffffffffffa, 0x63, 0x5, 0x4, 0x9, 0xc4, 0x4a, 0xa25, 0x30000000000000, 0x1, 0x4, 0x3, 0x1f, 0x58, 0x5, 0x7, 0x17c, 0x3, 0x1ff, 0x5, 0x8, 0x0, 0x6, 0x6, 0x80, 0xfffffffffffffffd, 0x5a, 0x200, 0x8, 0x380, 0x1d0c, 0x8, 0x0, 0x2d, 0x5, 0xffffffffffff8001, 0x9, 0x1, 0x1, 0xea85, 0xb53, 0x1f, 0x3f, 0xc4, 0x1, 0x80000001, 0x3, 0x8, 0x2, 0xffffffffffffffcc, 0x100, 0xfffffffffffffff8, 0x2, 0x2, 0xe2, 0x8, 0x2, 0x9, 0x100000001, 0x9, 0x5, 0x1000, 0xfffffffffffffff9, 0x0, 0xfffffffffffffc00, 0x6, 0x4, 0x5, 0x80, 0x7, 0x3ff, 0x9, 0x5, 0x1, 0x57, 0xfffffffffffffff8, 0x6, 0x5, 0x80000000, 0x1, 0xffffffffffffffff, 0x5, 0x6, 0x1, 0x6, 0x10000, 0x4, 0x10001, 0x8000, 0x1, 0x80000001, 0x2, 0x55, 0x1, 0x5, 0x4, 0x6, 0x8, 0x7fffffff, 0x401, 0x6, 0x800, 0x7, 0x100000001, 0x1, 0x0, 0x0, 0x7fff, 0x4, 0x8, 0x5, 0xfb1, 0x0, 0x7, 0x4, 0x9, 0x8, 0x1000, 0x20080000000, 0x7, 0x0, 0x800, 0x81, 0x100000001, 0x7, 0xfffffffffffffffc, 0x7, 0xb0, 0x7, 0x100000000, 0x180000000000, 0xfffffffffffffff9, 0x3eefd934, 0x6, 0x1000, 0x6, 0x100000000, 0x8, 0x3, 0x9, 0x3, 0x0, 0x9c, 0x8, 0x1000, 0xffffffffffffffc1, 0x1, 0x2, 0x8, 0x5073, 0x1, 0x2, 0x100000000, 0x6, 0x3, 0x0, 0x5, 0x0, 0x0, 0xff, 0x3, 0x80000001, 0x1, 0x8, 0x4, 0x10000, 0x8, 0x1ff, 0x3, 0x3, 0x8882, 0x3, 0x1, 0xd2bb, 0x300, 0x3, 0x1, 0x0, 0x0, 0x4, 0x2, 0x3, 0x3, 0x3, 0x4, 0xa8, 0x400, 0x10000, 0x5, 0x9, 0xed26, 0x3, 0x1, 0x0, 0x6, 0x401, 0x0, 0xb, 0x9, 0x7fffffff, 0x3, 0x5, 0x1, 0xe332, 0x1, 0x8903, 0xaa, 0x0, 0x8be8, 0x2, 0x5, 0x4, 0x8, 0x2, 0x9, 0x4, 0x40, 0xc700000000000000, 0x70ee, 0x2, 0x6, 0x6, 0x85, 0xffffffff, 0x7, 0x5, 0x7, 0x2, 0x2, 0x7, 0x781, 0x0, 0x7, 0x3f, 0x318, 0x20, 0xfffffffffffffffb, 0x2, 0x7, 0x1, 0x1, 0x0, 0x0, 0x101, 0x10001, 0x4, 0x9, 0x54, 0x9, 0x9, 0xaea, 0x20, 0x100000000, 0x4, 0x3, 0x81, 0x7, 0x6, 0x9, 0x60000000000, 0x1, 0x20, 0xa1ad, 0x3, 0x1, 0xfff, 0x8, 0x200, 0x65d0b7ab, 0x7, 0x5c, 0x800, 0x3ff, 0x8, 0x7fffffff, 0x5, 0x200, 0x6ce, 0xffffffffffff54c4, 0x7, 0x7ff, 0x4, 0xfffffffffffffe01, 0x2, 0x42, 0x3, 0x400, 0xffffffffffffffff, 0x400, 0x0, 0x5, 0x1b2, 0x6, 0x7, 0x8000, 0x0, 0xe46, 0x3, 0x1, 0x0, 0x6, 0x9, 0xc0000000000, 0x1, 0x1, 0xab7, 0x0, 0x1f, 0x1f, 0x9, 0x7fff, 0x5, 0x1000, 0x6, 0x5f8, 0x3, 0x80000001, 0xfffffffffffff128, 0x7, 0x8001, 0xcf2, 0x2, 0x0, 0x7, 0x7fff, 0x0, 0x7fff, 0x0, 0x9, 0x0, 0x633, 0xfe, 0x9, 0x0, 0x5, 0x22, 0x0, 0x400, 0x7, 0x200, 0x9fd8, 0x7, 0x7, 0x5, 0x5, 0x61a5e751, 0x3, 0x0, 0x7fffffff, 0x8, 0x7, 0x81, 0x100, 0x8, 0x80000000, 0x10001, 0x2, 0x96, 0x7, 0xfff, 0x6, 0x4c7, 0x1, 0x100000000, 0x0, 0x101, 0x40, 0x8, 0x81, 0x4, 0x80, 0x3, 0x10000, 0x17, 0x8001, 0xff, 0x3, 0x6, 0xfffffffffffffffc, 0x1f, 0xffffffffffffffff, 0xf4, 0xffffffffffff9838, 0x81, 0x5, 0x5e66, 0x5, 0x100, 0x4, 0xadb, 0xff, 0x3f, 0x6c, 0x7, 0x4, 0x9, 0x8, 0x79c, 0xfffffffffffffff7, 0x9, 0x0, 0x3, 0x7ff, 0x7, 0x12, 0x4, 0x6, 0xd55, 0x9, 0x8, 0x6, 0x48, 0x81, 0x4c000000000000, 0x7, 0x4, 0x3, 0x2, 0x7, 0x6, 0x6, 0x0, 0x3, 0x2fe0c250, 0x200, 0x401, 0x81, 0x7c2, 0x3ff, 0x200, 0x689, 0x8, 0x9, 0xd28, 0xf32139e, 0xffffffffffff7fff, 0x3, 0x5, 0x8, 0x9117, 0x1f0000000000000, 0x5, 0x10000, 0x0, 0x4, 0xffff, 0x0, 0x3, 0x0, 0xffffffffffffff01, 0x0, 0x8000, 0xffff, 0xffffffff, 0x80000000, 0x7ff, 0x400, 0x1, 0x42, 0x3, 0x400, 0x7f, 0x80000001, 0x7, 0x8, 0xfffffffffffffe00, 0xea1, 0x4, 0x8, 0x9, 0x5, 0x7, 0x1, 0x5, 0x8, 0x7, 0x3bd, 0x7, 0xfffffffffffff911, 0xe19, 0xfffffffffffffff8, 0x9, 0xbd3a, 0x2, 0x4, 0x8, 0x1, 0x9, 0x8001, 0x2, 0xe950, 0x2, 0x5, 0xf7, 0x100000000, 0x7fff, 0x8, 0x7, 0x100000001, 0x9, 0xd7a, 0x7, 0x333, 0x20, 0x9, 0x200, 0x0, 0x1, 0x4, 0xffff, 0x1, 0x0, 0x4, 0x3f, 0x8, 0x6, 0x1f, 0x1000, 0x9c01, 0xcfe0, 0x0, 0x9, 0x7f, 0x1, 0x16b, 0x5, 0x3, 0xb2, 0x401, 0xffff, 0x4, 0x6, 0x4, 0x6, 0x7, 0x8020000000, 0xaeb, 0x5, 0x798, 0x7f, 0x6, 0x80000001, 0xfffffffffffffff7, 0x0, 0x3, 0x80000000, 0x1, 0x0, 0x6d45, 0x4, 0x8, 0xffffffffffff8000, 0x3, 0x81, 0x0, 0x1, 0x2, 0x8, 0xd2f5, 0x5, 0x5, 0x6, 0x3, 0xffffffff, 0x3, 0x7, 0x3, 0x687, 0xfffffffffffffffc, 0xfffffffffffffffb, 0x0, 0xef, 0x81, 0x7, 0x8, 0x10000, 0x6, 0xc48, 0x0, 0xc000000000000000, 0x3, 0xbd35, 0x3f, 0x6, 0x100000001, 0x1000, 0xfffffffffffffff8, 0x41, 0x1, 0x7, 0x101, 0xe8, 0x2, 0x7fff, 0x1, 0x4, 0xffffffff, 0x3f, 0x9, 0x1, 0x10001, 0x101, 0x100000001, 0x8000, 0x3, 0xfffffffffffffffa, 0xfffffffffffffff8, 0x7, 0xe3, 0x7, 0x8, 0x2, 0x9, 0x7ff, 0x0, 0x200, 0x3f, 0x100000001, 0x0, 0x2, 0x1f, 0x6, 0x8, 0xfffffffffffffff9, 0x3, 0x0, 0x0, 0x7, 0x3ff, 0x4, 0x0, 0xf9, 0x2, 0xd738, 0x0, 0x1, 0x100000000, 0x7ff, 0x6, 0x2, 0x3, 0x8, 0x1000, 0xac2e, 0x7, 0x6, 0x197, 0x5, 0x0, 0x3f, 0x5a16b037, 0xc5c3, 0x3, 0x7e, 0x1, 0x2, 0x1, 0x9, 0x1ff, 0x100000001, 0x2000000000000, 0x0, 0x20, 0xd96, 0x6, 0x0, 0x401, 0x1, 0x235, 0x82, 0x4, 0x7ff, 0x66, 0x0, 0x6, 0x8, 0x7fffffff, 0x1000, 0x4, 0x2, 0xfffffffeffffffff, 0x10001, 0x1, 0x3ff, 0x7, 0x2, 0x8, 0x1000, 0x8, 0x1, 0x400, 0xc6, 0x8, 0x800, 0x7fff, 0x9a, 0x0, 0x9, 0x8, 0x2, 0xc, 0x8, 0xff, 0x80, 0x6, 0x401, 0x2, 0x8001, 0x7, 0xed98, 0x9, 0x2a1a, 0x8, 0x8, 0x7f, 0x7, 0x8, 0x2, 0x8b, 0x7, 0x4, 0x3f7, 0xb121, 0xffffffffffffb93d, 0x9, 0x80000000, 0x0, 0x7f, 0x1ff, 0x6, 0x4, 0x200, 0x1, 0x10000, 0x6, 0x3f, 0x1f, 0x25c84362, 0x9, 0x3f, 0x2, 0x9, 0x3, 0xf8c, 0x80000001, 0xfffffffffffffff9, 0x199, 0x6, 0x8, 0x3ff, 0x67, 0x10001, 0x2, 0x0, 0x6d24e506, 0xefd7, 0xfffffffffffffff8, 0x4, 0x0, 0x401, 0x4, 0x8, 0x1000, 0x4, 0x6dc7, 0x4, 0x2, 0x40, 0x3, 0x8, 0x3f, 0x7, 0x3, 0x2, 0x0, 0x10001, 0x101, 0x8, 0x80000001, 0x8, 0x5, 0x2, 0xd27, 0x7ff, 0x8000, 0x9, 0x2, 0x10001, 0x4, 0x6763, 0x9e, 0x8001, 0x4, 0x7fffffff, 0x7, 0x7f, 0x100, 0x2, 0x6, 0x7, 0x9, 0x3, 0x9, 0x20, 0xffff, 0x85, 0xff, 0x5117, 0x80, 0x1ff, 0xfffffffffffffff7, 0x7fffffff, 0x200, 0xa8aa, 0x9, 0x2, 0x1, 0x1f, 0x7, 0x8, 0xbc, 0x1, 0xa9, 0x6, 0x9, 0x9f, 0x101, 0x5, 0x3, 0xfffffffffffffffd, 0x1, 0x7f, 0x100000001, 0x9, 0xffffffffffffff6d, 0x1e09, 0x6, 0x7, 0x1, 0x3, 0x9, 0xfffffffffffffffb, 0x7, 0x0, 0xfff, 0x3, 0x7, 0x80000001, 0x3, 0x2, 0x7, 0x3, 0x7fff, 0x6, 0x4, 0x100000000, 0x7, 0x1, 0xffff, 0x20, 0x20, 0x16, 0x2, 0xe8ad, 0x2, 0x101, 0x200, 0x8, 0x5, 0x9, 0xffffffff, 0x9, 0x3, 0x2, 0x6148e542, 0x1, 0x48c, 0x7f, 0x2, 0xae, 0x8000, 0x8, 0x0, 0x10, 0x0, 0x1, 0x9, 0x0, 0x5, 0x7fff, 0x33, 0x8, 0x8, 0x3f, 0x9, 0x4, 0x3ff, 0xffffffffffff8000, 0x9, 0x5e3, 0x2, 0x65ac5834, 0xb893, 0x9, 0xb17, 0x80, 0xfff, 0x6, 0x5, 0x73368c58, 0x40, 0xfffffffffffffff8, 0x0, 0x5, 0x8001, 0x0, 0xffffffffffffffff, 0x1, 0x9, 0x6, 0x4, 0x8, 0x3, 0x13, 0x200, 0x10001, 0x1000, 0x9, 0x7f, 0x5, 0x1, 0xd1, 0x1, 0x0, 0x3f, 0x3, 0x6, 0x2, 0x401, 0x62ff, 0x5, 0x4, 0x101, 0x8001, 0x8001, 0x4, 0x7f, 0x47, 0xffffffffffffffff, 0x5, 0x43a, 0x10000, 0x1, 0x1, 0xc7, 0x9, 0x401, 0x9, 0x2, 0x7fff, 0x9, 0xd2, 0x80, 0x1c, 0x3f, 0x2, 0x4, 0x1, 0x2, 0x3, 0x1, 0x16, 0x3, 0x8969, 0x314, 0x1, 0x4, 0x5, 0x29, 0x8, 0x4e50, 0xfffffffffffffffe, 0xffff, 0x7fff, 0x81, 0x7ff, 0x7be1, 0x8001, 0x4, 0x1, 0x7, 0x7, 0x6f1, 0x3, 0x5, 0x0, 0x100000000, 0x76, 0x3, 0x8, 0x5d, 0x4, 0x8, 0x6, 0xffffffffca554539, 0x3, 0x404, 0xf1, 0x2, 0xfffffffffffffffa, 0x100000001, 0x9, 0x29a, 0x5, 0x6, 0x0, 0xb11d, 0x5, 0x101, 0x1, 0x3f, 0x6, 0xfffffffffffffffc, 0x80000000, 0x8, 0x0, 0x80, 0x8000, 0x80000001, 0x7, 0xffffffffffffa231, 0x9, 0xfffffffffffffbff, 0x6, 0x20, 0x8, 0x1, 0x40, 0x5, 0x10000, 0x4, 0xc83, 0x276, 0x29, 0x7fffffff, 0x1, 0x2, 0x2, 0x4, 0x1, 0x1, 0x9, 0x7, 0x100, 0x8, 0x9, 0x1e, 0x3, 0x401, 0x10, 0x0, 0x7796e2b1, 0x5, 0x7, 0x7f, 0x1f, 0x2, 0x800, 0x3f, 0x4, 0x7, 0x2, 0xffff, 0x8, 0xba28, 0x0, 0x4, 0x7f, 0x7, 0xc55, 0x101, 0x9e2e, 0x0, 0x1, 0x9, 0x10000, 0x10000, 0x7, 0x4, 0x3, 0xfffffffffffffffc, 0x1c0000000000000, 0x8, 0x8001, 0xea, 0x2, 0x3f, 0x400, 0x9, 0xffff, 0xffffffff, 0x8, 0x2, 0x0, 0x6, 0x5, 0x5, 0x81, 0x6, 0x8000, 0x1, 0xbe, 0x3db47764, 0x0, 0x6, 0xfffffffffffffff9, 0x32e6, 0x2, 0x18c00, 0x0, 0x3, 0x3, 0x1, 0x2, 0x4, 0x3, 0x101, 0x3, 0x8, 0x4, 0x2, 0x9, 0xe7, 0x9, 0x5, 0x8, 0x2, 0x9, 0x20, 0xf3, 0x7, 0x3a9e, 0x5, 0x5, 0xff, 0x6, 0xbcca, 0x0, 0x85, 0x7, 0x96fb, 0xfff, 0x77, 0x5, 0xc6b1, 0x6, 0xc6e, 0x4, 0xce0, 0x10001, 0xffffffff, 0xf1, 0x6, 0xffff, 0xffff, 0x5, 0x1, 0x50, 0x8, 0x1f, 0xeba, 0x947, 0x4000000000, 0x7, 0x7, 0x2, 0x4, 0x100000001, 0x2, 0x8, 0x5, 0x1, 0x100000001, 0xffffffff, 0x8, 0x0, 0x80000001, 0x8, 0xd99e, 0x924, 0x101, 0x0, 0x3, 0x0, 0xffff, 0xffffffff, 0xa2, 0x10000, 0xffff, 0x101, 0x1, 0x200, 0x1, 0x10000, 0x80, 0x3, 0x1, 0x94e0, 0x4a5, 0x697, 0x10000, 0x6, 0xffffffffffff0001, 0x2, 0xa, 0xeb5, 0xffffffffffffffc0, 0x7ff, 0x4, 0x7, 0x4, 0x400, 0xffffffffffffffff, 0x7, 0x5, 0xdb0, 0x5b, 0x323e41e6, 0x3, 0x6, 0x5, 0x7, 0xff, 0x1, 0x6, 0x4, 0x0, 0x101, 0x6, 0x101, 0x2, 0x800, 0x1, 0x400, 0x1f, 0x4, 0x7, 0x1, 0xfff, 0x4, 0x36, 0x5, 0x26b6, 0xe868, 0x6, 0xab, 0x100, 0x7, 0x4, 0x400, 0xfff, 0x81, 0x6405, 0x200, 0x4, 0x565, 0x2acabcb0, 0x1f, 0x3, 0x2, 0xd264, 0x0, 0x22, 0x2, 0x80, 0x1f, 0x3, 0x3f5, 0x4, 0xf9a, 0x100000001, 0x5, 0x6d7d, 0x6, 0x5, 0x0, 0x7f, 0x7, 0xff, 0xfffffffffffffffe, 0x3a88a8c, 0x800, 0x2, 0x5, 0xdc, 0x1000, 0x6, 0x2, 0xdcb, 0x7, 0x3, 0x4, 0x400, 0x6, 0x4, 0x7, 0x1ff, 0x9, 0x9, 0x2, 0x8c1c, 0x6, 0x2, 0x3ff, 0x2, 0x1f, 0x10001, 0x6, 0x4, 0x9, 0x20, 0x5, 0x9, 0x5f3c904b, 0x2, 0x1, 0x200, 0x76e, 0x6335, 0x9, 0xed, 0x170d, 0x4, 0x6, 0x4, 0x2, 0x1, 0x5dfd, 0x266, 0x2, 0x35c1, 0x7ff, 0xffff, 0x47f9a425, 0x0, 0xb5e1, 0x2, 0x1, 0x6, 0x401, 0x0, 0x2156, 0x6, 0x400, 0x7, 0x7, 0x4648, 0x5, 0x7fff, 0x10001, 0x4, 0xd88, 0xffffffffffffffff, 0x0, 0x100000000, 0x0, 0x7, 0x1, 0x4710, 0x100000000, 0x101, 0x5, 0x8, 0x4, 0x9, 0x8, 0x8, 0x9, 0xd3, 0xfff, 0x1, 0x20, 0x3, 0x7fff, 0x81, 0xad84, 0x400, 0x4, 0x0, 0x5, 0x8, 0x1, 0x7fffffff, 0x7, 0x8f, 0x10000, 0x40000000, 0x7fff, 0x8526, 0xfffffffffffffff8, 0x2, 0x7, 0x4, 0xffffffffffffffc0, 0x1, 0x2, 0x7, 0x5, 0x6, 0xfffffffffffffffb, 0x800, 0x7fff, 0x0, 0xffffffffffff9bc4, 0xd43, 0x6, 0x10001, 0x40, 0x81, 0x2, 0xd8b, 0x20, 0x5, 0x7ff, 0x8, 0x1000, 0x6, 0x40, 0xfffffffffffffffa, 0x0, 0xffffffffffffffff, 0x8, 0x100, 0xb3a, 0xff, 0x1f, 0x6, 0x7fffffff, 0x0, 0x8000, 0xbde, 0x8, 0x0, 0x80000001, 0x2, 0x7, 0x3, 0x6, 0x0, 0xffffffffffffffff, 0x3ff, 0x6, 0x5, 0x8, 0x4, 0x100000000, 0x88be, 0x8, 0x3ff, 0x0, 0x4, 0x2, 0x98c7, 0x5, 0x4, 0xffff, 0x7, 0x0, 0xff, 0x40eb356f, 0x3da, 0xa8fa, 0x100000000, 0xb2d9, 0x2, 0x400, 0x3, 0x2, 0x7fff, 0xfff, 0x9, 0x2d000, 0x37, 0x0, 0x7, 0x5, 0x7, 0x3f, 0x80, 0x8001, 0x3f, 0x0, 0x8b95, 0x20, 0x59b, 0x81, 0x1f, 0x6, 0x3, 0xc73, 0x941, 0x9b, 0xec, 0x5, 0x1, 0x101, 0xfffffffffffffffe, 0x8001, 0xf1, 0x80000000, 0xed, 0x20000, 0x9, 0x2b, 0x2, 0x1, 0x10001, 0x80000000, 0x200, 0x0, 0xffff, 0x1, 0x3, 0x101, 0x101, 0x0, 0x650, 0x100, 0x8001, 0x200, 0x101, 0x7fff, 0x6, 0x3, 0xffffffff7fffffff, 0x100000001, 0x9, 0x80000001, 0x3, 0x7f, 0x7, 0x7fffffff, 0x4, 0x21eb57df, 0xd303, 0x64de, 0x1, 0x2, 0x4, 0x5, 0x80000000, 0x4, 0x5, 0xd9, 0x8b, 0xa5e, 0x0, 0x7f, 0xfffffffffffffff9, 0x9, 0x665344ab, 0x1, 0x1, 0x2, 0x5, 0x5, 0x0, 0xbe44, 0x6, 0x1f, 0x100000001, 0x9a22, 0x1ff, 0x7, 0x2, 0x8504, 0x1000, 0x0, 0x9c, 0x4, 0x1, 0x6, 0x7, 0x73, 0x401, 0x11510a39, 0xc8, 0x8000, 0x9, 0x1, 0xfffffffffffffff9, 0x9, 0xff, 0x8, 0x100000001, 0x7, 0xfff, 0x7fffffff, 0x2, 0x99, 0x7, 0x2, 0x0, 0x1, 0x81e, 0xff, 0xc9, 0x935f, 0x4, 0x9, 0x8, 0x7, 0x1, 0xa43, 0x9, 0x0, 0xff, 0x1, 0x1, 0x3, 0x3ba, 0x6f4, 0x1f81, 0x1, 0x8, 0xae07, 0x400, 0x0, 0x20000, 0x3ff, 0x2, 0x6, 0x2, 0x5, 0x9, 0x5, 0x3, 0xffffffffffffffff, 0x100, 0xb9, 0x0, 0x4, 0x400, 0x1ff, 0x10001, 0x7, 0x2, 0x4f1, 0x9, 0x8, 0x985, 0xfffffffffffffbff, 0x8000000000000, 0x5, 0xfffffffffffff2b5, 0x8001, 0x5, 0x8001, 0x0, 0x1, 0x9, 0x2, 0x80000000, 0x68, 0x0, 0x9, 0x1000, 0xffffffffffff8001, 0x81, 0x4, 0x81, 0x14b3, 0x9, 0x9b0, 0x3ff, 0x7ff, 0x10001, 0x954, 0x8, 0x100, 0xffffffffffffffff, 0x10000, 0x200, 0x6, 0x8000, 0x400, 0x7, 0x5, 0x0, 0x6, 0x0, 0x12ee837, 0x1, 0x1, 0x0, 0x2, 0x800, 0x1, 0x3, 0x89fb, 0x2, 0x7f, 0xff, 0x200, 0x4, 0x5, 0x7fff, 0x100000000, 0x200, 0x7fffffff, 0x25, 0x3f, 0x1, 0x7, 0x5, 0x4, 0x2, 0x7fffffff, 0x3, 0x3, 0x7fff, 0x7, 0x101, 0x7, 0x5, 0x7, 0x2, 0x4, 0xffffffff, 0xfffffffffffffc00, 0x401, 0x7fffffff, 0x200, 0x6, 0x100000000, 0x4cd2, 0x893, 0x10001, 0x2, 0x4, 0x9, 0x71e, 0xff, 0x8, 0x3, 0x5, 0x1, 0x3, 0x3, 0x1, 0x40800000, 0xf8, 0xfffffffffffffdee, 0x95c, 0x101, 0x8001, 0x4, 0x9, 0xffffffffffffffe7, 0x7fffffff, 0x0, 0x6, 0x10000, 0x40000000000000, 0x0, 0x7fffffff, 0x100000000, 0xf74, 0x6, 0x2, 0x4, 0x0, 0x1ff, 0x1, 0x52, 0xfffffffffffffffa, 0x3, 0x2, 0x8c, 0x1, 0x5, 0x0, 0x7, 0x4, 0x6, 0x7, 0x1, 0x4, 0x7, 0x7fff, 0x5, 0xfffffffffffffff9, 0xaa, 0x3, 0x6, 0x401, 0x2, 0x6, 0x6, 0xffff, 0x2, 0xffffffffffff3118, 0x8001, 0x51, 0x3f8, 0xd2f9, 0x3, 0x4e77, 0x1c00000000000, 0x8, 0x0, 0x1000, 0x3, 0x2, 0x0, 0x7, 0x8, 0x7, 0x8, 0x2ab, 0x7fff, 0x4, 0x8001, 0x401, 0x87, 0x4, 0x6, 0x1, 0xfb03, 0x4, 0x4, 0x10000, 0x10000, 0x69, 0x30d, 0x4, 0x7, 0x1, 0x0, 0x80000000, 0x9, 0x2, 0x9, 0x4, 0x1ff, 0x40000000000000, 0x4, 0x101, 0x0, 0xb430, 0x100000001, 0x9, 0x8, 0x100000001, 0x67f, 0x6, 0x9, 0x200, 0x10000, 0x7, 0x8, 0xfffffffffffffffc, 0x7, 0xffffffffffffffe0, 0x0, 0x0, 0xffffffffffff8000, 0x20, 0x2, 0x0, 0xffffffffffffffe0, 0x4, 0xf5, 0x8, 0x4, 0x8, 0x3f, 0x3af70bd7, 0x6, 0x7, 0x200, 0x100000000, 0x1d8, 0x6, 0xdd3c, 0x3, 0x93b2, 0x5, 0x1000, 0x8, 0x6, 0x0, 0x4, 0x1, 0x6, 0x2, 0x9, 0x397edb68, 0x4, 0x8, 0x4, 0x4, 0x3, 0x8, 0x7, 0x56, 0xfff, 0x81, 0x7fffffff, 0x8, 0x4, 0x8, 0x1, 0x5, 0x5, 0x4, 0xffffffffffff0000, 0x100000001, 0x400, 0x6, 0xfffffffffffffffe, 0x3, 0xfffffffffffff000, 0x2, 0x1, 0x6, 0xe079, 0xffff, 0x5, 0x2, 0x3, 0x2, 0x1f, 0x0, 0x0, 0x7f, 0x2, 0x81, 0x7, 0x2, 0x0, 0x19, 0x8, 0x9, 0x81, 0x80000001, 0x1, 0x6, 0x6, 0x5, 0x7, 0x101, 0x8000, 0x3, 0x3e5, 0x10001, 0x200, 0x8, 0x7, 0x5, 0x2, 0x62, 0x9, 0x0, 0x71ef8f8f, 0x40, 0x6, 0x0, 0x2, 0x8b25, 0xb6, 0x8, 0x5, 0x1ff, 0x0, 0x7, 0x7ff, 0xb63, 0x4, 0x15, 0x2, 0x5, 0x2, 0x3cab, 0xfffffffffffffff8, 0x20, 0x4, 0x3, 0x51ebab07, 0x1ff, 0x200, 0x8, 0x3, 0x4, 0x2, 0x7, 0x10000, 0x401, 0x3f, 0xffffffff, 0x44, 0x7, 0x5, 0x100000001, 0x9, 0xdaf8, 0xfffffffffffffffb, 0x3, 0x100000000, 0x4, 0x1ff, 0x4, 0x401, 0x9, 0x1, 0x0, 0x3, 0x300000000000000, 0x9, 0x182, 0xfffffffffffffffe, 0x80000001, 0xffffffffffffffc1, 0x80, 0x0, 0xfff, 0x0, 0x7ff, 0x7, 0x3, 0xb859, 0x8, 0x80000000, 0x9, 0xd7, 0xfff, 0x5, 0x4, 0x1c0000000000000, 0x401, 0x0, 0x6, 0xb8b, 0x0, 0x1, 0x9, 0x8, 0x1, 0x4, 0x26, 0x2, 0x3, 0x6, 0x8001, 0x8, 0x80000001, 0x80000000, 0x51, 0x9, 0x732, 0x8, 0x9000000000000000, 0x7, 0x9, 0x7fffffff, 0x1965, 0x100000001, 0x81, 0x0, 0x9, 0x74, 0x10001, 0x0, 0xf706, 0x6, 0x8, 0x8, 0x1, 0x8, 0xd51, 0x0, 0x0, 0x4, 0x43, 0x8000, 0x9, 0x8bd9, 0x100000000000000, 0x1, 0xbd19, 0x5e75, 0x9, 0x9, 0xcf, 0x1, 0x8, 0x5, 0x10001, 0x436, 0x5, 0x5f88, 0x80000001, 0x5, 0x2, 0x1, 0x2, 0x1ff, 0x3, 0x1, 0x9e, 0xdc5, 0x2, 0x200, 0x3, 0x4553259b, 0x4a07a4b3, 0x4063, 0x56, 0xffffffffffffff0b, 0x2, 0x2, 0x5, 0x836, 0x101, 0x1d2, 0x4, 0x6, 0x91f, 0xffffffffffffc544, 0x4, 0x2, 0x9, 0xa196, 0x100000001, 0x3ff, 0x8000, 0x214, 0x4, 0x18000000000, 0xdd7, 0xeeb1, 0x6, 0xfffffffffffffffa, 0x5, 0x8, 0x6, 0x6, 0x9, 0xf3fd, 0x95, 0x6, 0x1ff, 0x3ff, 0x200, 0x1, 0x1cf, 0x1ff, 0x9, 0xae3, 0x7, 0x0, 0x1f, 0x5, 0x1, 0x80, 0x5, 0xc000000000000000, 0x5, 0x6, 0x7fffffff, 0x100000000, 0x2d, 0x9, 0x3, 0x20, 0x1000, 0x10001, 0x1, 0x3, 0xd1e, 0x800, 0x4, 0x1, 0x0, 0x6, 0x3, 0x9, 0x0, 0x4, 0x7, 0x81, 0x9ceb, 0x0, 0x7322, 0x1f, 0xffffffffffffffff, 0x2, 0x708, 0x4, 0xadf2, 0x79b, 0x7, 0x3, 0x0, 0x1, 0xffffffffffffb835, 0x1, 0x3, 0x81, 0x5, 0x800, 0x2, 0xc46e, 0xb68, 0x9c5c, 0x3f, 0xe70, 0x5, 0x100, 0xe000000000000000, 0x10001, 0x2, 0x3, 0x0, 0x9, 0x3, 0x7ff, 0x5, 0x1, 0x76, 0x1, 0xfffffffffffffffb, 0x2, 0x9, 0xffffffff7fffffff, 0x3, 0x8000, 0x3800000000000, 0x9, 0x1000, 0x35ac668000000000, 0xfae1, 0x6, 0x8, 0x5, 0x8, 0x1d, 0x7fffffff, 0x7, 0x4, 0xd388, 0x3, 0x200, 0x7f, 0xf, 0x4, 0x1, 0xb8, 0x6, 0x1, 0x80000001, 0x4, 0x800, 0x40000000000000, 0x7, 0x9, 0x2, 0x6, 0x2, 0xa, 0x6e48, 0x59, 0xcfbd, 0xd3, 0x0, 0x100000000, 0x6, 0xc5, 0x20, 0xd8, 0x6, 0x9, 0x8, 0xfffffffffffffffd, 0xfff, 0x3, 0x3, 0x5, 0x8, 0x5262, 0x8, 0x1, 0x6, 0x1, 0xfe9, 0x90e4, 0x5, 0x80000001, 0x974, 0x1ff, 0x3ff, 0x4, 0x8, 0x7fff, 0x2, 0x8, 0x3, 0xde5, 0x9, 0x72, 0x503, 0xfffffffffffffff7, 0x0, 0x9, 0x5, 0x81, 0x4, 0x4, 0x8, 0x40, 0xe0, 0x6, 0x1, 0x41, 0x1, 0x0, 0xb2b, 0xc2a5, 0x80000000, 0xfffffffffffffffa, 0xffffffffffffff00, 0x2, 0x2, 0x7fffffff, 0x7, 0x7, 0x8, 0x7fff, 0x5, 0x1, 0xffffffffffff8001, 0x0, 0xe1, 0x3f, 0x8, 0x3, 0xffff, 0x0, 0xffffffffffffff5d, 0x80000001, 0x20, 0x100000001, 0x7ff, 0xe15, 0xe56, 0x7, 0x812, 0x6, 0x4c02, 0x189, 0x3, 0x3, 0x23, 0xcd0, 0x8, 0x9, 0x20, 0xb4bc, 0xff, 0x6, 0x20, 0x0, 0x0, 0x7, 0x4, 0x0, 0x101, 0x5, 0x10000, 0x7fffffff, 0x800, 0x4, 0x5, 0x0, 0x800, 0x6, 0x3, 0x7, 0xbac1, 0xb5c, 0x8, 0x9ba, 0x8, 0x100000000, 0xa54, 0x101, 0xf648, 0x12000, 0x1, 0x2a91, 0x10000, 0x10001, 0x80000000, 0xc5d, 0x8, 0x1, 0x0, 0x3, 0x2, 0x9, 0x4, 0x0, 0xff, 0x0, 0x6, 0x9, 0xc6, 0x9, 0x2400000, 0x3, 0xffff, 0xca, 0x0, 0x1, 0x2, 0x3f, 0x9, 0x0, 0x7, 0x6, 0x12, 0x4742, 0x2, 0x4, 0x3, 0xf09, 0xc9, 0x0, 0x100000001, 0x400, 0xff, 0x8, 0x81, 0x3, 0x380d, 0x3709, 0x9023, 0x100000000, 0x8, 0x100, 0x20, 0x1, 0x1, 0x9, 0x5, 0x3, 0x8, 0x80, 0x7, 0x1, 0x9, 0x8, 0x4, 0x7, 0x7, 0x45e2, 0x1, 0x0, 0x2, 0x7, 0xdb, 0x6, 0x3, 0xfffffffffffffffa, 0x7, 0xffffffffffffffff, 0x3, 0x2, 0x80000000, 0x5, 0x8, 0x7f, 0x8000, 0xfffffffffffffff9, 0x13, 0x2, 0x9, 0x5, 0x5, 0x0, 0x20, 0x9, 0x7ff, 0x10000, 0x19e, 0x1, 0xee5, 0x2, 0x3, 0xa161, 0xab3, 0x4, 0x3, 0x339a, 0x5, 0x8, 0x9, 0x7, 0x38, 0x2, 0x400, 0x3d, 0x0, 0xe996, 0xe9, 0x813, 0x6, 0x100000000, 0x9, 0x1, 0xb, 0x66, 0x652, 0x10001, 0x19, 0x400, 0xd076, 0x1, 0x8, 0xfff, 0x87c, 0x4, 0x1, 0x401, 0xf6a5, 0x4, 0x7, 0x8, 0x7, 0x2, 0x7, 0xfffffffffffffffe, 0x8, 0x7d51, 0x7, 0xa62, 0x1f, 0x80000000, 0x2cf2, 0x8, 0x4, 0xfffffffffffff114, 0x5, 0x7ff, 0x80000000, 0x7, 0x1, 0x80000001, 0x2, 0x3, 0xb5d, 0x2, 0xffffffff, 0x100000001, 0x101, 0x4, 0x6, 0xfff, 0x81, 0x9, 0x2, 0x1, 0x8001, 0x8, 0xffffffff, 0x5, 0x6, 0x6, 0x6, 0x32, 0xffffffff, 0xfc00000000000000, 0x7, 0x6, 0x200, 0x7f, 0x7ff, 0x4, 0x8, 0x100000001, 0x20, 0x3f, 0x9, 0x8, 0x7, 0x6293, 0xe71d, 0x6d6, 0x0, 0x0, 0x5, 0x43, 0x5f1a, 0x3, 0x7f, 0x101, 0x5, 0x2, 0x1, 0xffffffffffffffff, 0x0, 0x2, 0x80, 0x200, 0x9, 0x8, 0x3, 0x6, 0x8000, 0xfffffffffffffbff, 0x5, 0xfffffffffffffc01, 0x7, 0x5, 0x1, 0x9, 0x6, 0x80000000, 0x0, 0x43cc84fa, 0x5, 0x8, 0xa7e, 0x10001, 0x6320, 0x3ff, 0xff, 0x40, 0x6, 0x1, 0x6, 0x7, 0x5, 0xfffffffffffffffd, 0x1, 0x1, 0x100000001, 0x4, 0x10000, 0x80000001, 0x2, 0xfff, 0x7fff, 0x92a, 0x8, 0x9, 0x3, 0x81, 0x9, 0x7fffffff, 0xfff, 0x1, 0x0, 0x101, 0x2, 0x2, 0xc1, 0x0, 0x4, 0xffffffff, 0x0, 0xc416, 0x3, 0x7ff, 0x88d5, 0xfffffffffffffffd, 0x35, 0x2, 0x80, 0x7fff, 0x7fffffff, 0x4, 0x6, 0x200, 0x3, 0x800, 0x1, 0x18b, 0xbfbb, 0x9c8b, 0x5, 0x401, 0x9, 0x1, 0xb3f, 0x0, 0x2, 0x7fff, 0xffffffff, 0x4, 0x3, 0x2, 0xfffffffffffffffa, 0x6, 0x62, 0x8, 0x8000000, 0xff, 0x7f, 0x100000001, 0x8, 0xee, 0x1, 0xff, 0xfb32, 0xcc6d, 0x0, 0x0, 0x5, 0x10000, 0x7, 0xde, 0x5, 0x8, 0x2, 0x5, 0x20, 0x10000, 0x4a, 0x183, 0x2, 0x8, 0x3, 0x8, 0x34e, 0x6, 0x3, 0x8, 0xa8, 0x10001, 0x1000, 0x6, 0xffffffffffff8a17, 0x4, 0x3, 0x0, 0x1, 0x1, 0x7, 0xbc, 0x20, 0xff, 0x20, 0x2, 0x44, 0x516a000, 0xff, 0x0, 0x1, 0xa0, 0x1, 0x1, 0xff4, 0x5, 0x80000000, 0x0, 0x6, 0x8, 0x2, 0xd2, 0x1, 0x8, 0x7, 0xf6, 0x100000000, 0x3, 0x4, 0xffffffffffff8000, 0x9, 0x4, 0xffff, 0x7, 0x1000, 0x1, 0x4, 0x7, 0x300, 0x8, 0x0, 0x100000000, 0x8000, 0x4, 0x0, 0x9, 0x2, 0x800, 0x7fff, 0x5, 0xffff, 0xb4, 0x5, 0x20, 0x7, 0x5452, 0x9, 0x80, 0x3fc0000, 0x3ff, 0x691c, 0x9e52, 0xffffffffffffffe1, 0x0, 0x5, 0x7, 0x8, 0xbee, 0xd03, 0x8, 0x1, 0x80000001, 0x9, 0x3, 0x8, 0x3, 0x3, 0x8, 0xc632, 0x3, 0x48000000000, 0x5, 0x8, 0x8, 0x7f, 0x0, 0x4, 0x5, 0x7, 0x7, 0x7, 0x4, 0x2a, 0xc43, 0x7, 0x68dc, 0x8b, 0x7ff, 0x9, 0x9, 0x800, 0x1, 0x0, 0x2, 0x80, 0x5c, 0x23, 0x8000, 0x8, 0x1466, 0x2, 0x8, 0x3, 0x9, 0x2, 0x4, 0xf5e2, 0x4, 0x4, 0x6, 0x3, 0x4, 0xfffffffffffffffb, 0x6c01, 0x80000000, 0x8001, 0xffffffffffffff80, 0xfff, 0x1, 0x100000000, 0x2, 0x3, 0x80000001, 0x4e, 0x8, 0x3, 0x3, 0x1f, 0x5, 0x9, 0x40, 0x6, 0x6, 0x2, 0x4, 0x7f, 0x100000001, 0x1f, 0x8000, 0x7, 0x2, 0x9, 0x8, 0xec3, 0x4, 0x7fff, 0x8000, 0x2, 0x6, 0x4, 0x81, 0x5, 0xad95, 0x2, 0x58, 0x0, 0x4, 0x8, 0x800, 0x2, 0x551, 0x6, 0x5, 0x100, 0x6e649330, 0x7fffffff, 0x100000001, 0x7, 0x2, 0x7f, 0x100000000, 0x9, 0x9, 0x2, 0x7fff, 0x6, 0xe5d, 0xf, 0x0, 0x2, 0x0, 0x25d, 0x7, 0x8, 0x1, 0x5, 0x1, 0x9, 0x9, 0x0, 0x200, 0x81, 0xec, 0x7, 0x4, 0x5f, 0x80000000, 0x5, 0x1, 0x5c90, 0x6, 0x5, 0xc7, 0xfffffffffffffffa, 0x4, 0x401, 0x800000000000000, 0x100000001, 0x3, 0x1ff, 0x7, 0xa3, 0xee, 0x7ff, 0x4, 0x7, 0x8, 0x8, 0xfffffffffffff801, 0x7, 0x69c, 0x7fff, 0x606, 0x5, 0x7, 0x4, 0x3f, 0x87, 0x3, 0xffffffffffffffc1, 0x0, 0x1, 0x172, 0x3a, 0x1, 0x64, 0x1, 0x80000001, 0x2, 0x5, 0x5, 0x1ff, 0x1, 0x2, 0x101, 0x7fffffff, 0x4, 0x8, 0x2, 0x64a, 0xbc52, 0x4, 0xfff, 0x7, 0x642e682e, 0x6, 0x6, 0x1ff, 0x61, 0x7, 0x1, 0x8, 0x2, 0x7fff, 0x8001, 0x7fffffff, 0x0, 0xffffffff, 0xfff, 0x6, 0x10000, 0x6, 0xffffffffffffff2c, 0x7, 0x7, 0x3, 0x5, 0x400, 0x5107, 0x1, 0x0, 0x2, 0x3, 0x0, 0x47d, 0x9, 0x1, 0x5e, 0x7, 0x6, 0x89, 0x62, 0x4, 0x401, 0x1, 0x100000001, 0x195, 0x401, 0x0, 0xfffffffffffffffc, 0x0, 0x2, 0x97, 0x30000, 0xc8, 0x8, 0xfffffffffffffff9, 0x4, 0x9, 0x1, 0x4, 0x401, 0xab, 0x1, 0x1, 0x7fffffff, 0x9, 0x3800, 0xf37, 0x0, 0x3, 0x3, 0xc00, 0x5, 0x0, 0x7, 0xfffffffffffff000, 0x9, 0x6, 0x1, 0x5, 0x7ff, 0x0, 0x0, 0x2, 0x8, 0x3, 0x5, 0x9, 0x80000001, 0x5, 0x80000000, 0x200, 0x300000000, 0x2, 0x0, 0x22a1902d, 0x9, 0x1, 0x400, 0x7, 0x14, 0x8819, 0x1, 0x80, 0x7, 0x6, 0x7, 0x2, 0xfffffffffffffffb, 0x5, 0x3, 0x401, 0x0, 0x81, 0x9, 0x100000001, 0x410caa68, 0xb761, 0x401, 0x6f83, 0x9, 0x8, 0x3d6, 0x7f, 0x8, 0x6b, 0x6, 0x4, 0x7, 0x101, 0x1, 0x6, 0x1800000000000000, 0x4, 0x40, 0x4000000000, 0x80000001, 0x7ff, 0x3, 0x6, 0x8, 0x7fffffff, 0x101, 0x0, 0x8, 0x5, 0x20, 0x8001, 0x101, 0xfffffffffffffffc, 0x8, 0xffffffff, 0x3, 0x3, 0x8, 0x2, 0xfe, 0x6, 0x9, 0x101, 0x23b, 0x1, 0x7, 0x101, 0x2, 0x1f, 0xfffffffffffffffd, 0x80e0, 0x7, 0x120000000000000, 0xffff, 0x80, 0xfffffffffffffffd, 0x10001, 0x100, 0x10001, 0x7ff, 0x10000, 0x4, 0xf3, 0x6, 0xa55, 0x6, 0x5, 0xd679, 0x9, 0x71, 0xbf5, 0x7, 0xf93, 0x2, 0x100000000, 0x7fffffff, 0xff, 0xbf8, 0x7, 0x3, 0x4, 0x8, 0x7, 0x7f, 0x1000, 0x4, 0x8, 0xeb85, 0x8, 0x7, 0x6, 0x6, 0xcb, 0x100, 0x9, 0x4, 0x0, 0x3, 0x7f, 0x29643807, 0x96, 0x20, 0xe6b, 0x7, 0x80000001, 0x20, 0x3, 0xb2, 0x6, 0x86, 0x7, 0xecb, 0xffffffff, 0x0, 0x7bf, 0x7, 0x6, 0x2, 0x7fff, 0x0, 0x100000001, 0x2, 0x401, 0xe8, 0x1, 0x6, 0x70520000, 0x6, 0x2, 0x8, 0x9, 0x0, 0x5, 0x9, 0x0, 0x5, 0xa260, 0x7, 0x5, 0x4e8, 0x80000000, 0x6341, 0x8, 0x7, 0x8, 0x100000000, 0x101, 0xffffffffffff7fff, 0x5, 0x1, 0x80, 0x100000001, 0x80000000, 0x3, 0x9, 0xfff, 0x6, 0xffffffffffff271e, 0x8, 0x3, 0x9a9, 0x1, 0x7ff, 0x8, 0x34f, 0x5, 0x0, 0x7, 0x20, 0x8, 0x7, 0x8, 0x800, 0xfffffffffffffc00, 0x1e, 0x1000, 0x40400000000, 0x6, 0x4, 0x40, 0xfff, 0xb2, 0x7eaa, 0xfff, 0x4, 0x9, 0x3, 0x101, 0xf1, 0x1, 0xffffffffc89e7aeb, 0x6, 0x3, 0xc8, 0x6, 0x7, 0x2, 0xfb1, 0xb1db, 0x2, 0xf18b, 0x2b, 0xbd, 0xfffffffffffffff7, 0x7f, 0x9, 0x9, 0x60000000000000, 0x3, 0x6, 0x1f, 0x3, 0x8, 0x8, 0x6fff, 0x8, 0x9, 0x80000001, 0x4, 0x2, 0xfffffffffffffff9, 0x5e26, 0x5, 0x8000, 0xedd, 0x7, 0x8, 0x4, 0x4, 0x797, 0x3, 0x80000001, 0x0, 0x7fff, 0x1, 0x7d9, 0xfffffffffffffe00, 0x3, 0x6, 0xae, 0x5, 0x0, 0x8, 0x21d, 0xc3, 0x0, 0xccbe, 0x3, 0x6, 0x4, 0x9, 0x4, 0x6, 0x40dcb864, 0xffff, 0x2, 0x5, 0x2, 0x4, 0x0, 0x8, 0x5, 0x30b, 0x5, 0x7fffffff, 0x400, 0x8, 0x2, 0x400, 0x3, 0x9c42, 0x3f, 0x836e, 0x8, 0x4, 0x12, 0x10001, 0xe2, 0x2, 0x774e, 0x170f183a, 0x6, 0x0, 0x2, 0xfffffffffffffbff, 0x4, 0x2, 0x1, 0x4, 0x1a1, 0x7fffffff, 0x401, 0x69, 0x9, 0x2, 0x1, 0x3, 0xfffffffffffffe01, 0x3, 0x9, 0x7, 0x5, 0x6, 0x4, 0xff, 0x1, 0x4, 0xffffffffc2d98f6c, 0x1, 0x3ff, 0x20, 0x40, 0x100000001, 0x1, 0x0, 0x2, 0x7, 0x10001, 0x8, 0x100000000, 0x1, 0x401, 0x5, 0x3, 0x3, 0x1, 0x1a24, 0x3, 0x9, 0x23f2, 0x0, 0x1, 0x9, 0x7, 0x6c1, 0x1000, 0x401, 0x9, 0x1, 0x5, 0x3, 0x9b, 0x10001, 0xfff, 0x81, 0x7, 0x7, 0x7fffffff, 0x6, 0x6, 0x21, 0xbef, 0x8, 0xd7a, 0x2, 0x2, 0x9, 0x1, 0x6, 0x7ff, 0x4, 0x4, 0x200, 0x3ff, 0x1, 0x2, 0xffffffffffff8001, 0x6, 0x8, 0x1, 0x2, 0x7, 0x40, 0x2, 0x1, 0x3ff, 0x5, 0x9a9c, 0x0, 0x5, 0x6, 0xffffffffffff3150, 0xfffffffffffffffb, 0x2, 0x7, 0x6, 0x6, 0xa57, 0x1, 0x2, 0x7, 0x42b, 0x0, 0x460b, 0x101, 0x6, 0x100, 0x0, 0x6, 0x2, 0x7fffffff, 0x2, 0x3f, 0x10000, 0x56, 0x1, 0xfff, 0xb273, 0x6, 0x3, 0x3, 0x0, 0x5, 0x1, 0x9, 0x1, 0xfa2, 0x7ff, 0x1ff, 0x8, 0x40, 0x3ff, 0x100000000, 0x0, 0xfffffffffffffffb, 0xd7, 0x3f, 0x3, 0x5c361d01, 0x4, 0xde0, 0x7ff, 0x1, 0x800, 0x24000000, 0xffff, 0x400, 0x9, 0x80000001, 0x9, 0xff, 0x5, 0x0, 0x31, 0x100000000, 0x1, 0x0, 0x7, 0x8000, 0x100000000, 0x2, 0x6, 0x1, 0x121be2c4, 0xf94, 0x7, 0x7fffffff, 0x7, 0x8000, 0x8, 0xffffffffffffffe0, 0x3, 0x1, 0x7fffffff, 0xfffffffffffffffb, 0x3, 0x1, 0xfff, 0x6, 0x70000, 0xffffffff00000001, 0x0, 0x7, 0x80000000, 0x401, 0x9, 0xfff, 0x7fff80, 0x80000000, 0x1, 0xffffffffffffc25f, 0x20, 0x1, 0xe83f, 0x0, 0x8, 0x7, 0x9, 0xfff, 0x0, 0x78f, 0x1, 0x94, 0x401, 0xffff, 0x101, 0xf4, 0x0, 0x49f, 0x8, 0x7ff, 0x8, 0x8, 0xffffffffffffffff, 0x10001, 0x5, 0x80000000, 0x5, 0x9, 0x200, 0x80, 0x8, 0x1, 0x1, 0x8001, 0x1cb2, 0x0, 0x7e6c, 0xffffffffffffff6b, 0x2, 0xa14, 0xfffffffffffeffff, 0xffffffffffffffff, 0x7, 0xbe, 0xff, 0xffffffff, 0x4, 0x1, 0x61, 0x7f, 0x9, 0xffffffffffff7fff, 0x12ba, 0x1, 0x6, 0x80000001, 0x40, 0x80, 0xff, 0x1, 0x4, 0x101, 0x2, 0x8, 0xa4d, 0xfffffffffffffffc, 0x570, 0x6, 0xfffffffffffffffa, 0xfff, 0x8, 0x6, 0x5, 0x6, 0x8, 0xdc, 0x2, 0x9, 0x1, 0xfbc, 0x5, 0xfffffffffffffff7, 0x2, 0xb6, 0x0, 0x5, 0xfffffffffffffffc, 0xfff, 0xd0d7, 0x3, 0x4b6beb5f, 0x8, 0x8, 0x5, 0x2, 0x3, 0x6, 0x6, 0x3, 0x1, 0x8, 0x3, 0x4, 0xffffffffffffffff, 0x4, 0xbbd0, 0x8000000000, 0x9, 0x1, 0x7, 0x9, 0x1cd, 0x8, 0x0, 0x995b, 0x7, 0x80000001, 0x4, 0x100000001, 0xffffffffffffffc1, 0x1, 0x100000001, 0x8, 0xb4, 0x9, 0x1, 0x9, 0x9, 0xffffffffffffffe0, 0x100000000, 0xffffffffffffd769, 0x5, 0x96, 0x1, 0x7fffffff, 0x5, 0x5, 0x0, 0x9, 0x5e84, 0x0, 0x7, 0x9, 0x24, 0x6, 0x4f, 0x1b, 0x100000000, 0x0, 0x3f, 0x3f, 0x400, 0x9, 0x101, 0x5, 0x3, 0x8, 0xa00000000000000, 0xa, 0x3, 0xb6, 0x7, 0x3ff, 0x3f, 0x6, 0x200, 0x0, 0x8, 0xfff, 0x8, 0x6, 0x5, 0x26b, 0x8, 0x8, 0x100000001, 0x7, 0x328, 0x5d, 0x4, 0x7, 0x6, 0xfff, 0xfffffffffffff801, 0x8000, 0x7635, 0x401, 0x100000000, 0x1ff, 0x1, 0x9, 0x9, 0x2, 0x2, 0x7fffffff, 0x3, 0x0, 0xfffffffffffffffc, 0x7fffffff, 0x53, 0x10000, 0x7, 0x7fff, 0x0, 0xae, 0x2, 0x4, 0xdb13, 0x2, 0x7, 0x8001, 0x6, 0x6, 0x8, 0x9, 0x0, 0x1, 0x200, 0x2, 0xce, 0x401, 0xffff, 0x892, 0x6, 0x2, 0xa955, 0xe851, 0xf7, 0x4, 0x8841, 0x6, 0x401, 0x4, 0x9, 0x6, 0x2, 0x10001, 0x5, 0x2, 0x0, 0x0, 0x1, 0x200, 0x8, 0xbad, 0x2000000000000000, 0x9, 0xffffffff, 0x5, 0x6, 0x3425, 0xffffffff, 0x1, 0x7, 0x400, 0x401, 0xfff, 0xfc20, 0x10000, 0x2, 0x0, 0x2, 0xfffffffffffffb9e, 0x6a5, 0x3, 0x6125, 0x100, 0xffffffff, 0x4, 0x6, 0x0, 0x87, 0x7f, 0x8900, 0x6, 0x7e, 0x8a86, 0x8, 0x1, 0xb9e8646, 0x80, 0x5, 0x200, 0x10001, 0x1, 0x80000001, 0x80000000, 0x7f, 0x100000001, 0x100000000, 0xffffffffffffffc1, 0xd39, 0x7f, 0x9, 0x7, 0x2, 0x7fff, 0x9, 0x4, 0x100, 0x3, 0x7, 0xea9a, 0x7, 0x5, 0x3, 0x40, 0x4, 0x7, 0x800, 0x404000, 0x6, 0x0, 0x3, 0xa1c9, 0x1, 0xfffffffffffffff8, 0x2, 0x5, 0x9, 0x8, 0x6, 0x6, 0x3, 0x3f, 0x800, 0x36, 0x3, 0x4, 0xf9, 0x6, 0x4, 0x1, 0x1, 0x1, 0x3f, 0x4, 0xfffffffffffffff8, 0x2, 0x7f, 0x4, 0xfffffffffffffff7, 0x0, 0x7ff, 0x0, 0x80, 0xfffffffffffffffa, 0x8, 0x29827678, 0x7, 0x1, 0x8, 0x516, 0x12000000000, 0x9, 0x1ff, 0xbb9, 0x401, 0x7, 0x101, 0x100000000, 0xffffffff, 0x5caa, 0xeb1, 0x2, 0xbddb, 0x0, 0x1, 0x7fff, 0x4, 0x9, 0x100000000, 0x9, 0x78, 0x6, 0xcc16, 0x3, 0x3, 0x8, 0x9, 0xab7, 0x3, 0x5, 0xffffffff, 0xfffffffffffffffb, 0xfffffffffffffffc, 0x20], "7a1f9a3f66300f627c5e470f66cee58af1dc546fe382b030b8661347adb63157430f83a5b721b9ae0b6cb6d2304d30007eaf1edb5f00b92dbe492927a2420eac254d7780d7215dd3823391d21b09c90a6a8e9837b1da291c4cca423794614f29e1fb24cbcc4a510aaad93e38543184061887fe43fbc9c817bbd0f484e5bc07419705211d283c9bf0bb705bc012532706ecdf00cf44b632a8d1b404c7034f33d70bdf2e31e55ba8c79e16a8bb907fee595b41a4e9e0c6b8d441012c2aadbba0de4384004aa5d01638f054e90f87131ec4d228d568bd5d6e471756"}}) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) 14:31:47 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000f0ffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 751.283031] xt_time: unknown flags 0x30 14:31:47 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x400000000000002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x80000001, 0x0, "0950fe4adba7"}, 0x80, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6}, 0x2c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x60000, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x2b5) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000200)={'veth0_to_team\x00', {0x2, 0x4e24, @multicast1}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e23, 0x80000001, @remote, 0x68}, @in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e20, @loopback}], 0x5c) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000006c0)={0x0, @in6={{0xa, 0x4e20, 0x5, @remote, 0x3ff}}, 0x3, 0x8}, &(0x7f00000002c0)=0x90) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000300)={r2, 0x7, 0x30, 0x3, 0x2}, &(0x7f0000000400)=0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000600)=""/182, 0xb6}, {&(0x7f00000038c0)=""/4096, 0x1000}], 0x2}, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x31128, 0x0, 0x5, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x329]}}, 0x80, &(0x7f0000000340), 0x72, &(0x7f0000000380)}, 0x0) getsockopt$inet_buf(r1, 0x0, 0x2f, &(0x7f0000000780)=""/158, &(0x7f0000000580)=0x9e) 14:31:47 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='n\nfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 751.480350] xt_time: unknown flags 0x30 [ 751.638863] overlayfs: filesystem on './file0' not supported as upperdir 14:31:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x335, 0x8000) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000440)={@pppoe={0x18, 0x0, {0x4, @local, 'erspan0\x00'}}, {&(0x7f0000000340)=""/238, 0xee}, &(0x7f0000000080), 0x20}, 0xa0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000f0ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:48 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r2 = dup(r0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f00000000c0)={0x3000, 0x1000}) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000004000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000080)="b801008ed0f33ec0c5000f45bc0088f3a566b9380900000f32baf80c66b80cea2c8d66efbafc0cec0f090f287f03f30f1ba20600bad004b8bee2ef", 0x3b}], 0x1, 0x5c, 0x0, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0xa, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = fcntl$dupfd(r3, 0x0, r1) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:31:48 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:48 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) inotify_init1(0x807ff) r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e20, 0x8, @dev={0xfe, 0x80, [], 0x13}, 0x3f}}, 0x1, 0xffff}, &(0x7f00000003c0)=0x90) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r1, 0x4) socket$inet_dccp(0x2, 0x6, 0x0) r2 = gettid() fcntl$setown(r0, 0x8, r2) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, 0x0, &(0x7f0000000280)=0xfffffffffffffd8d) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'ip6gretap0\x00', 0x201}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) eventfd(0xfff) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000600)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e21, @empty}, {0x2, 0x4e23, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000002c0)='gre0\x00', 0x94b, 0x2, 0x7}) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000440)={0x18, 0x0, {0x0, @broadcast, 'nr0\x00'}}) 14:31:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='nt/s\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 752.018567] xt_time: unknown flags 0x30 [ 752.028599] overlayfs: unrecognized mount option "loverdir=./file0" or missing value 14:31:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') mlock(&(0x7f0000005000/0x4000)=nil, 0x4000) remap_file_pages(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 14:31:48 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 752.221725] xt_time: unknown flags 0x30 14:31:48 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000001c0)={0x28, 0x2, 0x0, {0x0, 0x1f, 0xafd}}, 0x28) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x20a00, 0x0) ioctl$KVM_GET_TSC_KHZ(r3, 0xaea3) sendmsg$can_raw(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:48 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:48 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="400000000002000019000000dc0100fe2b0800d8cf1670c86266960018000000000010000000000000000020000000003d5cbe5a0000ffff53efab1c13dc52974a0c70d78bcf0ed301", 0x49, 0x400}], 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, 0xffffffffffffffff, &(0x7f0000000280)) write$P9_RVERSION(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="e2ffffff65ffff030000005743dbff0330c721fdc15e8d33cdac64c30d14500078cdd8073ca5ddbcab975efa1115e17bb9a5f0001800bcd00000000000000000baff8e9515fcaeeffa6d4efe7e49b4de47f930db82a64768b0b31914d1d6008e2105f7d5f8a147e90cd276e88a8423139f09941ac067ea58965ee4eb7791db35ce59ada77233904691b7e78aed447164d7ba140c33e878e24eb24e26756c9d200838c9"], 0xffffffffffffffe3) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000200)={r1, 0x0, r0}) [ 752.406771] overlayfs: unrecognized mount option "loverdir=./file0" or missing value 14:31:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:48 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='nt\ns\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 752.509858] xt_time: unknown flags 0x30 [ 752.531913] xt_time: unknown flags 0x30 14:31:48 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(0xffffffffffffffff, 0x118, 0x1, &(0x7f0000000480), 0x4) r0 = inotify_init1(0x807ff) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, &(0x7f0000000440)) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000040)=0xe8) r2 = geteuid() setreuid(r1, r2) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x4) mount$overlay(0x404005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0xffffffffffffffff) socket$inet6(0xa, 0x0, 0x3) [ 752.574159] EXT4-fs (loop0): couldn't mount as ext3 due to feature incompatibilities 14:31:48 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f00000001c0)={'HL\x00'}, &(0x7f0000000280)=0x1e) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x42, 0x0) sendmsg$can_raw(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@canfd={{0x3, 0x5, 0x6b40, 0xf9a}, 0x32, 0x2, 0x0, 0x0, "19a0cafd1a9d9b6c3714045d04f2bac91c3da63912e3155654a680c686a906c4f1b40c497bcae2eeed7967cc3277f93696669fde4b062d029cea0a68f99b9aab"}, 0x48}}, 0x4040000) 14:31:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000ffffff9e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:49 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x800, 0x20000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x69) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0xfffffffffffffffb}, &(0x7f00000002c0)=0x8) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip_vti0\x00'}) 14:31:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 752.930106] xt_time: unknown flags 0x30 14:31:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='nt%s\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000380)={[0x0, 0x6006, 0xd000, 0x10002], 0x2, 0x2, 0x10001}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20840, 0x0) write$eventfd(r2, &(0x7f0000000240)=0x1, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000040)) 14:31:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) [ 752.955478] Dead loop on virtual device ip6_vti0, fix it urgently! [ 752.974739] Dead loop on virtual device ip6_vti0, fix it urgently! [ 752.983464] overlayfs: filesystem on './file0' not supported as upperdir [ 753.048742] Dead loop on virtual device ip6_vti0, fix it urgently! [ 753.112742] Dead loop on virtual device ip6_vti0, fix it urgently! [ 753.150951] Dead loop on virtual device ip6_vti0, fix it urgently! 14:31:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000ffffff9e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 753.169988] xt_time: unknown flags 0x30 [ 753.178446] Dead loop on virtual device ip6_vti0, fix it urgently! 14:31:49 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x8010550e, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, 0x0) 14:31:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000001, 0x8200) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x2, 0x40) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@dev}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000480)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x6) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000300)={0x0, '\x00', 0x4}, 0x18) 14:31:49 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:49 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='nt.s\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 753.474502] Unknown ioctl 35090 [ 753.574842] Unknown ioctl 35090 14:31:50 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getflags(r0, 0xb) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0\x00', 0x800, 0x2, &(0x7f0000000240)=[{&(0x7f0000000100)="e13d70f24bf980db787c4414c2d644a90bd69fc87e94ece7868ca2428b157f41d70b31574f0ab4a5daaa50b5f6c46c7c733a880f33594f0b814515fab8ce95f9bce5900033213ed2cd6364303a02c1f6d34bf9ea22b677024edfd7a280c39de9fc2e9925def4def61c6e6c220a6b87c8780df509d54f5cff15bafd699984bd110d3b20fa4d97cf71f0717a98a3b49e17a03b07b571c2b9b614e01694dc35ac20713f39bae2ca8a2c137ddbda49775c7054c42a931d4d63ee52f79726a8a895f344c18e9025768c07829cdf24756b3782b5bd92cb2676e2ebadf384691f74", 0xde, 0x1f}, {&(0x7f0000000200), 0x0, 0x1}], 0x1080008, &(0x7f0000000440)={[{@grpjquota={'grpjquota', 0x3d, '('}}, {@disable_roll_forward='disable_roll_forward'}], [{@dont_hash='dont_hash'}, {@dont_appraise='dont_appraise'}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r2}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@hash='hash'}, {@euid_lt={'euid<', r4}}]}) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000200)={@dev={0xac, 0x14, 0x14, 0xe}, @rand_addr=0x20c, r3}, 0xc) 14:31:50 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x43b, 0x3af) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x2002, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000340)=""/101) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x8001) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:50 executing program 0: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x800, 0x20000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000180)=0x69) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0xfffffffffffffffb}, &(0x7f00000002c0)=0x8) syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'ip_vti0\x00'}) 14:31:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000009effffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf0\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:50 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0xffffffff, 0x1ba) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)="000000000000c800", 0x12f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) getresuid(&(0x7f0000000240), &(0x7f0000000340)=0x0, &(0x7f0000000380)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f00000004c0)=0xe8) getresuid(&(0x7f0000000500)=0x0, &(0x7f0000000540), &(0x7f0000000580)) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000006c0)={'rose0\x00', 0x5}) fstat(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="02000000010001000000000002000200", @ANYRES32=r3, @ANYBLOB="02000400", @ANYRES32=r5, @ANYBLOB="02000700", @ANYRES32=r6, @ANYBLOB="ac01a64dfcf78ad9ec24f29b527557d24b1c8bcacd2da8bceef2c5242adabe0545d8ed3ecce59d0da5e67a82f5f5f13092b9011a2f6205b13d72185b4a2f2d782d82658cf90d41588b8fa0815129ca6474f00ad68cf65543c8339dac402d0dc1e64020c3998ec6e7a47a1f88a9c391304972004b29f0957aaac34d830d2ecd69d1d58f0aae62ab1718b27de4c4d945f64578acf25bbb381b769e61d903d8a20f0fcd332f0720f92350aa1e40c9ab8f28a99224e3f50b082e21ec4fd90dc854e6394d14e09fd1c8644bda0a305a8a88865d70039f4e", @ANYRES32=r7, @ANYBLOB="040000002000020000040000000000000000000000000000"], 0x44, 0x1) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in=@broadcast, 0x4e21, 0x37, 0x4e20, 0x5, 0xa, 0x20, 0xa0, 0xde, r4, r7}, {0x1, 0x7ff, 0x0, 0x6, 0x4, 0x1, 0xd99, 0x7}, {0x0, 0xffff, 0x0, 0x964}, 0x0, 0x6e6bb1, 0x0, 0x0, 0x0, 0x1}, {{@in=@remote, 0x4d4, 0x2b}, 0x2, @in6=@mcast2, 0x0, 0x0, 0x1, 0x4, 0x6, 0x8000, 0x4ca9ab6f}}, 0xe8) r8 = syz_open_dev$dmmidi(&(0x7f0000000640)='/dev/dmmidi#\x00', 0xde1, 0x40000) setsockopt$inet6_MRT6_ADD_MIF(r8, 0x29, 0xca, &(0x7f0000000680)={0x4, 0x1, 0x6, 0xfc0000000, 0x8}, 0xc) [ 753.959702] Dead loop on virtual device ip6_vti0, fix it urgently! 14:31:50 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x181001) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000001c0)={0x27, 0x0, 0x10001, 0x7}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0x77ef, r1, 0x0, 0x85}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x101, r2}) io_pgetevents(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000340)={&(0x7f0000000140), 0x285}) writev(r0, &(0x7f0000000180), 0x1d7) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000280)={0x84, 0x5, 0x81, 'queue1\x00', 0x1}) r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0xfffffffffffffff8, 0x0, 0xff, 0x6, 0x0, 0x1, 0x8000, 0x2, 0x5, 0x889, 0x3, 0x3f, 0x4, 0x9438, 0x4, 0x40, 0x5, 0x2, 0x6, 0x3, 0x7, 0x42c, 0x0, 0x3000000000, 0x6, 0x7, 0x20, 0x8, 0xa818, 0x40, 0x1ff, 0x3, 0xfffffffffffffff8, 0x5, 0x7f, 0x7f, 0x0, 0x7fff, 0x2, @perf_bp={&(0x7f0000000180), 0x4}, 0x2, 0x8, 0x1, 0x7, 0x100000000, 0x3ff, 0xe3}, r3, 0x3, r0, 0x3) 14:31:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:50 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e1b, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x104040000) 14:31:50 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x3, 0x0, 0x400, 0x3, 0x4}}) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x3c3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x24) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r1, 0x4, 0xff}, 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x8) r2 = socket$unix(0x1, 0x3, 0x0) poll(&(0x7f0000000080)=[{r2}], 0x1, 0x401) shutdown(r2, 0x0) 14:31:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:50 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r0, 0x0, 0x0, 0x4, 0x0}, 0x20) 14:31:50 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfX\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:50 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000012030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:50 executing program 0: r0 = socket$inet6(0xa, 0x800, 0x8) close(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)="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") sendfile(r1, r0, 0x0, 0x8) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r0, 0x0) fsetxattr$security_smack_transmute(r1, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000000)=""/187) 14:31:51 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x80004e20, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='comm\x00') setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000340)=0x9, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfc\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:51 executing program 1: socketpair(0x2000800000001, 0x40000000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f00000001c0)) recvmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) migrate_pages(0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0x3}, 0x28, 0x1) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x108) write$cgroup_int(r2, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) 14:31:51 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x18) 14:31:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000001c40)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x42, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f0000000240)={0x9d0000, 0x8f3f, 0x8, [], &(0x7f00000001c0)={0x9f09df, 0x0, [], @p_u8=&(0x7f0000000080)=0x1000}}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000340)=0x0) process_vm_readv(r3, &(0x7f0000000640)=[{&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000000380)=""/181, 0xb5}, {&(0x7f0000000440)=""/255, 0xff}, {&(0x7f0000000540)=""/48, 0x30}, {&(0x7f0000000580)=""/171, 0xab}], 0x5, &(0x7f0000001bc0)=[{&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/117, 0x75}, {&(0x7f00000007c0)=""/118, 0x76}, {&(0x7f0000000840)=""/149, 0x95}, {&(0x7f0000001b40)=""/34, 0x22}, {&(0x7f0000001b80)=""/53, 0x35}], 0x6, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x1ff}, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000900)={{{@in6=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000000a00)=0xe8) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f0000001c80)={0x8, 0x20, 0x101, 0x2, 0x100, 0x9}) sendmsg$can_raw(r0, &(0x7f0000000b00)={&(0x7f0000000a40)={0x1d, r4}, 0x10, &(0x7f0000000ac0)={&(0x7f0000000a80)=@can={{0x0, 0x10001, 0xce9}, 0x2, 0x1, 0x0, 0x0, "d57f5025903af947"}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x4) 14:31:51 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfp\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:51 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xb57, 0x48000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x208402, 0x0) r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0xffd, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000100)={0x1, @raw_data="4bb6ad47942dd8b742413132f77d33b9babd6e90787ab8be16a56096a2aaa244eb0a9542401547a54c1774940faf9f5c0fa7ebec00ccfacbcaf16066b101bade48102791791b6893cfb75c00fd1e1f7a3df7440add077023df680d10de814a30ede2af3ab647f8c9261feb180e13108d2853c2c6a3261453860b8ffd36c583412d03e339763d9d003308d5f9f17e95b4e92cf55cfadbbe40e9fceb792957300d8b38d2f29b9a232c001ed37a970aecf220e70eb36bd50a7ee9176615c3779fdfd5cc3e757ab3cb87"}) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000040)=0x1d0b) 14:31:51 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:51 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4427c, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f00000003c0)={@remote, @multicast2}, 0x8) prctl$PR_GET_TIMERSLACK(0x1e) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x6810a}, 0xc, &(0x7f0000000340)={&(0x7f0000000240)={0x24, r2, 0x1, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x40) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000400)) 14:31:51 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xb57, 0x48000) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x208402, 0x0) r1 = syz_open_dev$video(&(0x7f0000000200)='/dev/video#\x00', 0xffd, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000100)={0x1, @raw_data="4bb6ad47942dd8b742413132f77d33b9babd6e90787ab8be16a56096a2aaa244eb0a9542401547a54c1774940faf9f5c0fa7ebec00ccfacbcaf16066b101bade48102791791b6893cfb75c00fd1e1f7a3df7440add077023df680d10de814a30ede2af3ab647f8c9261feb180e13108d2853c2c6a3261453860b8ffd36c583412d03e339763d9d003308d5f9f17e95b4e92cf55cfadbbe40e9fceb792957300d8b38d2f29b9a232c001ed37a970aecf220e70eb36bd50a7ee9176615c3779fdfd5cc3e757ab3cb87"}) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000040)=0x1d0b) 14:31:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:52 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf#\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:52 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:52 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x200, 0x0, 0xca}) r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x8ac6, 0x80000) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000340)=ANY=[@ANYBLOB="04000000000000000005000000a1040000000000ecffffff0000000000000004000000ff0f0000b2000000060000000000000000000000000000000200000001000000040000001c52123a054997d2844f3582134799b5d50980000008000000080000050000000000000000000000000000000000004000040000000000000000060000000700000007000000000000000000000000000080251f6829c26301e612d8c996f9e45176adf2371ca2c112c27c89274ae2eb5216abf3a6005a8842fddac3c93c762556c2f8e1dcb3041f37cc10c626629e637b6e74a7552b793434166eb25b44b0e629ae9cb799fed47c1fc707ba8fe148ce4a6f9dae0a2550c332b0c88b2758f726a2ad81604fd8809b1ff6a26aae93c29e74a2d86682b67b248dadcee16d150cf72b627cdcdbe89dc6156825f33f83765222d32503599a6da9876b1ded08438f2aceab95658839568662b3ecd398e4f5543ec7d184422f568b533c3cd2a69e2b38acbdf80dc797dd0d681c7830985e95772983ff0000000000"]) r2 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x6, 0x10000) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000680)={'vcan0\x00', 0x0}) r4 = geteuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@remote, @in6=@loopback, 0x4e20, 0x7, 0x4e23, 0x0, 0xa, 0x20, 0x80, 0x3b, r3, r4}, {0x401, 0xffffffff7fffffff, 0x3, 0x7e, 0x3, 0x5, 0x3, 0x1}, {0x9e, 0x2, 0x0, 0x7}, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1}, {{@in=@multicast2, 0x4d5, 0x6c}, 0xa, @in6, 0x0, 0x4, 0x3, 0x5, 0x9, 0x0, 0xffffffffffffffc1}}, 0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000080)={r5, @local, @rand_addr=0x9}, 0xc) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 14:31:52 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000100), &(0x7f0000000180)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}, 0x2}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/icmp\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) r3 = getpgid(r2) ptrace$cont(0x27, r3, 0x7, 0x400) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x4000000000000000) 14:31:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x32, &(0x7f0000d4effc)=0x1, 0x54366bfad7affdd9) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000f0ffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000007fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 756.379587] time_mt_check: 10 callbacks suppressed [ 756.379595] xt_time: unknown flags 0x30 [ 756.408434] xt_time: unknown flags 0x30 14:31:52 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffffffffffff, 0x189000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)={0x0, @aes256}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x7) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r3, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x400000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r5, 0x4010640d, &(0x7f0000000040)={0xffffffffffffff1f, 0x1000}) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000400)={"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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 14:31:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x6}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x4) ioctl$VIDIOC_DBG_S_REGISTER(r1, 0x4038564f, &(0x7f0000000100)={{0x4, @name="e1acb7c91492b381581877a364a60632b0e9cbf8558ffffadd6525ff2ffe5d3e"}, 0x8, 0x3, 0xffffffffffffff01}) syz_open_dev$sndpcmp(&(0x7f0000001440)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x4000000000002c7, 0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) bind$nfc_llcp(r4, &(0x7f0000000200)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8811e78754a439d3a8c8aa024d86cdc834bc921c0525f2c2541e21ccf67e2a7b55cabe9e068dd58ce565aa9a9d325e00c7627ffe7a54cdbd77b300", 0x19}, 0x60) listen(r1, 0x7) ppoll(&(0x7f0000000000)=[{r4}], 0x20000000000000ab, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0), 0x8) 14:31:52 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:52 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x1, 0x5}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) sendmsg$can_raw(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000003120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfl\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x40140921, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x0}) [ 756.657970] xt_time: unknown flags 0x30 14:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000040)=0x40000000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 756.700098] md: invalid raid superblock magic on ram0 [ 756.718675] md: ram0 does not have a valid v0.0 superblock, not importing! [ 756.744144] md: md_import_device returned -22 [ 756.764845] md: invalid raid superblock magic on ram0 [ 756.789946] md: ram0 does not have a valid v0.0 superblock, not importing! 14:31:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = accept(r0, &(0x7f0000000080)=@hci, &(0x7f0000000100)=0x80) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)=@ipv6_newroute={0x2c, 0x18, 0xb03, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_MULTIPATH={0xc, 0x9, {0x8}}, @RTA_METRICS={0x4}]}, 0x3b1}}, 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000280)={0x6, 0x118, 0xfa00, {{0x800, 0x3, "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", 0x4b, 0x5, 0x101, 0x5, 0x891, 0x800, 0x7, 0x1}, r3}}, 0x120) 14:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 756.870460] md: md_import_device returned -22 [ 756.883902] xt_time: unknown flags 0x30 14:31:53 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x8000004e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)="766574683100000000ffffffffffef00", 0xb) sendmmsg(r0, &(0x7f0000001180)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000001600)="da", 0x1}], 0x1}}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000100)={0x40, 0x10000, 0x5, 0x200}) sendto$inet(r0, &(0x7f0000000080)="93", 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 14:31:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:53 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000300)='/dev/dmmidi#\x00', 0xffffffffffff3c05, 0x109400) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000340)={0x1, [0x0]}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000004c0)={r1, 0x80000001, 0x9db4, 0x3}, &(0x7f0000000500)=0x10) r2 = socket$inet6(0xa, 0x3, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000380)={0x0, 0x1a, "677461b803fef7f65a7c88c9fbb0bc406e822a154bf9684e41f6"}, &(0x7f00000003c0)=0x22) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000400)={r4, 0x16, "4467541e697d238ebd55f08d979c74641e7c35f8e306"}, &(0x7f0000000440)=0x1e) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f00000001c0)={r5, 0x1, 0x10000, "da7612f8493b567c23f952765791f099f48cbda0e17653fbac99d749052434fb603feb1950feaf17770f77770eb975a5734c47c13d8b0142400fe4ecbc145d95d2cde089b2df35fc70d4d5ae262e47edd7393eaf7dca4943c3f34adb6ce909131e93e1dafa2098c173f3581b045d3736471cea515a2f11181373d1c3275bcb2cd5f4a9"}) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000180)={r2}) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={"62726964676530000000008000", &(0x7f0000000000)=ANY=[@ANYRES64=r2]}) setsockopt$inet6_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000280)='dctcp-reno\x00', 0xb) ioctl$LOOP_GET_STATUS(0xffffffffffffff9c, 0x4c03, &(0x7f00000000c0)) 14:31:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000fffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfx\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:53 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x22, &(0x7f0000000200)={@local, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x20) [ 757.154907] xt_time: unknown flags 0x30 14:31:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) r2 = socket(0x1e, 0x5, 0x69ad) sendmsg$can_raw(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x306}}, 0x4040000) 14:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:53 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x2000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) write$P9_RLOCK(r2, &(0x7f0000000080)={0x8, 0x35, 0x1, 0x3}, 0x8) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000040)=@srh, 0x8) 14:31:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x3}, 0x1c) r1 = socket(0x40000000015, 0x5, 0x0) socket$inet(0x2, 0x4, 0x5) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x13}}}, 0x5, 0x7d18}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r3, 0x7fffffff}, &(0x7f0000000180)=0x8) setreuid(0x0, r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000340)=0x10) 14:31:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000001c0), 0xfffffef1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8002, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000340)={0x0, @bt={0x1000000000000000, 0x30, 0x1, 0x3, 0x7ff, 0x80000000, 0x7, 0xbd8, 0x767b, 0x1c5, 0x3, 0x9, 0x8, 0x9, 0x1, 0x4}}) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@can={{0x0, 0xf2, 0x7ff, 0x8}, 0x3, 0x1, 0x0, 0x0, "4a5123648e245a7d"}, 0x10}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000120300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:53 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfi\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:54 executing program 0: prctl$PR_SET_THP_DISABLE(0x29, 0x0) r0 = socket(0x18, 0x0, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x111, 0x11, &(0x7f0000000680), &(0x7f0000000600)=0x7970e41e) futex(&(0x7f000000cffc), 0x0, 0x0, &(0x7f0000dac000), &(0x7f0000048000), 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000006c0)={'raw\x00', 0x8f, "7bc7e19d2a5b863cdaaa434486b451e70fc02c151b0b2c9e6585be823f62716ef69f5257e1a508bfcdbc2ef3ad8296588a863def717bafa8cab155a8ad5e64d59d96cd7cdbc8defde5c51614be6b26a16866483097c1732c48f6ea33627e4a1fddbbe1f0c6c4871386248912c544fd65b971644d2af16f957989962ce8e8ecdf5a4dae090438abc260ca314fbbce71"}, &(0x7f0000000580)=0xb3) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000080)={{0x6, 0x4, 0x935, 0x5, 'syz0\x00', 0x10000}, 0x0, [0xfffffffffffffffe, 0xfffffffffffffc01, 0xfffffffffffffffe, 0x80000000, 0x3, 0x0, 0x101, 0xffff, 0x7, 0xe333, 0x4, 0x20, 0x80000000, 0x0, 0x1, 0xff, 0x100, 0x7ff, 0x1f, 0x8000000000000000, 0xfffffffffffffff8, 0x5e, 0x8, 0x0, 0x8000, 0x0, 0x1f, 0x91, 0x45, 0x98a6, 0x310, 0x7, 0x0, 0xfffffffffffffff9, 0x3fe, 0x4, 0x9e, 0x8ef, 0x0, 0x100, 0x1000, 0x4, 0x3, 0x86, 0x8, 0x2, 0x7ff, 0x0, 0x3, 0x4, 0x300, 0x0, 0x7fff, 0xffff, 0xffffffffffff67ec, 0x218f, 0x8, 0x1, 0xd2b, 0x65, 0x6, 0x128, 0x1d5b365b, 0x100000000, 0x100000001, 0x4640, 0x10001, 0x8001, 0x7, 0x80000000, 0xfff, 0x6, 0x80000000, 0x5, 0x2, 0x0, 0x3, 0x7, 0x800000, 0xdc1, 0x7fff, 0x5c, 0xda, 0x4, 0x120, 0x18ce, 0x20, 0x0, 0x400, 0x7, 0x1, 0x7, 0x83, 0x2, 0x5, 0xff, 0x3, 0x7, 0x81, 0x4, 0x40, 0x1, 0x1ff, 0x9, 0x3ff, 0x9, 0x8001, 0x61d1, 0x8, 0x9, 0x9, 0x10001, 0x0, 0x7f, 0x3, 0x266f, 0x0, 0x71be, 0x4, 0x0, 0x8000, 0x6, 0xff, 0x3, 0x1, 0x46, 0x82e, 0xfff], {0x77359400}}) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x8, 0x101000) 14:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000009effffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 757.746547] xt_time: unknown flags 0x30 14:31:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x12) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2000000000) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(rfc4106-gcm-aesni)\x00'}, 0x58) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 14:31:54 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x3, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:54 executing program 0: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x400) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000240), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x20000000, 0x4000000000003, 0x2, @thr={0x0, 0x0}}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffd66f, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f00000000c0)={0x2, 0x0, [{0x5, 0x7, 0x0, 0x0, @irqchip={0x0, 0x7fff}}, {0x4, 0x4, 0x0, 0x0, @msi={0x682c, 0x5, 0x8c}}]}) syz_mount_image$jfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 14:31:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf.\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 758.022667] xt_time: unknown flags 0x30 14:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000fffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:54 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x6, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x27f) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c20000000800e800002800000000002f9078ac2314bbac1402aa8307efe0000001890300000000009078ffffffff"], 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', r2}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200001, 0x0) write$UHID_GET_REPORT_REPLY(r3, &(0x7f0000000040)={0xa, 0x8, 0x2, 0xef2}, 0xa) [ 758.234447] xt_time: unknown flags 0x30 14:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:54 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="be6cc00bc4a7", 0x6, 0x6}], 0x8000, &(0x7f0000000140)={[{@meta='meta'}, {@spectator='spectator'}, {@loccookie='loccookie'}, {@lockproto_dlm='lockproto=dlm'}, {@data_writeback='data=writeback'}], [{@obj_role={'obj_role', 0x3d, '*&:system'}}, {@smackfsroot={'smackfsroot', 0x3d, 'mime_type{vboxnet1em1lobdevem1'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) write(r4, &(0x7f00000001c0), 0x100000073) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 14:31:54 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x8800000000000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:54 executing program 1: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x105000, 0x40) write$P9_RXATTRWALK(r1, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0x1}, 0xf) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, "042773b09faab13b53f0ae6bb1d3bb2fa05642c40ef7ea7c90ecdedf58f08a47"}}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000080)={@reserved}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000200)={{0x4, 0x3e2, 0x1, 0x0, 0xa6, 0xfffffffffffffffc}, 0x2, 0x5, 0xe57, 0x9, 0x0, "d5a8602594e316a23eb5920dc10e39732fb0e9576507e41da8734537229ddce81f8913be4aeb623b5e6f3706e563b64823d9115be4ca97c6f5283d1f3fd84a794aa4d6c56dcf4ed0c57f245e744100ece746dfdaf3af3bf1440439e9b081d3ff8440dce69492d1f92b773e248beb6ee57885f72c35241fa8da3653b155f71762"}) socket$nl_xfrm(0x10, 0x3, 0x6) 14:31:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:54 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfu\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000f0ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 758.424842] gfs2: invalid mount option: obj_role=*&:system [ 758.430499] gfs2: can't parse mount arguments [ 758.531834] xt_time: unknown flags 0x30 14:31:54 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x200000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x121000) r2 = gettid() fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) r6 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000001740), &(0x7f0000001780)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000017c0)={0x0}, &(0x7f0000001800)=0xc) fstat(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000018c0)=0x0, &(0x7f0000001900), &(0x7f0000001940)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001980)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000019c0)={0x0, 0x0}, &(0x7f0000001a00)=0xc) getgroups(0xa, &(0x7f0000001a40)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0x0, 0x0, 0xee00, 0x0, 0xee01, 0x0]) r14 = getpgid(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001a80)={{{@in=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000001b80)=0xe8) stat(&(0x7f0000001bc0)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001c80)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000001d80)=0xe8) r19 = getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001dc0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001e00)={0x0, 0x0}, &(0x7f0000001e40)=0xc) perf_event_open(&(0x7f0000002080)={0x7, 0x70, 0x6, 0x8, 0x3, 0x10000, 0x0, 0x401, 0x0, 0xc, 0xf1e, 0x4, 0x0, 0x3, 0xa19, 0x5, 0x4, 0xbc65, 0x7, 0x2, 0x6, 0x5, 0x5, 0xfe, 0x4, 0x3, 0x3ff, 0x1ae, 0x5, 0x5, 0x80000001, 0x7, 0x80000000, 0x9, 0x9, 0x0, 0xef, 0x50, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000002040), 0x2}, 0x0, 0x9, 0x440, 0x4, 0x101, 0x4d, 0x8}, r11, 0xe, r1, 0x8) r22 = getegid() sendmsg$netlink(r1, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000240)={0x260, 0x3f, 0x0, 0x70bd28, 0x25dfdbff, "", [@generic="81b6116a36f588e2af3858dda8988c5ecb3ee8183b43d5ee232976cdfd90e6d3604c7227acd8ac42e2c00d5621507a49b714de7149dcaecef3c05948a00c6c555e0f5d6e4906d31da549033e9a892fd32286fed3f2238982da375ca03974427e86d92df0899426f2b073f15b115d5f057a47c10f2a13e8c90db5047fdbcc969bc44a030459cae4b063d0d4b465e779f779304ca08b115eecebc3c8bb892ffb0b62f265258185566bf66c42ea088543c74075aa3e96f0ba44c05d87f3b4a4c6591f9a2b134631d00422052b4f8fe538a71a92", @nested={0x17c, 0x2c, [@typed={0x8, 0x5, @pid=r2}, @typed={0x14, 0x57, @ipv6=@dev={0xfe, 0x80, [], 0x21}}, @typed={0x4, 0x15}, @typed={0x8, 0x5a, @uid=r3}, @generic="422f1b6481349e023e217569131b9dee94009fb539d9e311d1bd04d685263586f58396cbee5a5f287695066320be20dcf1ae02aac91dfe48ae189800b214e6570aee48f432b7b152d40dbce74cdc87", @generic="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", @typed={0x4, 0x4a}]}]}, 0x260}, {&(0x7f00000004c0)={0x126c, 0x29, 0x600, 0x70bd2c, 0x25dfdbff, "", [@generic="78a248f06d57cc9bc7ebe0e1a386d7d49fad48040d248ed4fe1d0afe0d422904e93cd45f54575372d196b5c2e7eae8aa11645e0713c238ceb9773f38ec06b134363550d9c28e5c9602148a52a1d2d8b39891e2125828829e36e9d2d26d40e0852637fd9bcc1f07972d711b650884c6b14b9c3b84bdd81ef5654aeb4ae0a17f0c0c4c034930b7dce97c5757868968da7a8b069054604b5c8fbaec4412deb51bc86a4c74fecf80791ba03f907ad44be921148c89cb1c88b9f234ee0d117965ddc71b34b741358623a4", @nested={0x184, 0x71, [@generic="fa3800db33cd27afaaf0a2d139ae65ac7038a7b6614b4e5238026e7f148388b1fcd8380ca379951fefc82bb70667eab7565e48b56e1dc56b83e9585e4e9295a090", @typed={0x14, 0x81, @ipv6=@loopback}, @typed={0x14, 0x49, @ipv6=@ipv4={[], [], @broadcast}}, @generic="180a9a4987b9e7ba53c38c454c9bcf8f1c683e1e4f6f3bd5a5b5457ea620e53221ce8900135208dd5a883d07ef72b20a791684c6f5ca006fc0b3957598fc2ccff065", @generic="ff433b92f900d36bd41be640c634afd68d1659d1a05637cad5b0021c2be142f6e53c0fe77f32e50cb4cad28c00cdec3bb98ad85e5e799071762c4480c22810f96b002d80044d0010ed47c6a88f1d29b4661029d9085571eb46168433946afa19d72a6c8c79f8f3826d311c67bf9f4edd8d96424d59ea9316ea56358d4d459b2a19b208406a3da164829bdceb39d49eb753ccd61116298afe64b029981524c6ede983fef3d9f0325bbd726392a926bcfdd6e0aba88945edc0beffd97551e5dcd053142a6a4813f75c542e9e", @typed={0x8, 0x65, @str='\x00'}]}, @typed={0x8, 0x79, @pid=r4}, @typed={0x1004, 0x18, @binary="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"}, @typed={0x4, 0x96}]}, 0x126c}], 0x2, &(0x7f0000001e80)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @cred={0x20, 0x1, 0x2, r20, r21, r22}, @rights={0x18, 0x1, 0x1, [r0, r0]}], 0x150, 0x40000}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) close(r0) socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x28, 0x0, 0x0, 0xfffffffffffffe7c) 14:31:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 758.745188] xt_time: unknown flags 0x30 14:31:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfo\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:55 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x500, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 759.214225] gfs2: invalid mount option: obj_role=*&:system [ 759.219913] gfs2: can't parse mount arguments 14:31:55 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="be6cc00bc4a7", 0x6, 0x6}], 0x8000, &(0x7f0000000140)={[{@meta='meta'}, {@spectator='spectator'}, {@loccookie='loccookie'}, {@lockproto_dlm='lockproto=dlm'}, {@data_writeback='data=writeback'}], [{@obj_role={'obj_role', 0x3d, '*&:system'}}, {@smackfsroot={'smackfsroot', 0x3d, 'mime_type{vboxnet1em1lobdevem1'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) write(r4, &(0x7f00000001c0), 0x100000073) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 14:31:55 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf%\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f00000001c0)='vcan0\x00', 0xffffffffffffffff}, 0x30) kcmp(r2, r3, 0x4, r0, r0) sendmsg$can_raw(r0, &(0x7f0000000340)={0x0, 0xfffffe50, &(0x7f0000000140)={&(0x7f00000003c0)=@can={{0x2, 0x100000000, 0x3ff, 0x7}, 0x6, 0x3, 0x0, 0x0, "9de707fdf48ef32c"}, 0x184}, 0x1, 0x0, 0x0, 0x3}, 0x4000000000) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000fffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:55 executing program 1: socket$inet6(0xa, 0xe, 0x100000001) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000000000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f73797a300f", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24}}}, 0x88) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={r4}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000ac0)={&(0x7f00000005c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="070003001f6888dd39045c046752f15f05d5209e4cf8a64c13951a80fc3aec8bd640c29bac43c687fa6e1e22aec4c231cac32e0cb1b5cf4a93d187d57e9e58ea2082a44be1bb783d406eb717c10000"], 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000200)=0x8) eventfd2(0x8, 0x40003) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000b80)={r4}) 14:31:55 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x7, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom$inet(r0, &(0x7f0000000380)=""/97, 0x61, 0x2120, &(0x7f00000001c0)={0x2, 0x4e22, @loopback}, 0x10) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) accept(r0, &(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000000340)=0x5a86c60e6e496a9) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000240)=0x3) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:55 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 759.464636] gfs2: invalid mount option: obj_role=*&:system [ 759.495077] gfs2: can't parse mount arguments 14:31:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000f0ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_S390_UCAS_MAP(r3, 0x4018ae50, &(0x7f0000000240)={0x3f, 0x1, 0x8001}) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fstat(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={r4, r5, r6}, 0xc) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) io_setup(0x8, &(0x7f00000003c0)=0x0) io_cancel(r7, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x6, r3, &(0x7f0000000400)="58ebba9fcc7ad94241f205071467d3e55bdab5ec347553d699bb54e9df67bc79351b67e6f42ce5fe4ee08dc4640d110ba2ed2e5da60e3577e2df8e6fd5d171c316a9498b26b065600970124f880fdd1a0f37f0b5f908dc6adaf656ea6821e411425ce247b01b8822fc83c93540abb605efedcfe7493ef4871866a268df9304050232aa97edd5c7f318f91b5c861a2bc434075246481e3377ddf32d58f966df3a57b4e620e8db30b3074d42c018cb68379b48e198c5d52338b3dabf8d5666f64c457c9893352f4985327406b5845330884d4b9ee1aa94c095b6e4627dac5412a0dfd28201df0f55a22a43815b149614", 0xef, 0x910, 0x0, 0x3, r3}, &(0x7f0000000540)) 14:31:56 executing program 1: socket$inet6(0xa, 0xe, 0x100000001) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000000000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f73797a300f", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24}}}, 0x88) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={r4}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000ac0)={&(0x7f00000005c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="070003001f6888dd39045c046752f15f05d5209e4cf8a64c13951a80fc3aec8bd640c29bac43c687fa6e1e22aec4c231cac32e0cb1b5cf4a93d187d57e9e58ea2082a44be1bb783d406eb717c10000"], 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000200)=0x8) eventfd2(0x8, 0x40003) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000b80)={r4}) 14:31:56 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x2, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="be6cc00bc4a7", 0x6, 0x6}], 0x8000, &(0x7f0000000140)={[{@meta='meta'}, {@spectator='spectator'}, {@loccookie='loccookie'}, {@lockproto_dlm='lockproto=dlm'}, {@data_writeback='data=writeback'}], [{@obj_role={'obj_role', 0x3d, '*&:system'}}, {@smackfsroot={'smackfsroot', 0x3d, 'mime_type{vboxnet1em1lobdevem1'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}]}) write(r4, &(0x7f00000001c0), 0x100000073) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) 14:31:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf*\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:56 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x6, 0x161000) setsockopt$RDS_CANCEL_SENT_TO(r2, 0x114, 0x1, &(0x7f0000000600)={0x2, 0x4e22, @remote}, 0x10) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000f0ffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:56 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000ffffff9e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:56 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:56 executing program 1: socket$inet6(0xa, 0xe, 0x100000001) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000000000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f73797a300f", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24}}}, 0x88) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={r4}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000ac0)={&(0x7f00000005c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="070003001f6888dd39045c046752f15f05d5209e4cf8a64c13951a80fc3aec8bd640c29bac43c687fa6e1e22aec4c231cac32e0cb1b5cf4a93d187d57e9e58ea2082a44be1bb783d406eb717c10000"], 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000200)=0x8) eventfd2(0x8, 0x40003) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000b80)={r4}) 14:31:56 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x1000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000003120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:56 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf+\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:57 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ec, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x800, 0x200100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x101, @mcast2, 0x1}}, [0x0, 0x7fffffff, 0x1, 0x2, 0x5, 0x400, 0xfffffffffffffffe, 0x7, 0xbb09, 0x9, 0x0, 0xffffffff00000001, 0x800, 0x7, 0x20]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x1, 0x100000000, 0x3ff, 0xfffffffffffffff8, 0x3}, &(0x7f0000000300)=0x14) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x297ef) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000340)) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) 14:31:57 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x2000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, 0x0, 0x9c, &(0x7f0000000040)='ifb0\x00', 0x7, 0x7251, 0x9}) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:57 executing program 1: socket$inet6(0xa, 0xe, 0x100000001) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8000000000, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x2002) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {&(0x7f0000000680)=""/183, 0xb7}, &(0x7f0000000300), 0x3}, 0xa0) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)="2e2f6367726f75702e6370752f73797a300f", 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x1ff) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000003c0), 0x4) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(&(0x7f0000000440), &(0x7f0000000600), &(0x7f0000000640)) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000007c0)={0x0, {{0x2, 0x4e24}}}, 0x88) r4 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x8010, r0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000000)={r4}) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f0000000ac0)={&(0x7f00000005c0), 0xc, &(0x7f0000000a80)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @multicast2}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYBLOB="070003001f6888dd39045c046752f15f05d5209e4cf8a64c13951a80fc3aec8bd640c29bac43c687fa6e1e22aec4c231cac32e0cb1b5cf4a93d187d57e9e58ea2082a44be1bb783d406eb717c10000"], 0x0) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000200)=0x8) eventfd2(0x8, 0x40003) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) bind$alg(r5, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000b80)={r4}) 14:31:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfd\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e20, @multicast1}, 0xff3a) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) connect$inet(r3, &(0x7f00000038c0)={0x2, 0x4e20, @rand_addr=0xa5}, 0x10) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000080)={0x80, 0x14a, 0x8, 0xef7, 0x1, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) write$FUSE_INTERRUPT(r3, &(0x7f00000049c0)={0x10, 0x0, 0x6}, 0x10) write$P9_RREAD(r3, &(0x7f0000003980)={0x100b, 0x75, 0x2, {0x1000, "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"}}, 0x100b) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) recvmsg(r2, &(0x7f00000001c0)={&(0x7f0000000340)=@nfc, 0x80, &(0x7f0000003700)=[{&(0x7f00000003c0)=""/100, 0x64}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/150, 0x96}, {&(0x7f0000001500)=""/237, 0xed}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/222, 0x1b}, {&(0x7f0000002700)=""/4096, 0x1000}], 0x7, &(0x7f0000003780)=""/163, 0xa3}, 0x2) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000003940)=@buf={0x6, &(0x7f0000003900)="98d49eef83d5"}) ioctl$KVM_SET_GUEST_DEBUG(r3, 0x4048ae9b, &(0x7f0000003840)={0x0, 0x0, [0x9, 0xec, 0x2, 0x14a, 0x2, 0x5, 0x1a, 0xb73]}) 14:31:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:57 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:57 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c2d023c126285718070") unshare(0xfffffffffffffffc) 14:31:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x196, 0xfffffffffffffc9b}}, 0xffffffffffffffff, 0xfffffffffffffedb, 0x91, 0x1}, 0x20) 14:31:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x8000}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfff, 0x900) mq_timedreceive(r2, &(0x7f0000000340)=""/102, 0x66, 0x6, &(0x7f0000000080)={0x77359400}) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000ffffff9e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:57 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 14:31:57 executing program 0: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x1ff, 0x0, 0x10002, 0x1}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000140)={0x8, r3, 0x0, 0x10001}) close(r0) sendmsg$kcm(r2, &(0x7f0000000640)={&(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x0, 0x2, 0x3, {0xa, 0x4e22, 0x100, @mcast1, 0x3}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)="006c50a07286badc40132132bd7ffd12f95413bc5548e45c0afc78404cfead37f740b5546dbb286df6120f1a6f3fc9fd60559aeff93877daf7457893393a2e450b3577f397d2a03ac962541b4c9af0a87af5ffcd68a3dbc9880103fe0ee22954d74cef5d61da40f8779ed42661a7df51ab7f81d4e44e9b89004fd2d9e3d1cfc1e6d55672b0a85daf9efc2c088c3140e6c0a4000805d5fd84ba8263601e4784f3cf62e4e137e3611c29c6", 0xaa}, {&(0x7f00000002c0)="5cfcbf62a4f527e563418224913fb68a6515ba749978576327c9e6481213b15e", 0x20}, {&(0x7f0000000300)="fec79c086a91e2ca24319905e10cace91a27b74bed676925e41eec8d255ffef93609e8e836269d45ee2b82d53de4d520e5ce03847ec273eca88114a51653b5d964fa0d8e51f46e4a75a66b6fc129207e8a18b751a32f384292945eb219817c518a0af5dbf14d7790af58b6678239037530b0da2a84d815c5d62e820415802290bacc6b30c2eeef57c098182a55d7f46a8758c9c8e77d4386bb4df3363d7f2243a404ea2aaf833a25261c53589ae9c243ac1a3b5c2c09fbe64e0e8727cbcfbafb9b9087cd614a926efe5a6e12e898fd156375cb2621692ecdf35d41e1d59d753fd59ef764fe68fd531a0f35c9ce", 0xed}], 0x3, &(0x7f0000000440)=[{0x18, 0x11b, 0x5a, "6ca5721d6e"}, {0xa8, 0x0, 0x7, "e861a0bc61a0828842307c58dc3f49856b5c9b66ce98b4979a00d189a5a2fca23913c78b8bc7f41a5c5592ee1d0303b4afcfe07efb975a276b65d765131a2d69c67087955aea387eadde5c85c9978f41d36329e9f13bae846cc4e911615295ab39f4c640e3018d4f6c4027706ee9a1cfbe7b9ac64601c72a22fc0a6cdeb77dca306ae1cad5aa52e9edbf9a141e11cbd94e82348e3f34eb"}, {0x108, 0x103, 0x5, "31373637c39764e72299460a3495a3e4f22bc7a2c061fa15c63113831ea001845cd05275bbadd840780b634233cafd33b6cff75c50c4fef14c8bc4fc593f3f6075f2ee369670add138bf5870525f65f01645af0cf040e6b40a80821cfbb5b7377919317432a35e54b720efbd66be8a5e526bc401daa9257558a5155e8fbfa166af313a3c862b9473fa3ff5f96f09e47fc6ca537d15f0dcaf8ff5cee95145cce9fdc2e291dcaa8447263302e0d0a5fcf78df7098c7666972198d596a7733001b425f24fb60e5139a7ba76add24787f0da9a64779b7ec7d7ae353a44acee315c8e77408f40dc9ab7a18f1c0998bed325c740"}], 0x1c8}, 0x800) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r4, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e21, @loopback}], 0x10) socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000006c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000900)={&(0x7f0000000680), 0xc, &(0x7f00000008c0)={&(0x7f0000000700)={0x190, r5, 0x8, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xea}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x600}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8bb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffe}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1492}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8f6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x50, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xedea}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 14:31:57 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf\n\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000004c0)=0xe8) bind$packet(r2, &(0x7f0000000500)={0x11, 0x0, r3, 0x1, 0x100000000, 0x6, @broadcast}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:57 executing program 0: r0 = socket$inet6(0xa, 0x7, 0x10000000003) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x3, 0x3, 0x3, 0x2, 0x9, 0x8}, &(0x7f0000000080)=0x20) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000040)={@remote}, 0x14) 14:31:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4000, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/40) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000003c0)={0xbd, @rand_addr=0xe17, 0x4e24, 0x0, 'none\x00', 0x20, 0x240000000, 0x29}, 0x2c) r1 = socket$inet(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000380)=ANY=[@ANYBLOB="66696cc1c0746572000000000000000000000000000000000000774845abc50000000000000000d8c8bb00000000000000000000"], &(0x7f0000000080)=0x2f) sendto$inet(r1, &(0x7f00000000c0)="8837c0c236d23f08a5a69fccefc000d9bd70fd23c6be94e142f1a75f4f049f3c4b29925ab7476e052a1876ae53eea85e7811637f9d11dad69f447977416449b7bb52bc44084c4b3fa0cba60c15a4690bdcf742357df906920c79b3006c2cdd40dad09a6405d8c485c87be8faa823724c2bb41e34dbf50567932fb314b5e80f12a32e", 0x82, 0x4000000, &(0x7f0000000180)={0x2, 0x4e20, @multicast1}, 0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000300)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000340)={r2, @broadcast, @broadcast}, 0xc) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 14:31:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:57 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x11000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e24, @empty}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x2a) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000001d40)={&(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x0, 0x3, 0x0, 0x4, {0xa, 0x4e22, 0x7, @ipv4={[], [], @multicast2}, 0x3}}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000003c0)="ce7b9e8efe1d74e6478b91f8df6001bcb1d2a11b4d6b56d9c62b548495487dd3616f72431205e1d31136ffc4edd52a153c2ca3b7e5446a21be158ebf9ccd3bca5552522df776017327230e0f566e2fc0a6e18b170a6478061f1ebb2753424c5ad75bf1837976ed01dafab00fbcc399422cec3868e4bac7b3d28c733940a508e289a3ccdf665893c40dcec24c4ec86f8ef5ef57baadc6da97f10bea0b2bc2f905a85420a123e2bb333bd18ac190a363cfbddd4fc62185d99b1fac9b968743261dd2db49", 0xc3}, {&(0x7f00000004c0)="2d943e93b673b8a046930ff6f37c4a367e8e671946228fc0298031ed91e8c986d70d4a8ef87c3911d31ff80617bc05d2de4b8e8bb718165652769584eb5abe0a7e97bc0c26d41e8d5bb2ad3db8be748dd625ac38a082068541ca4958b4ac98418251bb09c61bd7721482c261950ab4fc80966abe3016ba73287a9740597340cc84fa0b5efd3e885e62e037560794a438cba03e8ee6a6fdde317c5fa7f77fb57aa9d24c217f13cb6c1354200f85847bf4ba66fbc02d63356f4aea", 0xba}, {&(0x7f0000000580)="5629fe3494d646fbce12719f94bd3240267080981de62dece725a1840ccc35478a48f0f6bc1c99f659bfcd734044648609379b06a407820f3428be222fa43f758d4174126459f58724bf0711eeb5d7f53cb44e11da19df37f5e1834d358bf00c3184c5eab1f0f2f2996e513541d1afdd6791882da88f7a7e6ddadf7f60f35e1b008295b78b1e018134e80764be93226faef7f591b768ee84222d2a3671a1cff0415a77674df98d539844c70ec4dfe6429c4a164e0e5ffc88d4023ac10910f116c0604f520bdcc5a4dbf9a5c04354f28e773f2db4961b176d5ab27e21305cd6e506b2191e122bcf86c606fe", 0xeb}], 0x3, &(0x7f0000000680)=[{0x70, 0x117, 0xffffffff80000000, "484075c39352978a5dc7cb9cfb851a395f8586175767d09b931ff2aa6406979b4d3bf4e70f60379d72f3bf40f43c425654622bed584d52eec1f615dad8c1499b0b284b9c35e7ff80249de19fb791cbf8c2004f1cdca85a470928e5"}, {0x1010, 0x117, 0x3f, "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"}, {0x98, 0x29, 0x0, "207aebab110f444bca61cee4625acf0427a081027f8a7e3fc1081cf401195a8f441cd7895378550dec4051ca84836d74bbc4084061d315433eb25c2bcc111e25ce09710a33e71c20af5dd19fbfa45a1fe4c9d1405581bde0120f7332bf4d49bd067a9fd6e03aa6e2609e9965b21c5e015cfc89cd5b4d1e076692746b0d22dba0b6446152dc5da7"}, {0xf8, 0x107, 0x7, "9be9d2a9720f9a424c5bc8b74e9149c9ee6d9f9e851ad4faa165b737450101dd068e8a5a25a8131955dd95a7285a69d11cc481528093116c2fede92fb16bf80123c749e64f6120473564e88430390cf9d3b6312614b112971ba712859a1af589ed48617aec0f1714d06a352c1d492ddc127cd960c7a771a69deea575d066e24b1622c8399396fa75519697bf61077c399c2320b727240748b7e954bba3ed7eb6755e9ce27a3f81c18475782f8f41d3218b7ed482444e73ceee855a6051ada46f22f618662e4a686301a26cedecfc01de953b4c896a3eb74f0bce854b3df3fbd28357ff9273"}, {0xf8, 0x105, 0x1ff, "1153b35c30ccda4dfb5514f7812e8477ee11c16aa9bd3eaace08cb3904378be5b38dfa11c6a622264e7386ea6d6c42367c7cc6cd26a2d81086b09f82340bf6998460649d26da017d29fc72856b150dccbc497ea47b3ac580d4df4299cfd9d9245acab4fc89f56f085187be3eb5c896ba0452afd534d0cb6f374ea47e25a5382785b96af89f906a99594370a5f22b81bf22f651f5ccdc68cbc2744531a40a14decacdac22df12c34e1f4a7d9550da9fd0ffc47b0dab26851f833ee54fdd22ded75a5f1809029b70804158c94d19f62d68d322d021d69449d9306b6f96f86ed0f1da7bc1fe"}, {0xf8, 0x10e, 0x8000, "b22f4da2c5cefc6be258d8c39200e813d4218316e17d59b6f567aad866c132d2dc0fdd64d282ffd54b572f3c3118308b5517aeb61b8a8e8610eb248a88191646ff1772da43cfcc20c2fc2fad2dcccd0adc9c2e9824cf839f61dee1fdbe899a9d6b059183403ddc1f62cf055a1adbef57dbdd9b483ed0130c02f97a32df7f6bc2abceccda4f3fd65137bfa0190707a33636588a6d84d0d53683a77d4fa55b2b34c381ab617e11f46d0040829ed9760ff00211a3896361fcca52fb73e03e32c7d25dc4192fcd6a1476abd24f83898f2490d1f614768ea5c7cd98a41d58dad9ca6a3f52466e301ed3"}, {0xb0, 0x11b, 0xfffffffffffffffa, "c941c87382ee4f01d251e10e91982a6d11bb74a0269c4206f2f4a4d8e608695772aa0d85e6c09efbc642497647afb79cc397a202ce2e25f7ecab884db0a65e542cd8a1708530aca9dce1a03a26a3bc46f81f7f8c30f3fed8208b67ae52938882b19292da9ba50d3a22a9ff4f25096e10383616bcaae8662f5ff1de097fafbfb8eeb40c182a1bb8e4fddb485f6645ec9e06f2fc0fbeda0bc5b33716"}, {0x78, 0x115, 0x4, "fda0ab468a87734adab2b21f579326a8e6bc3346ff84b052c5b824e6488858127297fcb30809ef84dcad4b8f47059d267c9e313d0daf170beb2d287916b8c2d91cc833908e385225de9523a5eaab5f713604e6499b7d8012f2f0f8bc3e0ec1896c"}, {0xa0, 0x3a, 0x8a0, "961d303f44639432765cf6ed5b66d790f0ce37ef46e6c09b43cf44a9e6cde5651ed093a569fe844ba364274da10ed0a6c53213821087ef4405a2b6b584c82f76026cea49b69c1b40d550702c011f7d4447af840fd5de76425d4f4f6182e02a487f8efebdf37ed0cd23911324478d84f1b58fccb211923e962123b0e68f8d248b70b3e263824af515150cd3b57ef3a3ba"}, {0xc0, 0x11f, 0x200, "6d1624f9cf587456547e2676e14b432617c50ac59e3105881f4ebdca4aa82686657875429c56cee4f8465fb94894ce1818a9287518641c8c1adab7baf902c9558f1411db684c9895dc895b361f902abb8195f5dd8136eef7a9b4d6739b5a3a4f032e89ade188f77ba514adfc39887cf292e7823ab743d2643e2f53b27595a5fa0545e3c19669492a675f159ffa44730ae59d2b4a87575e246ecf67a0e77d00c49938b9306e29e76e3115be7e20"}], 0x1688}, 0x40) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x200080, 0x0) ioctl$KVM_SET_ONE_REG(r3, 0x4010aeac, &(0x7f0000000040)={0x9, 0x1}) connect$l2tp(r3, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast2}, 0x4, 0x1, 0x0, 0x3}}, 0x26) 14:31:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000c33f70)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x1, {{0x2, 0x0, @multicast1=0xe0000014}}}, 0xfd40) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x100000001, {{0x2, 0x0, @multicast1}}}, 0x88) close(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x8600, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000280)=@assoc_value={0x0}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0x4, 0xa, [0xffffffff, 0x4, 0x7702, 0x101, 0x4, 0x0, 0x0, 0xff, 0x3f, 0xbdc]}, 0x1c) 14:31:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000031200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntf-\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) [ 761.607971] time_mt_check: 10 callbacks suppressed [ 761.607978] xt_time: unknown flags 0x30 14:31:58 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x7000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:58 executing program 1: clock_settime(0xfbffffefa4104235, &(0x7f0000000380)={0x77359400}) r0 = epoll_create1(0x80000) r1 = socket$inet(0x2, 0x2, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x75}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @local}, 0x8}}, 0x594, 0x9, 0x7, 0x100, 0x40}, &(0x7f0000000180)=0x98) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) 14:31:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) munlock(&(0x7f0000002000/0x4000)=nil, 0x4000) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@can={{0x1, 0x8, 0x1000, 0x10001}, 0x4, 0x2, 0x0, 0x0, "93b75efbd7097fea"}, 0xb}}, 0x2) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp512\x00'}, 0x3e) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3c7, 0x40}, 0x8800) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000140)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000200)={r3, 0x0, 0xa77}) recvmmsg(r2, &(0x7f0000003500)=[{{0x0, 0x51, 0x0}}], 0x1, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101100, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f0000000040)={0xc0, @tick=0x1, 0x9, {0x1bc01596, 0x28}, 0x3, 0x0, 0xfff}) 14:31:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000031200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 761.790189] xt_time: unknown flags 0x30 [ 761.797767] xt_time: unknown flags 0x30 14:31:58 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x40802, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)="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") bind$netlink(r1, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfd, 0x80020}, 0x59fb150fb80d3662) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x9c0000, 0xe, 0x5b, [], &(0x7f0000000000)={0x990903, 0x10000, [], @ptr=0x7}}) sendfile(r0, r1, &(0x7f0000000180), 0x8402) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f00000000c0)=0x92f, 0x4) dup(0xffffffffffffffff) close(r0) ioctl$LOOP_CLR_FD(r1, 0x4c01) 14:31:58 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x8800, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) [ 761.893118] Unknown ioctl -1072667637 14:31:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000380)={0x4, 0x400}) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xe12, 0x80000) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x42040, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x181000, 0x0) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000240)={r4, 0x40, 0x101, r5}) epoll_ctl$EPOLL_CTL_DEL(r3, 0x2, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 761.955872] Unknown ioctl -1072667637 14:31:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)="6e74667304", &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x14}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000000c0)) [ 762.114677] xt_time: unknown flags 0x30 14:31:58 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x700, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_mr_cache\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:58 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x100, 0x800) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4, 0xfffffffffffffffa, 0x0, 0x4, 0x0, 0x5, 0x800, 0x4, 0x0, 0x6, 0x1fffe000000, 0xc3, 0x7, 0x7fff, 0x3050000000000, 0x4, 0x8, 0x7, 0x6, 0x10001, 0x80000000, 0x101, 0x1, 0x1, 0x0, 0x7ff, 0x1e4d, 0x1, 0x10000, 0x4, 0x9, 0x0, 0x4, 0x6, 0x1, 0x4ea4, 0x0, 0x9, 0x2, @perf_config_ext={0x4, 0x6}, 0x800, 0x0, 0x0, 0xf, 0x7, 0x10001, 0x4}, r1, 0x0, r2, 0x9) recvmmsg(r0, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000001e80)}}], 0x1, 0x163, &(0x7f0000001fc0)) write$binfmt_misc(r3, &(0x7f0000000180)={'syz1', "efa9b01f1fe4305d0bb2e5079e3e302b828ff5649f448b217b0df23e02e99c8ba74900ec8bcd9992a35b35f8f3af44506d2c26dc86a24954f5e820b0fb0e98addf89fb2628ba90704309a4afb25c2739f8013ac3007c8033fb290cb35137dec631ee95de77ddcfccb4d49f3797e6be6c6b58f60b80baa4dcd1859f10cffcc6d534032e7e0b85465e96bd6e23afdeeeaadeedf6d7f47f6f0dd76f6b42e3afd4319db4c8e07ab191e2479ef7d3adc1091b84111e2d5238b406e48a3a488c7222ecd0c813c7a77b5e"}, 0xcb) 14:31:58 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000980)={0x0, 0x0}) write$cgroup_pid(r0, &(0x7f0000000100)=r1, 0xfd31) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) getresuid(&(0x7f00000006c0), &(0x7f0000000700), &(0x7f0000000740)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000880)=0xe8) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7bec, 0x7, &(0x7f0000000600)=[{&(0x7f0000000280)="4798cfef60f1a9eb77a7cd5118ffbb66ffa0d43200e0c42cb6c67da7aa56428f57a35cc072075aede4de87fd5e0db910aed481d81f466e8a653a65998158860c3c78ca97505a3ffec4060633b7b93d1be0d0b5ef7d", 0x55, 0x100000000}, {&(0x7f0000000300)="79c1a247457b3420eacb03740d06c8feab6aaef554c866cb4d379398e6d65cb5c3ebf5b4fcff953cf898ac82db85ac372b7ab860bc27f20d7668de9b9d0c2fa58c930274c38ba1a84debd666bc7baafa4a6bc19c23f9c21bac69006dfa51a7286245ae25aa8a0dc2df02cab30d3c6a9dc121b8d2e6d0a4738c0cba2b920931c4", 0x80, 0xb5c}, {&(0x7f00000003c0)="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", 0xfe, 0x9}, {&(0x7f0000000140)="c573f3db7e2590b1c6", 0x9, 0x1}, {&(0x7f00000004c0)="ad9ff446da6d0a05e71ba9251e362673f0137ac3b423d836afa05b1f1e42b6f3836e8a0b8f518c4e1e78b1edef1d7a21145ba80810131227fb0f3d0f0c662733508afb988f9a7d0fe2a049da0c001423193c6a1f2c5c14f4d4cba3eae7439e57bc8efa0db5bee5641bf2c981f46f580dc9d1e7cc6defe590cae0806a6c1433dd7b241dc8e1140b4211ce", 0x8a}, {&(0x7f0000000580)="d7291710abd0f35266382628", 0xc, 0x7}, {&(0x7f00000005c0)="fd60cee5202d2ef48c040a467f70edda6683b195a87e2c2937546904e55848d903a86660eda1fecf6edd983f7bf23a327fca2ac9ee2eec", 0x37, 0xffff}], 0x800, &(0x7f00000008c0)={[{@compress_force='compress-force'}, {@device={'device', 0x3d, './file0'}}, {@autodefrag='autodefrag'}, {@nospace_cache='nospace_cache'}, {@space_cache_v1='space_cache=v1'}, {@usebackuproot='usebackuproot'}], [{@appraise='appraise'}, {@euid_gt={'euid>', r3}}, {@audit='audit'}, {@subj_role={'subj_role'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@seclabel='seclabel'}, {@audit='audit'}]}) clone(0x0, &(0x7f00007d1fff), &(0x7f0000000000), &(0x7f0000915ffc), &(0x7f0000000080)) read(r2, &(0x7f0000009f9c)=""/100, 0x64) [ 762.295660] xt_time: unknown flags 0x30 14:31:58 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x6000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:58 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)="6e746673fc", &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ffa000/0x4000)=nil) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) 14:31:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000007fffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:58 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000340)={{0x7, 0x2, 0x80, 0x7ff, 0x3b20, 0x6}, 0x85f, 0x8, 0x0, 0x0, 0x6, "5594c47d7004dd22d1be321a349c44fc3a0201159387cac1151a78cf112795d340ae8b1f4694782e8ba00eaa10150112dd223caf3ee9f9de80ef13e0074d478183c98899ea91a2d239038f8611d5db8683159649288a072d1d59999e3b166d2df15a2909daed0739b7a3806b470bd7b862dc2fce8a2d5f3b0a8d5a99a7c34184"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$can_raw(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 762.570391] xt_time: unknown flags 0x30 14:31:58 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x1100, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x21, 0x1000, 0x9, 0x40000000001, 0xffffffffffffff9c, 0x0, [0x10]}, 0x2c) fdatasync(r0) 14:31:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x3f}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pread64(r3, &(0x7f0000000340)=""/222, 0xde, 0x0) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 762.760431] xt_time: unknown flags 0x30 14:31:59 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = inotify_init1(0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000400)) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x230000) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x8) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000080), 0x0, 0x6) r5 = socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000480)={0x0, 0x0}) shutdown(r5, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, 0x0) ppoll(&(0x7f0000000180)=[{r0, 0x8000}], 0x1, &(0x7f0000000380), &(0x7f00000003c0)={0x7fff}, 0x8) setsockopt$inet6_group_source_req(r3, 0x29, 0x0, &(0x7f0000000240)={0x5, {{0xa, 0x0, 0xd0b, @remote, 0xfc8}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r6+30000000}, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 14:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000007fffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:59 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x2, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:59 executing program 0: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0x40047438, &(0x7f0000000180)=""/246) ioctl(r0, 0x5607, &(0x7f0000000000)="7661c8946b9101fcf50b61786fa0401b555a1cd32151f5201dd4d45ebe419ef68aaa0a8e72c660dc6668a12fd29c1e08bbd6cb232dbc2f7f78c3c14ab517ab2c7593257a88c1aad6a8da2a54abb3362a7e73760419e14f099e9133ce3b5919ddfcfbca97cb98") creat(&(0x7f0000000080)='./file0\x00', 0x10) [ 762.931964] xt_time: unknown flags 0x30 14:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 762.998387] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:31:59 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x4, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000d0000000000000000006e7230000000f3502d9c0000000000006970366772657461703000000000000073797a6b616c6c65723100000000000069703667726574617030000000000000aaaaaaaaaabb000000000000aaaaaaaaaa000000000000000000b0000000b0000000e000000074696d65000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000330000434c415353494659000000000000000000000000000000000000000000000000080000000000000000000000000000001100000000000000000069726c616e30000000000000000000006c6f00000000000000000000000000007465716c3000000000000000000000007465616d5f736c6176655f3100000000aaaaaaaaaa00000000000000aaaaaaaaaa0000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff01000000130000000000000000007465716c30000000000000000000000069726c616e30000000000000000000006272696467655f736c6176655f31000062726964676530000000000000000000aaaaaaaaaabb0000000000000180c200000000000000000000007000000070000000b80000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x358) 14:31:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={r2, 0x54c527b3}, &(0x7f0000000240)=0x8) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 763.068804] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:59 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f00000000c0)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x400, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000340)={0x21, 0x443, 0x9, 0x81, 0x5, 0x1455}) getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) ioctl$TUNSETGROUP(r2, 0x400454ce, r4) getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee00]) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f757000000000000080006e30202f6465762f7a65726f00202f6465762f7a65726f00202f6465762f7a65726f002065746830202f6465762f7a65726f00200af8d4ae38e06436b781e7d09bc3e52706b2bde7c11e9a76c2587768996855c2d534082680820224d3f0d3a9bdbc65626e7ec97f1a9939ff430cec211b38c2"], 0x8c) setgid(r5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r6 = shmget(0x1, 0x1000, 0xb0, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_INFO(r6, 0x3, &(0x7f0000000280)=""/88) fchown(r2, r3, r5) 14:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 763.194573] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 763.212496] xt_time: unknown flags 0x30 [ 763.220169] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. 14:31:59 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x5000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f0000000400)={0x100, r2, 0x302, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge_slave_1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2c1d}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xa9}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x3}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xec0}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}]}, 0x100}}, 0x800) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) clock_getres(0x2, &(0x7f0000000040)) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) [ 763.411138] xt_time: unknown flags 0x30 14:31:59 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={"3a72300100", 0x4002}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0x3) 14:31:59 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, &(0x7f0000000d80), 0xffffffffffffffff, &(0x7f0000000dc0), 0x0, 0x5) sched_setscheduler(0x0, 0x0, 0x0) mkdir(0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000300)='ntfs\x00', &(0x7f0000000340)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[], [{@fsname={'fsname', 0x3d, 'eth1:+)^wlan1wlan0security]posix_acl_accesslouser'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'tmpfs\x00'}}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6}}, 0x0) ptrace$getregs(0xc, 0x0, 0x0, 0x0) chdir(0x0) open(0x0, 0x14103e, 0x0) 14:31:59 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = semget$private(0x0, 0x0, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x3, 0x0, 0x1800}, {0x3, 0x1, 0x800}, {0x0, 0x1ff, 0x800}, {0x1, 0x8, 0x800}, {0x0, 0xfffffffffffff13c, 0x800}, {0x1, 0x1, 0x1800}, {0x3, 0x6, 0x800}, {0x1, 0x6, 0x1800}, {0x7, 0x5, 0x800}], 0x9, &(0x7f00000000c0)) getsockopt$sock_cred(r0, 0x1, 0x19, &(0x7f00000001c0), &(0x7f0000000000)=0x158) 14:31:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000fffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) 14:31:59 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x20000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:31:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) recvfrom$packet(r1, &(0x7f0000000340)=""/252, 0xfc, 0x20, &(0x7f00000001c0)={0x11, 0x3, r2, 0x1, 0xffffffffffffffff, 0x6, @dev={[], 0x1c}}, 0x14) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='vcan0\x00', 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$can_raw(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{}, 0x0, 0x0, 0x0, 0x0, "14201a38d1a9ff4e43c9574dc338b4bed5abbbcf08e6debccffe54e2f9125ac933cb937a4f642146123e0b21a1f25d60bc5831b46cf051a408f88dbd92517a4b"}, 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{}, 0x0, 0x0, 0x0, 0x0, "c756b247020c2f95"}, 0x10}}, 0x4040000) 14:31:59 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000039c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000200)={0x0, 0xff00000000000000, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000030000004c00010038000400200001000a00000000000000ff15000000000000000000000000000100000000140002000200000000000000ff00000000000000100001007564703a73797a3000000000"], 0x60}}, 0x0) 14:31:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200180, 0x0) r2 = inotify_add_watch(r1, &(0x7f0000000040)='./file0\x00', 0x10) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0xe8, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYRESDEC=r2], 0x3c}, 0x1, 0x0, 0x0, 0x400000000}, 0x4000000) 14:32:00 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000600)=@broute={'broute\x00', 0x20, 0x3, 0x2e0, [0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x20000040], 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"]}, 0x358) 14:32:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 763.669104] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. [ 763.707206] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. [ 763.721241] Started in network mode 14:32:00 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x80000) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) ioctl$void(r2, 0x5451) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) dup3(r2, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x6}) [ 763.749847] Own node identity ff150000000000000000000000000001, cluster identity 4711 [ 763.785208] ntfs: (device loop5): parse_options(): Unrecognized mount option fsname. 14:32:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000312000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084000500ff010000000000000000000000000001000000003c00000000000000e00000010000000000000000000000000000000000000000000000000000000000000000ac1414bb000000000000000000000000000000003c00000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) [ 763.799310] New replicast peer: 0.0.0.0 [ 763.831830] ================================================================== [ 763.839473] BUG: KASAN: use-after-free in kfree_skb+0xb7/0x580 [ 763.845463] Read of size 4 at addr ffff8881d75a5a24 by task syz-executor1/31180 [ 763.852915] [ 763.854560] CPU: 1 PID: 31180 Comm: syz-executor1 Not tainted 4.20.0-rc6+ #371 [ 763.857382] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfstransmute. [ 763.861922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 763.861941] Call Trace: [ 763.861962] dump_stack+0x244/0x39d [ 763.861984] ? dump_stack_print_info.cold.1+0x20/0x20 [ 763.891501] ? printk+0xa7/0xcf [ 763.894805] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 763.899612] print_address_description.cold.7+0x9/0x1ff [ 763.904992] kasan_report.cold.8+0x242/0x309 [ 763.909426] ? kfree_skb+0xb7/0x580 [ 763.913067] check_memory_region+0x13e/0x1b0 [ 763.917660] kasan_check_read+0x11/0x20 [ 763.921641] kfree_skb+0xb7/0x580 [ 763.925104] ? __kfree_skb+0x20/0x20 [ 763.928839] ? skb_tstamp_tx+0x50/0x50 [ 763.932739] ? __lock_is_held+0xb5/0x140 [ 763.936916] tipc_udp_send_msg+0x5a6/0x670 [ 763.941178] ? tipc_udp_xmit.isra.14+0xef0/0xef0 [ 763.945947] ? bearer_get+0x2f8/0x4e0 [ 763.949755] ? __tipc_nl_add_media+0xca0/0xca0 [ 763.954347] ? kasan_check_read+0x11/0x20 [ 763.958502] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 763.963788] ? rcu_softirq_qs+0x20/0x20 [ 763.967773] ? tipc_disc_remove_dest+0x120/0x120 [ 763.972538] ? tipc_enable_bearer+0x90d/0xf10 [ 763.977044] ? rcu_read_lock_sched_held+0x14f/0x180 [ 763.982078] tipc_bearer_xmit_skb+0x171/0x350 [ 763.986588] tipc_enable_bearer+0xc5e/0xf10 [ 763.990917] ? mutex_trylock+0x2b0/0x2b0 [ 763.994998] ? tipc_bearer_xmit_skb+0x350/0x350 [ 763.999677] ? nla_memcmp+0x90/0x90 [ 764.003331] ? lock_release+0xa00/0xa00 [ 764.007317] ? perf_trace_sched_process_exec+0x860/0x860 [ 764.012774] ? mark_held_locks+0x130/0x130 [ 764.017021] ? check_preemption_disabled+0x48/0x280 [ 764.022086] __tipc_nl_bearer_enable+0x37c/0x4a0 [ 764.026864] ? __tipc_nl_bearer_enable+0x37c/0x4a0 [ 764.031802] ? tipc_nl_bearer_disable+0x30/0x30 [ 764.036500] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.042061] ? __nla_parse+0x12c/0x3e0 [ 764.045971] tipc_nl_bearer_enable+0x22/0x30 [ 764.050885] genl_family_rcv_msg+0x8a7/0x11a0 [ 764.055401] ? genl_unregister_family+0x8a0/0x8a0 [ 764.060253] ? lock_downgrade+0x900/0x900 [ 764.064409] ? check_preemption_disabled+0x48/0x280 [ 764.069442] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 764.074377] ? kasan_check_read+0x11/0x20 [ 764.078529] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 764.083840] ? rcu_softirq_qs+0x20/0x20 [ 764.087872] genl_rcv_msg+0xc6/0x168 [ 764.091598] netlink_rcv_skb+0x172/0x440 [ 764.095690] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 764.100457] ? netlink_ack+0xb80/0xb80 [ 764.104350] ? down_read+0x8d/0x120 [ 764.108001] genl_rcv+0x28/0x40 [ 764.111286] netlink_unicast+0x5a5/0x760 [ 764.115375] ? netlink_attachskb+0x9a0/0x9a0 [ 764.119792] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.125382] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 764.130442] netlink_sendmsg+0xa18/0xfc0 [ 764.134551] ? netlink_unicast+0x760/0x760 [ 764.138796] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 764.143744] ? apparmor_socket_sendmsg+0x29/0x30 [ 764.148508] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.154069] ? security_socket_sendmsg+0x94/0xc0 [ 764.158835] ? netlink_unicast+0x760/0x760 [ 764.163082] sock_sendmsg+0xd5/0x120 [ 764.166823] ___sys_sendmsg+0x7fd/0x930 [ 764.170817] ? copy_msghdr_from_user+0x580/0x580 [ 764.175604] ? __fget_light+0x2e9/0x430 [ 764.179592] ? fget_raw+0x20/0x20 [ 764.183056] ? __might_fault+0x12b/0x1e0 [ 764.187129] ? lock_downgrade+0x900/0x900 [ 764.191310] ? lock_release+0xa00/0xa00 [ 764.195312] ? perf_trace_sched_process_exec+0x860/0x860 [ 764.200785] ? posix_ktime_get_ts+0x15/0x20 [ 764.205119] ? trace_hardirqs_off_caller+0x310/0x310 [ 764.210227] ? trace_hardirqs_on+0xbd/0x310 [ 764.214559] ? kasan_check_read+0x11/0x20 [ 764.218723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.224282] ? sockfd_lookup_light+0xc5/0x160 [ 764.228799] __sys_sendmsg+0x11d/0x280 [ 764.232713] ? __ia32_sys_shutdown+0x80/0x80 [ 764.237155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 764.242744] ? put_timespec64+0x10f/0x1b0 [ 764.246909] ? do_syscall_64+0x9a/0x820 [ 764.250892] ? do_syscall_64+0x9a/0x820 [ 764.254885] ? trace_hardirqs_off_caller+0x310/0x310 [ 764.260022] __x64_sys_sendmsg+0x78/0xb0 [ 764.264122] do_syscall_64+0x1b9/0x820 [ 764.268026] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 764.273407] ? syscall_return_slowpath+0x5e0/0x5e0 [ 764.278346] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.283207] ? trace_hardirqs_on_caller+0x310/0x310 [ 764.288226] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 764.293285] ? prepare_exit_to_usermode+0x291/0x3b0 [ 764.298333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.303193] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.308390] RIP: 0033:0x457679 [ 764.311591] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 764.330495] RSP: 002b:00007f133742fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 764.338212] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 764.345485] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 764.352757] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 764.360031] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13374306d4 [ 764.367311] R13: 00000000004c423b R14: 00000000004d7180 R15: 00000000ffffffff [ 764.374631] [ 764.376260] Allocated by task 31180: [ 764.379997] save_stack+0x43/0xd0 [ 764.383455] kasan_kmalloc+0xc7/0xe0 [ 764.387173] kasan_slab_alloc+0x12/0x20 [ 764.391162] kmem_cache_alloc_node+0x144/0x730 [ 764.395768] __alloc_skb+0x119/0x770 [ 764.399548] __pskb_copy_fclone+0x16b/0xeb0 [ 764.403887] tipc_udp_send_msg+0x44e/0x670 [ 764.408138] tipc_bearer_xmit_skb+0x171/0x350 [ 764.412636] tipc_enable_bearer+0xc5e/0xf10 [ 764.416962] __tipc_nl_bearer_enable+0x37c/0x4a0 [ 764.421736] tipc_nl_bearer_enable+0x22/0x30 [ 764.426149] genl_family_rcv_msg+0x8a7/0x11a0 [ 764.430647] genl_rcv_msg+0xc6/0x168 [ 764.434381] netlink_rcv_skb+0x172/0x440 [ 764.438464] genl_rcv+0x28/0x40 [ 764.441756] netlink_unicast+0x5a5/0x760 [ 764.445830] netlink_sendmsg+0xa18/0xfc0 [ 764.449900] sock_sendmsg+0xd5/0x120 [ 764.453617] ___sys_sendmsg+0x7fd/0x930 [ 764.457631] __sys_sendmsg+0x11d/0x280 [ 764.461522] __x64_sys_sendmsg+0x78/0xb0 [ 764.465594] do_syscall_64+0x1b9/0x820 [ 764.469487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.474670] [ 764.476310] Freed by task 31180: [ 764.479681] save_stack+0x43/0xd0 [ 764.483139] __kasan_slab_free+0x102/0x150 [ 764.487383] kasan_slab_free+0xe/0x10 [ 764.491185] kmem_cache_free+0x83/0x290 [ 764.495161] kfree_skbmem+0x154/0x230 [ 764.498994] kfree_skb+0x1c3/0x580 [ 764.502538] tipc_udp_xmit.isra.14+0x420/0xef0 [ 764.507131] tipc_udp_send_msg+0x398/0x670 [ 764.511402] tipc_bearer_xmit_skb+0x171/0x350 [ 764.515917] tipc_enable_bearer+0xc5e/0xf10 [ 764.520246] __tipc_nl_bearer_enable+0x37c/0x4a0 [ 764.525012] tipc_nl_bearer_enable+0x22/0x30 [ 764.529430] genl_family_rcv_msg+0x8a7/0x11a0 [ 764.533928] genl_rcv_msg+0xc6/0x168 [ 764.537644] netlink_rcv_skb+0x172/0x440 [ 764.541709] genl_rcv+0x28/0x40 [ 764.544991] netlink_unicast+0x5a5/0x760 [ 764.549051] netlink_sendmsg+0xa18/0xfc0 [ 764.553129] sock_sendmsg+0xd5/0x120 [ 764.556846] ___sys_sendmsg+0x7fd/0x930 [ 764.560827] __sys_sendmsg+0x11d/0x280 [ 764.564734] __x64_sys_sendmsg+0x78/0xb0 [ 764.568803] do_syscall_64+0x1b9/0x820 [ 764.572704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 764.577884] [ 764.579514] The buggy address belongs to the object at ffff8881d75a5940 [ 764.579514] which belongs to the cache skbuff_head_cache of size 232 [ 764.592698] The buggy address is located 228 bytes inside of [ 764.592698] 232-byte region [ffff8881d75a5940, ffff8881d75a5a28) [ 764.604572] The buggy address belongs to the page: [ 764.609509] page:ffffea00075d6940 count:1 mapcount:0 mapping:ffff8881d9a1c0c0 index:0x0 [ 764.617659] flags: 0x2fffc0000000200(slab) [ 764.621917] raw: 02fffc0000000200 ffffea0006e1a108 ffffea000744c9c8 ffff8881d9a1c0c0 [ 764.629830] raw: 0000000000000000 ffff8881d75a5080 000000010000000c 0000000000000000 [ 764.637715] page dumped because: kasan: bad access detected [ 764.643438] [ 764.645062] Memory state around the buggy address: [ 764.649994] ffff8881d75a5900: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 764.657357] ffff8881d75a5980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 764.664724] >ffff8881d75a5a00: fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc [ 764.672083] ^ [ 764.676494] ffff8881d75a5a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 764.683859] ffff8881d75a5b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc [ 764.691214] ================================================================== [ 764.698568] Disabling lock debugging due to kernel taint [ 764.704781] ================================================================== [ 764.712182] BUG: KASAN: double-free or invalid-free in skb_free_head+0x99/0xc0 [ 764.719542] [ 764.721182] CPU: 1 PID: 31180 Comm: syz-executor1 Tainted: G B 4.20.0-rc6+ #371 [ 764.729935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 764.739391] Call Trace: [ 764.741969] [ 764.744128] dump_stack+0x244/0x39d [ 764.747760] ? dump_stack_print_info.cold.1+0x20/0x20 [ 764.752950] ? printk+0xa7/0xcf [ 764.756232] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 764.760988] ? debug_check_no_obj_freed+0x305/0x58d [ 764.766030] print_address_description.cold.7+0x9/0x1ff [ 764.771396] ? skb_free_head+0x99/0xc0 [ 764.775289] kasan_report_invalid_free+0x64/0xa0 [ 764.780055] ? skb_free_head+0x99/0xc0 [ 764.783945] __kasan_slab_free+0x13a/0x150 [ 764.788186] ? skb_free_head+0x99/0xc0 [ 764.792077] kasan_slab_free+0xe/0x10 [ 764.795879] kfree+0xcf/0x230 [ 764.798992] skb_free_head+0x99/0xc0 [ 764.802709] skb_release_data+0x70c/0x9a0 [ 764.806855] ? __copy_skb_header+0x350/0x6b0 [ 764.811275] ? skb_tx_error+0x410/0x410 [ 764.815263] ? tipc_udp_xmit.isra.14+0x425/0xef0 [ 764.820030] skb_release_all+0x4a/0x60 [ 764.823921] kfree_skb+0x1bb/0x580 [ 764.827473] ? tipc_udp_send_msg+0x5a6/0x670 [ 764.831880] ? __kfree_skb+0x20/0x20 [ 764.835603] ? skb_tstamp_tx+0x50/0x50 [ 764.839494] ? bearer_get+0x232/0x4e0 [ 764.843309] ? lock_downgrade+0x900/0x900 [ 764.847470] tipc_udp_send_msg+0x5a6/0x670 [ 764.851714] ? tipc_udp_xmit.isra.14+0xef0/0xef0 [ 764.856475] ? bearer_get+0x2f8/0x4e0 [ 764.860282] ? __tipc_nl_add_media+0xca0/0xca0 [ 764.864875] ? skb_clone+0x21a/0x500 [ 764.868587] ? _raw_spin_unlock_bh+0x30/0x40 [ 764.873005] ? trace_hardirqs_off_caller+0x310/0x310 [ 764.878110] ? do_raw_spin_trylock+0x270/0x270 [ 764.882697] tipc_bearer_xmit_skb+0x171/0x350 [ 764.887198] tipc_disc_timeout+0xb2b/0xfc0 [ 764.891443] ? tipc_disc_msg_xmit.isra.19+0x180/0x180 [ 764.896644] ? lock_acquire+0x1ed/0x520 [ 764.900617] ? call_timer_fn+0x1db/0x920 [ 764.904681] ? error_exit+0xb/0x20 [ 764.908245] ? lock_release+0xa00/0xa00 [ 764.912232] ? native_iret+0x7/0x7 [ 764.915784] call_timer_fn+0x272/0x920 [ 764.919679] ? tipc_disc_msg_xmit.isra.19+0x180/0x180 [ 764.924893] ? process_timeout+0x40/0x40 [ 764.928961] ? lock_release+0x19b/0xa00 [ 764.932957] ? __run_timers+0x7da/0xc70 [ 764.936960] ? lock_downgrade+0x900/0x900 [ 764.941122] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 764.946230] ? trace_hardirqs_on+0xbd/0x310 [ 764.950563] ? kasan_check_read+0x11/0x20 [ 764.954719] ? __run_timers+0x7da/0xc70 [ 764.958698] ? trace_hardirqs_off_caller+0x310/0x310 [ 764.963815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 764.969381] ? tipc_disc_msg_xmit.isra.19+0x180/0x180 [ 764.974571] __run_timers+0x7e5/0xc70 [ 764.978376] ? trace_hardirqs_off_caller+0xbb/0x310 [ 764.983411] ? timer_fixup_init+0x70/0x70 [ 764.987567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 764.992526] ? native_iret+0x7/0x7 [ 764.996073] ? error_exit+0xb/0x20 [ 764.999636] ? pvclock_read_flags+0x160/0x160 [ 765.004134] ? lock_downgrade+0x900/0x900 [ 765.008290] ? trace_hardirqs_on+0xbd/0x310 [ 765.012628] ? kvm_sched_clock_read+0x9/0x20 [ 765.017045] ? irq_exit+0x17f/0x1c0 [ 765.020677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.026226] ? check_preemption_disabled+0x48/0x280 [ 765.031242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.036796] run_timer_softirq+0x52/0xb0 [ 765.040863] ? __this_cpu_preempt_check+0x1c/0x20 [ 765.045707] __do_softirq+0x308/0xb7e [ 765.049666] ? ktime_get_raw_ts64+0x4d0/0x4d0 [ 765.054163] ? lock_downgrade+0x900/0x900 [ 765.058323] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 765.063437] ? pvclock_read_flags+0x160/0x160 [ 765.068007] ? lapic_next_event+0x5a/0x90 [ 765.072160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.077703] ? clockevents_program_event+0x140/0x370 [ 765.082861] ? kvm_clock_read+0x18/0x30 [ 765.086840] ? kvm_sched_clock_read+0x9/0x20 [ 765.091286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.096838] ? check_preemption_disabled+0x48/0x280 [ 765.101894] irq_exit+0x17f/0x1c0 [ 765.105383] smp_apic_timer_interrupt+0x1cb/0x760 [ 765.110227] ? smp_call_function_single_interrupt+0x159/0x650 [ 765.116113] ? smp_call_function_single_interrupt+0x650/0x650 [ 765.121997] ? interrupt_entry+0xb5/0xc0 [ 765.126063] ? trace_hardirqs_off_caller+0xbb/0x310 [ 765.131081] ? trace_hardirqs_off_caller+0xbb/0x310 [ 765.136120] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.140975] ? trace_hardirqs_on_caller+0x310/0x310 [ 765.145994] ? trace_hardirqs_on_caller+0x310/0x310 [ 765.151010] ? task_prio+0x50/0x50 [ 765.154556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.160095] ? check_preemption_disabled+0x48/0x280 [ 765.165132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.169986] apic_timer_interrupt+0xf/0x20 [ 765.174216] [ 765.176458] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 765.182171] Code: f0 00 52 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 18 ef 76 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 1c 6b 25 f9 eb bb 0f 0b 0f 0b e8 9a d7 e7 [ 765.201075] RSP: 0018:ffff888184d46de8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 765.208789] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffc90007dfa000 [ 765.216092] RDX: 1ffffffff12a401e RSI: ffffffff8185ad04 RDI: 0000000000000286 [ 765.223379] RBP: ffff888184d46df8 R08: ffff888185872540 R09: fffffbfff12c7248 [ 765.230646] R10: fffffbfff12c7248 R11: ffffffff89639243 R12: ffffffff89639240 [ 765.238066] R13: 0000000000000000 R14: ffff8881d75a5a24 R15: ffff8881d75a5a24 [ 765.245354] ? trace_hardirqs_on+0xb4/0x310 [ 765.249694] kasan_end_report+0x32/0x4f [ 765.253684] kasan_report.cold.8+0x76/0x309 [ 765.258007] ? kfree_skb+0xb7/0x580 [ 765.261667] check_memory_region+0x13e/0x1b0 [ 765.266077] kasan_check_read+0x11/0x20 [ 765.270054] kfree_skb+0xb7/0x580 [ 765.273518] ? __kfree_skb+0x20/0x20 [ 765.277250] ? skb_tstamp_tx+0x50/0x50 [ 765.281139] ? __lock_is_held+0xb5/0x140 [ 765.285232] tipc_udp_send_msg+0x5a6/0x670 [ 765.289477] ? tipc_udp_xmit.isra.14+0xef0/0xef0 [ 765.294243] ? bearer_get+0x2f8/0x4e0 [ 765.298067] ? __tipc_nl_add_media+0xca0/0xca0 [ 765.302649] ? kasan_check_read+0x11/0x20 [ 765.306800] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 765.312166] ? rcu_softirq_qs+0x20/0x20 [ 765.316146] ? tipc_disc_remove_dest+0x120/0x120 [ 765.320902] ? tipc_enable_bearer+0x90d/0xf10 [ 765.325402] ? rcu_read_lock_sched_held+0x14f/0x180 [ 765.330426] tipc_bearer_xmit_skb+0x171/0x350 [ 765.334945] tipc_enable_bearer+0xc5e/0xf10 [ 765.339280] ? mutex_trylock+0x2b0/0x2b0 [ 765.343381] ? tipc_bearer_xmit_skb+0x350/0x350 [ 765.348057] ? nla_memcmp+0x90/0x90 [ 765.351689] ? lock_release+0xa00/0xa00 [ 765.355666] ? perf_trace_sched_process_exec+0x860/0x860 [ 765.361149] ? mark_held_locks+0x130/0x130 [ 765.365404] ? check_preemption_disabled+0x48/0x280 [ 765.370448] __tipc_nl_bearer_enable+0x37c/0x4a0 [ 765.375206] ? __tipc_nl_bearer_enable+0x37c/0x4a0 [ 765.380141] ? tipc_nl_bearer_disable+0x30/0x30 [ 765.384827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.390367] ? __nla_parse+0x12c/0x3e0 [ 765.394280] tipc_nl_bearer_enable+0x22/0x30 [ 765.398702] genl_family_rcv_msg+0x8a7/0x11a0 [ 765.403207] ? genl_unregister_family+0x8a0/0x8a0 [ 765.408056] ? lock_downgrade+0x900/0x900 [ 765.412209] ? check_preemption_disabled+0x48/0x280 [ 765.417229] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 765.422162] ? kasan_check_read+0x11/0x20 [ 765.426400] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 765.431696] ? rcu_softirq_qs+0x20/0x20 [ 765.435709] genl_rcv_msg+0xc6/0x168 [ 765.439423] netlink_rcv_skb+0x172/0x440 [ 765.443500] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 765.448306] ? netlink_ack+0xb80/0xb80 [ 765.452207] ? down_read+0x8d/0x120 [ 765.455853] genl_rcv+0x28/0x40 [ 765.459136] netlink_unicast+0x5a5/0x760 [ 765.463204] ? netlink_attachskb+0x9a0/0x9a0 [ 765.467615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.473166] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 765.478195] netlink_sendmsg+0xa18/0xfc0 [ 765.482278] ? netlink_unicast+0x760/0x760 [ 765.486520] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 765.491453] ? apparmor_socket_sendmsg+0x29/0x30 [ 765.496220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 765.501760] ? security_socket_sendmsg+0x94/0xc0 [ 765.506517] ? netlink_unicast+0x760/0x760 [ 765.510756] sock_sendmsg+0xd5/0x120 [ 765.514474] ___sys_sendmsg+0x7fd/0x930 [ 765.518455] ? copy_msghdr_from_user+0x580/0x580 [ 765.523227] ? __fget_light+0x2e9/0x430 [ 765.527203] ? fget_raw+0x20/0x20 [ 765.530662] ? __might_fault+0x12b/0x1e0 [ 765.534764] ? lock_downgrade+0x900/0x900 [ 765.538966] ? lock_release+0xa00/0xa00 [ 765.542942] ? perf_trace_sched_process_exec+0x860/0x860 [ 765.548408] ? posix_ktime_get_ts+0x15/0x20 [ 765.552734] ? trace_hardirqs_off_caller+0x310/0x310 [ 765.557847] ? trace_hardirqs_on+0xbd/0x310 [ 765.562168] ? kasan_check_read+0x11/0x20 [ 765.566330] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.571875] ? sockfd_lookup_light+0xc5/0x160 [ 765.576379] __sys_sendmsg+0x11d/0x280 [ 765.580270] ? __ia32_sys_shutdown+0x80/0x80 [ 765.584692] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 765.590231] ? put_timespec64+0x10f/0x1b0 [ 765.594387] ? do_syscall_64+0x9a/0x820 [ 765.598385] ? do_syscall_64+0x9a/0x820 [ 765.602375] ? trace_hardirqs_off_caller+0x310/0x310 [ 765.607486] __x64_sys_sendmsg+0x78/0xb0 [ 765.611555] do_syscall_64+0x1b9/0x820 [ 765.615444] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 765.620840] ? syscall_return_slowpath+0x5e0/0x5e0 [ 765.625804] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.630681] ? trace_hardirqs_on_caller+0x310/0x310 [ 765.635698] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 765.640728] ? prepare_exit_to_usermode+0x291/0x3b0 [ 765.645754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 765.650617] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 765.655808] RIP: 0033:0x457679 [ 765.659029] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 765.677930] RSP: 002b:00007f133742fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 765.685674] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 765.693036] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 765.700311] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 765.707584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13374306d4 [ 765.714852] R13: 00000000004c423b R14: 00000000004d7180 R15: 00000000ffffffff [ 765.722131] [ 765.723761] Allocated by task 31180: [ 765.727474] save_stack+0x43/0xd0 [ 765.730937] kasan_kmalloc+0xc7/0xe0 [ 765.734651] __kmalloc_node_track_caller+0x50/0x70 [ 765.739589] __kmalloc_reserve.isra.40+0x41/0xe0 [ 765.744344] __alloc_skb+0x155/0x770 [ 765.748071] __pskb_copy_fclone+0x16b/0xeb0 [ 765.752421] tipc_udp_send_msg+0x44e/0x670 [ 765.756659] tipc_bearer_xmit_skb+0x171/0x350 [ 765.761152] tipc_disc_timeout+0xb2b/0xfc0 [ 765.765388] call_timer_fn+0x272/0x920 [ 765.769271] __run_timers+0x7e5/0xc70 [ 765.773075] run_timer_softirq+0x52/0xb0 [ 765.777150] __do_softirq+0x308/0xb7e [ 765.780940] [ 765.782566] Freed by task 31180: [ 765.785938] save_stack+0x43/0xd0 [ 765.789393] __kasan_slab_free+0x102/0x150 [ 765.793631] kasan_slab_free+0xe/0x10 [ 765.797427] kfree+0xcf/0x230 [ 765.800533] skb_free_head+0x99/0xc0 [ 765.804249] skb_release_data+0x70c/0x9a0 [ 765.808394] skb_release_all+0x4a/0x60 [ 765.812282] kfree_skb+0x1bb/0x580 [ 765.815834] tipc_udp_xmit.isra.14+0x420/0xef0 [ 765.820415] tipc_udp_send_msg+0x398/0x670 [ 765.824649] tipc_bearer_xmit_skb+0x171/0x350 [ 765.829157] tipc_disc_timeout+0xb2b/0xfc0 [ 765.833389] call_timer_fn+0x272/0x920 [ 765.837277] __run_timers+0x7e5/0xc70 [ 765.841083] run_timer_softirq+0x52/0xb0 [ 765.845143] __do_softirq+0x308/0xb7e [ 765.848942] [ 765.850583] The buggy address belongs to the object at ffff8881b5b54dc0 [ 765.850583] which belongs to the cache kmalloc-1k of size 1024 [ 765.863244] The buggy address is located 0 bytes inside of [ 765.863244] 1024-byte region [ffff8881b5b54dc0, ffff8881b5b551c0) [ 765.875027] The buggy address belongs to the page: [ 765.879955] page:ffffea0006d6d500 count:1 mapcount:0 mapping:ffff8881da800ac0 index:0x0 compound_mapcount: 0 [ 765.889932] flags: 0x2fffc0000010200(slab|head) [ 765.894604] raw: 02fffc0000010200 ffffea0006d1d008 ffffea00074eda08 ffff8881da800ac0 [ 765.902490] raw: 0000000000000000 ffff8881b5b54040 0000000100000007 0000000000000000 [ 765.910366] page dumped because: kasan: bad access detected [ 765.916348] [ 765.917978] Memory state around the buggy address: [ 765.922901] ffff8881b5b54c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 765.930285] ffff8881b5b54d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 765.937676] >ffff8881b5b54d80: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 765.945024] ^ [ 765.950473] ffff8881b5b54e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 765.957832] ffff8881b5b54e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 765.965188] ================================================================== [ 765.972558] Kernel panic - not syncing: panic_on_warn set ... [ 765.978447] CPU: 1 PID: 31180 Comm: syz-executor1 Tainted: G B 4.20.0-rc6+ #371 [ 765.987190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 765.996547] Call Trace: [ 765.999129] [ 766.001297] dump_stack+0x244/0x39d [ 766.004951] ? dump_stack_print_info.cold.1+0x20/0x20 [ 766.010160] ? skb_free_head+0x30/0xc0 [ 766.014051] panic+0x2ad/0x55c [ 766.017248] ? add_taint.cold.5+0x16/0x16 [ 766.021406] ? print_shadow_for_address+0xb6/0x116 [ 766.026344] ? trace_hardirqs_off+0xaf/0x310 [ 766.030759] ? skb_free_head+0x99/0xc0 [ 766.034651] kasan_end_report+0x47/0x4f [ 766.038628] kasan_report_invalid_free+0x81/0xa0 [ 766.043393] ? skb_free_head+0x99/0xc0 [ 766.047291] __kasan_slab_free+0x13a/0x150 [ 766.051541] ? skb_free_head+0x99/0xc0 [ 766.055431] kasan_slab_free+0xe/0x10 [ 766.059231] kfree+0xcf/0x230 [ 766.062343] skb_free_head+0x99/0xc0 [ 766.066075] skb_release_data+0x70c/0x9a0 [ 766.070226] ? __copy_skb_header+0x350/0x6b0 [ 766.074642] ? skb_tx_error+0x410/0x410 [ 766.078630] ? tipc_udp_xmit.isra.14+0x425/0xef0 [ 766.083403] skb_release_all+0x4a/0x60 [ 766.087292] kfree_skb+0x1bb/0x580 [ 766.090850] ? tipc_udp_send_msg+0x5a6/0x670 [ 766.095260] ? __kfree_skb+0x20/0x20 [ 766.098981] ? skb_tstamp_tx+0x50/0x50 [ 766.102868] ? bearer_get+0x232/0x4e0 [ 766.106675] ? lock_downgrade+0x900/0x900 [ 766.110843] tipc_udp_send_msg+0x5a6/0x670 [ 766.115121] ? tipc_udp_xmit.isra.14+0xef0/0xef0 [ 766.119885] ? bearer_get+0x2f8/0x4e0 [ 766.123686] ? __tipc_nl_add_media+0xca0/0xca0 [ 766.128295] ? skb_clone+0x21a/0x500 [ 766.132025] ? _raw_spin_unlock_bh+0x30/0x40 [ 766.136478] ? trace_hardirqs_off_caller+0x310/0x310 [ 766.141619] ? do_raw_spin_trylock+0x270/0x270 [ 766.146215] tipc_bearer_xmit_skb+0x171/0x350 [ 766.150717] tipc_disc_timeout+0xb2b/0xfc0 [ 766.154963] ? tipc_disc_msg_xmit.isra.19+0x180/0x180 [ 766.160198] ? lock_acquire+0x1ed/0x520 [ 766.164176] ? call_timer_fn+0x1db/0x920 [ 766.168240] ? error_exit+0xb/0x20 [ 766.171784] ? lock_release+0xa00/0xa00 [ 766.175771] ? native_iret+0x7/0x7 [ 766.179325] call_timer_fn+0x272/0x920 [ 766.183234] ? tipc_disc_msg_xmit.isra.19+0x180/0x180 [ 766.188446] ? process_timeout+0x40/0x40 [ 766.192516] ? lock_release+0x19b/0xa00 [ 766.196515] ? __run_timers+0x7da/0xc70 [ 766.200505] ? lock_downgrade+0x900/0x900 [ 766.204672] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 766.209804] ? trace_hardirqs_on+0xbd/0x310 [ 766.214146] ? kasan_check_read+0x11/0x20 [ 766.218292] ? __run_timers+0x7da/0xc70 [ 766.222282] ? trace_hardirqs_off_caller+0x310/0x310 [ 766.227403] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.232950] ? tipc_disc_msg_xmit.isra.19+0x180/0x180 [ 766.238156] __run_timers+0x7e5/0xc70 [ 766.241969] ? trace_hardirqs_off_caller+0xbb/0x310 [ 766.246996] ? timer_fixup_init+0x70/0x70 [ 766.251150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.255995] ? native_iret+0x7/0x7 [ 766.259538] ? error_exit+0xb/0x20 [ 766.263104] ? pvclock_read_flags+0x160/0x160 [ 766.267618] ? lock_downgrade+0x900/0x900 [ 766.271780] ? trace_hardirqs_on+0xbd/0x310 [ 766.276109] ? kvm_sched_clock_read+0x9/0x20 [ 766.280645] ? irq_exit+0x17f/0x1c0 [ 766.284283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.289838] ? check_preemption_disabled+0x48/0x280 [ 766.294867] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.300407] run_timer_softirq+0x52/0xb0 [ 766.304484] ? __this_cpu_preempt_check+0x1c/0x20 [ 766.309350] __do_softirq+0x308/0xb7e [ 766.313158] ? ktime_get_raw_ts64+0x4d0/0x4d0 [ 766.317654] ? lock_downgrade+0x900/0x900 [ 766.321803] ? __irqentry_text_end+0x1f9658/0x1f9658 [ 766.326922] ? pvclock_read_flags+0x160/0x160 [ 766.331424] ? lapic_next_event+0x5a/0x90 [ 766.335574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.341112] ? clockevents_program_event+0x140/0x370 [ 766.346220] ? kvm_clock_read+0x18/0x30 [ 766.350193] ? kvm_sched_clock_read+0x9/0x20 [ 766.354620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.360157] ? check_preemption_disabled+0x48/0x280 [ 766.365204] irq_exit+0x17f/0x1c0 [ 766.368673] smp_apic_timer_interrupt+0x1cb/0x760 [ 766.373515] ? smp_call_function_single_interrupt+0x159/0x650 [ 766.379403] ? smp_call_function_single_interrupt+0x650/0x650 [ 766.385311] ? interrupt_entry+0xb5/0xc0 [ 766.389380] ? trace_hardirqs_off_caller+0xbb/0x310 [ 766.394399] ? trace_hardirqs_off_caller+0xbb/0x310 [ 766.399419] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.404262] ? trace_hardirqs_on_caller+0x310/0x310 [ 766.409543] ? trace_hardirqs_on_caller+0x310/0x310 [ 766.414575] ? task_prio+0x50/0x50 [ 766.418121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.423662] ? check_preemption_disabled+0x48/0x280 [ 766.428684] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.433539] apic_timer_interrupt+0xf/0x20 [ 766.437767] [ 766.440002] RIP: 0010:_raw_spin_unlock_irqrestore+0xaf/0xd0 [ 766.445713] Code: f0 00 52 89 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 28 48 83 3d 18 ef 76 01 00 74 15 48 89 df 57 9d <0f> 1f 44 00 00 eb ad e8 1c 6b 25 f9 eb bb 0f 0b 0f 0b e8 9a d7 e7 [ 766.464611] RSP: 0018:ffff888184d46de8 EFLAGS: 00000286 ORIG_RAX: ffffffffffffff13 [ 766.472341] RAX: dffffc0000000000 RBX: 0000000000000286 RCX: ffffc90007dfa000 [ 766.479626] RDX: 1ffffffff12a401e RSI: ffffffff8185ad04 RDI: 0000000000000286 [ 766.486922] RBP: ffff888184d46df8 R08: ffff888185872540 R09: fffffbfff12c7248 [ 766.494189] R10: fffffbfff12c7248 R11: ffffffff89639243 R12: ffffffff89639240 [ 766.501476] R13: 0000000000000000 R14: ffff8881d75a5a24 R15: ffff8881d75a5a24 [ 766.508756] ? trace_hardirqs_on+0xb4/0x310 [ 766.513085] kasan_end_report+0x32/0x4f [ 766.517057] kasan_report.cold.8+0x76/0x309 [ 766.521381] ? kfree_skb+0xb7/0x580 [ 766.525013] check_memory_region+0x13e/0x1b0 [ 766.529425] kasan_check_read+0x11/0x20 [ 766.533399] kfree_skb+0xb7/0x580 [ 766.536857] ? __kfree_skb+0x20/0x20 [ 766.540576] ? skb_tstamp_tx+0x50/0x50 [ 766.544467] ? __lock_is_held+0xb5/0x140 [ 766.548545] tipc_udp_send_msg+0x5a6/0x670 [ 766.552799] ? tipc_udp_xmit.isra.14+0xef0/0xef0 [ 766.557561] ? bearer_get+0x2f8/0x4e0 [ 766.561362] ? __tipc_nl_add_media+0xca0/0xca0 [ 766.565945] ? kasan_check_read+0x11/0x20 [ 766.570109] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 766.575387] ? rcu_softirq_qs+0x20/0x20 [ 766.579365] ? tipc_disc_remove_dest+0x120/0x120 [ 766.584133] ? tipc_enable_bearer+0x90d/0xf10 [ 766.588632] ? rcu_read_lock_sched_held+0x14f/0x180 [ 766.593670] tipc_bearer_xmit_skb+0x171/0x350 [ 766.598178] tipc_enable_bearer+0xc5e/0xf10 [ 766.602523] ? mutex_trylock+0x2b0/0x2b0 [ 766.606595] ? tipc_bearer_xmit_skb+0x350/0x350 [ 766.611268] ? nla_memcmp+0x90/0x90 [ 766.614910] ? lock_release+0xa00/0xa00 [ 766.618886] ? perf_trace_sched_process_exec+0x860/0x860 [ 766.624339] ? mark_held_locks+0x130/0x130 [ 766.628581] ? check_preemption_disabled+0x48/0x280 [ 766.633628] __tipc_nl_bearer_enable+0x37c/0x4a0 [ 766.638389] ? __tipc_nl_bearer_enable+0x37c/0x4a0 [ 766.643332] ? tipc_nl_bearer_disable+0x30/0x30 [ 766.648015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.653558] ? __nla_parse+0x12c/0x3e0 [ 766.657460] tipc_nl_bearer_enable+0x22/0x30 [ 766.661888] genl_family_rcv_msg+0x8a7/0x11a0 [ 766.666397] ? genl_unregister_family+0x8a0/0x8a0 [ 766.671246] ? lock_downgrade+0x900/0x900 [ 766.675402] ? check_preemption_disabled+0x48/0x280 [ 766.680423] ? rcu_read_unlock_special+0x1c0/0x1c0 [ 766.685353] ? kasan_check_read+0x11/0x20 [ 766.689516] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 766.694816] ? rcu_softirq_qs+0x20/0x20 [ 766.698823] genl_rcv_msg+0xc6/0x168 [ 766.702542] netlink_rcv_skb+0x172/0x440 [ 766.706621] ? genl_family_rcv_msg+0x11a0/0x11a0 [ 766.711382] ? netlink_ack+0xb80/0xb80 [ 766.715399] ? down_read+0x8d/0x120 [ 766.719053] genl_rcv+0x28/0x40 [ 766.722337] netlink_unicast+0x5a5/0x760 [ 766.726407] ? netlink_attachskb+0x9a0/0x9a0 [ 766.730826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.736371] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 766.741391] netlink_sendmsg+0xa18/0xfc0 [ 766.745466] ? netlink_unicast+0x760/0x760 [ 766.749735] ? aa_sock_msg_perm.isra.14+0xba/0x160 [ 766.754687] ? apparmor_socket_sendmsg+0x29/0x30 [ 766.759448] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 766.764993] ? security_socket_sendmsg+0x94/0xc0 [ 766.769748] ? netlink_unicast+0x760/0x760 [ 766.773989] sock_sendmsg+0xd5/0x120 [ 766.777705] ___sys_sendmsg+0x7fd/0x930 [ 766.781702] ? copy_msghdr_from_user+0x580/0x580 [ 766.786479] ? __fget_light+0x2e9/0x430 [ 766.790490] ? fget_raw+0x20/0x20 [ 766.793945] ? __might_fault+0x12b/0x1e0 [ 766.798013] ? lock_downgrade+0x900/0x900 [ 766.802179] ? lock_release+0xa00/0xa00 [ 766.806154] ? perf_trace_sched_process_exec+0x860/0x860 [ 766.811601] ? posix_ktime_get_ts+0x15/0x20 [ 766.815929] ? trace_hardirqs_off_caller+0x310/0x310 [ 766.821032] ? trace_hardirqs_on+0xbd/0x310 [ 766.825355] ? kasan_check_read+0x11/0x20 [ 766.829525] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.835066] ? sockfd_lookup_light+0xc5/0x160 [ 766.839570] __sys_sendmsg+0x11d/0x280 [ 766.843461] ? __ia32_sys_shutdown+0x80/0x80 [ 766.847877] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 766.853446] ? put_timespec64+0x10f/0x1b0 [ 766.857599] ? do_syscall_64+0x9a/0x820 [ 766.861578] ? do_syscall_64+0x9a/0x820 [ 766.865563] ? trace_hardirqs_off_caller+0x310/0x310 [ 766.870675] __x64_sys_sendmsg+0x78/0xb0 [ 766.874739] do_syscall_64+0x1b9/0x820 [ 766.878634] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 766.884003] ? syscall_return_slowpath+0x5e0/0x5e0 [ 766.888933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.893795] ? trace_hardirqs_on_caller+0x310/0x310 [ 766.898827] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 766.903864] ? prepare_exit_to_usermode+0x291/0x3b0 [ 766.908913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 766.913802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 766.918999] RIP: 0033:0x457679 [ 766.922206] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 766.941122] RSP: 002b:00007f133742fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 766.948830] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457679 [ 766.956095] RDX: 0000000000000000 RSI: 0000000020000200 RDI: 0000000000000004 [ 766.963364] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 766.970628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f13374306d4 [ 766.977896] R13: 00000000004c423b R14: 00000000004d7180 R15: 00000000ffffffff [ 766.986257] Kernel Offset: disabled [ 766.989890] Rebooting in 86400 seconds..